Features
Access, more secure and smarter!
Intelligence and wider integration are key aspects driving traction in the Access Control solutions market
The need for Electronic Access Control Systems (EACS) is growing at an accelerated pace with the threat landscape becoming complex. EACS systems that includes authentication systems, intruder alarm and perimeter security system are expected to continue to see growth. EACS market is estimated to reach $16.3 billion by 2017, growing at a CAGR of 7.0% from 2012 to 2017.
Mohammed Zaheer, GM, Business Connection, a distributor for leading Access Control vendors says, “Various industry report shows that the MEA region ranks as the fastest growing market for EACS. The growing of the market is mainly attributed to heightened security concerns backed by the government and regulatory mandates. The rising need to prevent, monitor and control unauthorized entry, visitor movement has led to the rise in the demand for security and access control systems.”
He adds that technologies that are expected to drive the market include wireless locks, iris detection systems and Biometric solutions and expects large access control vendors to make a major push into the region’s market.
Lee Copland, Managing Director, Maxxess EMEA opines that his company continues to see strong growth in the region from multiple vertical sectors.
He elaborates, “This is in part driven by continued investment in infrastructure particularly around education, healthcare, leisure and hospitality, retail and transportation. This combined with increasing urbanisation and the continued political unrest in a region with significantly porous borders we are seeing a rising demand to better protect people, assets and data.”
Sathish Arya, GM, Middle East & Africa at WatchNET International Trading LLC sums up key reasons that he says are largely responsible for the traction in surveillance deployments.
“There are a few reasons that has attributed to the growth of electronic access control segment. The growth in commercial & services as well as residential projects in this market is driving rising adoption of electronic access & locks. Secondly, organizations these days realize that there is a need for access control is a mandatory for their facility as new threats are emerging including workplace violence, theft and vandalism events that have heard about in recent years. And finally, organizations have started catching-up and adapting themselves to the latest technologies & looking for integration with other security systems. Organizations are interested to protect their facilities as well as streamlining the operations as they issue credentials to their people to restrict their access zones,” he says.
Drivers of the market
Heightened regulatory requirements are now a reality, although varying from country to country. Most buildings that are part of high security infrastructure have in any case more or less kept pace with such measures in the past few years.
“Access control is now mandatory across the region in a variety of high-security environments including national and industrial infrastructure as well as commercial enterprises such as tower buildings, 5-star hotels and shopping malls. However, before such compliance measures were introduced, most of these enterprises had already adopted access control to varying degrees and therefore beyond upgrades and greenfield projects, we didn’t see this as a major growth driver,” says Lee.
On one hand, increased compliance measures may be seen to drive demand. On the other hand, Mohammed strikes a contradictory note that it is also seen to slow rate of project deployments, perhaps with the need to meet more requirements.
“This growth is mainly attributed to heightened security concerns backed by government and regulatory mandates for an increased level of security, activity monitoring, and access control. At the same time, an increasing number of regional regulatory compliances are seen as the major impediment to market growth,”
Dubai seemed to lead the way when it made mandatory for new buildings to be up to speed with surveillance infrastructure. Countries including Qatar have also followed suit and implemented stringent compliance requirements.
Lee adds, “Compliance also differs between different countries in the region as well as those within the GCC. For instance, by 2014, all existing and new buildings in Dubai across a range of market sectors had to be equipped with surveillance, and businesses were required to obtain annual security compliance from the Department of Protective Systems with non-compliance resulting in fines through to non-renewal of trading licenses. Most large enterprises integrate surveillance with access control, so that security operatives can visually verify alarms. As a result, this drove significant growth in Dubai, and since Maxxess has over 50 integrations this saw us realizing both new and upgrade projects. “
“Qatar went one step further and specified that all surveillance systems had to utilise an open standard based on IP with megapixel cameras as the recommended minimum resolution. In addition, any solution needed sufficient capacity for 120 days’ storage meaning a lot of storage. When you consider that most countries only recommend 30 days, this drove significant upgrade projects that also benefited Maxxess, since we already integrated with a raft of IP and Full-HD surveillance vendors. We continue to integrate further surveillance vendors into eFusion moving forward and recently announced our integration with SeeTec.”
Lee adds there are more compliance initiatives under discussion including frameworks for approved manufacturers and integrators, along with thinking around a more joined up and regional approach. The challenge according to him is that in the security industry, many manufacturers and installers are still getting up to speed on both existing regulations and not looking forward toward the compliance measures likely to come in years to come.
Integration drives the market
There is a growing demand for greater integration of Access Control solutions and provide more actionable intelligence.
Mohammed says, “As organizational threats and risks are growing and changing, the demand for security management solutions has become the standard rather than the exception. The security management system allows secure and authorized access into both the physical and logical world. The access control can be integrated with T&A, fire alarm, CCTV, elevator to manage and control the whole system from a single window. These scenarios are different in different work environments and verticals leading to a customized integration packages, such are great business opportunities for organizations like us with software development capabilities.”
The demand for solutions that integrate immediate onsite response with electronic security and alarm systems is mainly attributed to heightened security concerns backed by government and regulatory mandates. End users are also demanding more intelligence from these solutions.
Satish says, “A key driver for the electronic security market in the coming years is how products are interoperable with other technology in system design and use. Such interconnected systems are capable of communicating with each other, allowing for wider collection and processing of data. The analysis of this data can be further utilized to provide feedback on the effectiveness of current systems, streamline operations, allow for mobile and cloud applications, and generally provide greater ease of use. As a result of this shift, legacy systems that are either less easily or entirely unable to be integrated into overall systems have seen falling favor, while interest in and demand for interoperable systems have grown rapidly.”
The demand for interoperable systems therefore is on the rise via-a-vis legacy systems that do not provide any flexibility and do not meet the growing need for live data intelligence.
Lee says, “End users are looking to increase efficiency, upgrade failing legacy equipment or move away from proprietary systems, close security gaps as well as wanting to gain more value from their security in terms of data intelligence and flexibility.”
Interoperability features are expected to become more critical to security system architecture as major users integrate video surveillance, access and area control, mobile devices and local and cloud-based storage across a common information technology platform.
Mohammed says, “Realizing these facts and as a first step, our ESS application currently is an hardware independent and can seamlessly work with some of the ACS controllers, Video surveillance and mobile devices. The flexible and scalable architecture of the ESS application provides an option to introduce the bridge among multiple components without disturbing the existing infrastructure.”
The opportunity is in integration of solutions into a system that enables greater control and visibility. DFS for instance is the master distributor for HID cards, readers and NAS ACS controller in the region and primarily provides solutions around these security products by developing their own ACS application which is branded as ESS soft.
Mohammed says, “We at DFS are focusing primarily on the customize ACS and integration projects rather than off the shelf products and solutions. We have been able to provide solutions to large organizations in terms of connecting and integrating different systems within the organization to provide a single window manageability. We have been the connect partners for companies like Bosch, galaxy etc, for providing the integration between Access Control System (ACS) and Time and Attendance (TNA), CCTV for their solution partners in the region.”
He elaborates that ESS soft is just not an Access Control System application but manages all the physical access and logical access needs of an organization. It start from issuing the secure cards, managing the access control and Time attendance, integration to cctv, fire alarm, elevators, mustering and guard tour from an single application thus allowing organizations to manage their whole security needs in a most cost effective way.
Maxxess, according to Lee, is looking to constantly integrating more products from a range of manufacturers, especially those from surveillance vendors, into the vendor’s flagship security platform, eFusion.
“There is a great demand for integrated security solutions due to various reasons as well as the rise of smart devices and interoperability drives demand for security system integrators. It is also to be noted that a key driver for the electronic security market in the coming years is how evolving products are interoperable with other technology in system design and use. Such interconnected systems are capable of communicating with each other, allowing for wider collection and processing of data. The analysis of this data can be further utilized to provide feedback on the effectiveness of current systems, streamline operations, allow for mobile and cloud applications, and generally provide greater ease of use. As a result of this shift, legacy systems that are either less easily or entirely unable to be integrated into overall systems have seen falling favor, while interest in and demand for interoperable systems have grown rapidly,”
Explaining that simple and commercial off the shelf (COTS) integration is at the heart of what Maxxess does, Lee adds, “For the last five to ten years’ organisations have recognised the need to streamline control room operations by integrating access, surveillance, fire and intruder alarms into a single security platform and that’s precisely what we can offer with Maxxess eFusion. This approach closes security gaps by enabling security operatives to visually verify alarms, relieve the burden of switching between disparate software and applications, provides standard operating procedures in the of events of varying incidents and overall drives significant efficiencies as well as strengthening security and mitigating risk.”
Surveillance solutions are now increasingly seen as gateways to better analytics. Today large enterprises want to gain intelligence from all that data to better optimize their facilities, understand how sites are operating and recognize employee behavior. This demand has encouraged solution providers to focus on bringing such solutions to market.
“We launched eMobile a feature-rich suite of dashboards that integrates with security systems, point of sale and IT networks software such as SAP and Oracle to turn big data into powerful business intelligence. By taking live data, eMobile uses a unique processing architecture that constantly analyses and profiles the data and cross references it with human behavior to provide several signals and indicators that alert security and operations operatives of any abnormal activity. For instance, if an employee changes their route in and out of a building, undertakes unusual activity on the corporate network, or accesses a site during a scheduled holiday.”
Integration scenarios in different verticals for Access Control solutions also present a great opportunity for security integrators.
“There is increasing demand for varying integrated solutions across a wide range of vertical markets. Maxxess eFusion is a highly versatile and modular security platform that gives organisations the flexibility to simply and cost-effectively integrate with a range of security and back office systems that also allows organisations to adapt and scale as their business grows. Together with Maxxess local support, this means integrators can offer tailored solutions that meets both the immediate and future needs of businesses large and small from a range of vertical markets.”
eFusion’s open technology software currently supports more than 50 off-the-shelf integrations with further integrations added monthly.
Satish see the need for integration as both a challenge and opportunity for the system integrators. He believes that integrators can possibly expand their range of solutions around such integrations for various use case scenarios and thereby grow their revenues.
“The integration between systems is both an opportunity and a challenge. While building an integrated security system, integrators spend lots of time learning about business as the requirement of the customers are varying in different business verticals. This is an opportunity for integrators to access different technologies (integration with Video, Intrusion, Cloud-based solutions, Fire alarm integration, BMS & Internet of things (IoT). In the past there was very limited scope for the integration which is a weaker revenue model for the integrators but now with the integrated solution there is a potential to increase their revenue. As integrated services & Internet of Things are progressing, physical security services providers have a whole new set of solutions and services to solve customer’s problems and increase the revenue base.”
According to him for an integrator, it would be advantageous working with WatchNET that offers a vast range of over 400+ products within its portfolio inclusive of Access Control Readers, Biometric devices, Controllers, Megapixel Cameras, Recorders, Storage Equipment & Enterprise Class Integrated Software as well as cloud based solutions.
“The System Integrator can source the complete set of solution form a single manufacturer since our products are scalable, modular with intact integrator both in hardware & software level. Further, WatchNET products are compatible with open standards such as ONVIF and PSIA. WatchNET very well understand the standards across the industry & delivers turnkey solutions. We have proven track-record in integration between many devices and different vendors. “
According to him, in one of the recent projects, WatchNET delivered a bespoke integrated solution with ACS & CCTV system with fire alarm integration, SCADA & BMS. Hence, he argues that integration and interoperability of WatchNET’s hardware with security software from different vendors will not be a challenging one.
In the final analysis, the EACS market looks well poised to continue seeing robust growth in the region, providing integrators a healthy opportunity to grow as more residential and commercial projects come up. Competition is getting a lot stiffer in this industry as more manufacturers step in. The challenge would be to provide solutions that integrate and are interoperable, in line with industry standards.
Features
Paving the Way for AI Success in Business
By Karim Azar, Regional Vice President – Middle East & Turkey, Cloudera
The digital landscape is evolving at an unprecedented pace, and at the heart of this evolution lies the transformative potential of artificial intelligence (AI). Across industries, AI is not merely a buzzword but a revolutionary force driving innovation, efficiency, and growth. Its impact extends beyond automation, touching every side of business operations and decision-making. It can revolutionize multiple sectors and fundamentally reshape the corporate industry.
Nonetheless, challenges arise with technological evolution, particularly in accessing and overseeing varied datasets across diverse environments. These challenges frequently act as obstacles to achieving successful AI implementation. In response to these challenges, the technology landscape is witnessing significant advancements in open data lakehouse technologies, providing a robust foundation for AI and analytics. Let’s delve into key technological developments and their advantages, focusing on the broader implications rather than specific products.
Unlocking Business Potential
AI has the potential to unleash new opportunities for businesses. McKinsey’s findings reveal that more than 62% of companies in the Gulf Cooperation Council (GCC) region currently utilize Generative AI in some operational aspect. The research underscores the substantial potential of AI to create tangible value in the GCC, with an estimated value of up to $150 billion.
This adoption trend is not without merit; statistics show that 83% of businesses adopting AI report substantial (30%) or moderate (53%) benefits. AI can address various challenges by providing predictive analytics and personalized customer experiences, enabling organizations to make faster and more accurate data-driven decisions.
Despite the obstacles in adopting AI, such as data management complexities and security concerns, offering air-gapped deployment for large language models (LLMs) is still a viable option. This feature boosts security, data privacy, and performance while also lowering customer operational expenses. However, overcoming these challenges requires more than just technological solutions. It demands a comprehensive approach that includes robust data governance frameworks, continuous employee training programs, and collaboration with regulatory bodies to ensure compliance with data protection laws.
AI Across Industries
AI is not a one-size-fits-all solution. It is applied differently across industries and business functions, including healthcare, finance, manufacturing, and retail. The potential uses of AI are vast, from boosting supply chain efficiency to transforming healthcare outcomes and customer service.
For example, in the healthcare industry, AI-powered predictive analytics can help doctors identify patients at high risk of developing certain diseases, allowing for early intervention and personalized treatment plans. AI algorithms can analyze market trends and financial customer behavior to recommend customized investment strategies. In manufacturing, AI-driven predictive maintenance can proactively anticipate equipment failures and schedule maintenance activities, minimizing downtime and reducing costs.
As businesses increasingly adopt AI, they invest in their organization’s future. By promoting innovation and agility, companies can leverage AI to maintain competitiveness in a digital era. Prioritizing data privacy and security helps build trust with customers and stakeholders, ensuring AI technologies’ responsible and ethical use.
AI is a significant transformation in how businesses function and innovate. Embracing AI opens up vast opportunities for organizations to reshape their operations, stimulate growth, and influence the future of business. While the journey may present challenges, the potential benefits are boundless for those willing to embrace the power of AI.
Features
Smart Cities and the Rise of Intelligent Transportation Systems: Exploring the Benefits and Risks of Vehicle Surveillance
By: Dr Ryad Soobhany, Associate Professor, School of Mathematical & Computer Sciences, Heriot-Watt University Dubai
Intelligent Transportation Systems (ITS) have emerged as a transformative solution in urban areas, tackling challenges such as high traffic and pollution. These systems, incorporating a network of static and mobile sensors, including cameras on buildings or vehicles/drones, embedded in the smart city infrastructure, are revolutionizing traffic management. By harnessing data from cameras, in-vehicle GPS systems, in-vehicle Near Field Communication (NFC), IoT devices, and Artificial Intelligence (AI), ITS enable the monitoring and tracking of vehicles for Intelligent Traffic Management Systems (ITMS) or Public Transportation Management Systems (PTMS).
While intelligent transportation systems offer significant benefits, it’s crucial to acknowledge the challenges and risks they pose. ITMS provides real-time monitoring of traffic on roads and at junctions, while PTMS focus on managing transportation fleet and passenger information services. Emergency Response Management Systems (ERMS) primarily monitor the emergency responders of the smart city. The use of intelligent vehicle surveillance systems improves traffic management, public safety, and urban planning, but it also raises concerns about the data privacy and security of users and infrastructure, a risk that must be carefully managed.
Benefits
There are several benefits from the implementation of vehicle surveillance systems in urban areas and the most obvious one is a better vehicle traffic flow by using ITMS. Cameras placed strategically across the city monitor traffic to identify congested areas and road traffic incidents (e.g. accidents). Implementing dynamic traffic lights systems at junctions and temporary speed limits can improve traffic flow. Using AI, predictive traffic routing forecasts traffic bottlenecks and suggests alternative routing. The use of PTMS leads to enhanced scheduling of public transportation; for example, the arrival/departure of trains/metro at the station is synchronized to feeder buses or taxis being stationed outside the station. There is an improvement in customer satisfaction and journey planning with real-time updates for public transport. Traffic flow is also improved by monitoring of cycle and pedestrian lanes, where safer cycle lanes will encourage road users to adopt cycling in certain urban areas adapted for cycling.
There is an overall improvement in public safety by better traffic management, with better response time to emergency situations by the ERMS, such as ambulances. LPR/ANPR (Licence Plate Recognition/Automatic Number Plate Recognition systems and GPS tracking systems in cars allow the monitoring of vehicles while they are located withing the bounds of the smart city. Stolen or wanted vehicles can be detected and followed through the city. The use of surveillance cameras, LPR/ANPR systems and GPS tracking can improve identification of criminal activities, which should enhance the response of law enforcement. Under-Vehicle Surveillance Systems (UVSS), which are cameras placed at strategic places on roads in the city take pictures or videos of the underside of vehicles to check the chassis for stolen cars. UVSS can also be used to detect contraband at ports or entry/exit points in smart cities.
The use of LPR/ANPR systems ease the management of Low Emission zones, which are areas where low emission vehicles (e.g. electric or hybrid vehicles) can circulate without charges and vehicles with higher emission rates have to pay an hourly or daily charge. The implementation of Low Emission zones can bring environmental benefits. The improved traffic flow in the urban areas can also lead to environmental benefits with less emissions in traffic jams and long traffic queues at junctions. Apart from environmental benefits, there are economic benefits linked to better health and overall happiness of citizens and visitors.
Risks
Several risks are associated with the amount of data collected from the vehicle surveillance systems. The main concern is the privacy of the smart city’s car drivers and car owners. Vehicles and their drivers are tracked everywhere they travel around the city and the speed they travel. This can lead to tracking drivers and without proper legal frameworks, the data collected can be used to encroach on the users’ privacy. The large amount of collected and stored data can be quite attractive to cyber criminals and might lead to cyber-attacks. Any data breach from these attacks might expose the personal information of drivers and their vehicles. Cyber-criminals can target the surveillance systems, for example hacking the intelligent dynamic traffic speed system and changing the traffic speed around the city.
Having video surveillance around the urban areas recording the public can lead to ethical issues. Most of the time, drivers might not have provided informed consent to participate in the vehicle surveillance systems. The lack of consent from users can lead to non-compliance with regulatory bodies and can result in legal challenges from user groups. Users need to be made aware that they are entering a vehicle surveillance zone and their data might be recorded. Vehicle surveillance systems can be used to discriminate against certain sections of the community, for example, young drivers might be unfairly targeted by the vehicle surveillance systems because they allegedly drive fast and dangerously, which allegedly cause accidents. Any cyber security attack or data intrusion can lead to users losing trust in the vehicle surveillance system.
The use of vehicle surveillance systems can benefit smart cities and enhance the quality of life of residents and visitors, but the authorities must respect the personal privacy of the public by ensuring that data are collected and processed ethically and guarded against any cyber-attack. Security policies and mitigation plans are primordial for vehicle surveillance systems.
Features
Enabling MEA eGovernment Entities to Enhance Experiences while Cutting Costs
By Uday Shankar Kizhepat, Vice President and General Manager- Middle East and Africa Region, WSO2
We live digitally. Much of our professional work is digital, as is much of our leisure time. Our commercial activity – shopping, service subscription, banking, and more – is digital. And our government is digital. No doubt governance itself requires the wisdom of individuals. But the transactional part – filing, requesting, registering, licensing, and so on – is digital. Governments in the Middle East and Africa (MEA) know they have an opportunity, with today’s technologies, to streamline transactional government functions while cutting costs.
One way to do this is to introduce digital identities. By allowing each citizen to be recognized by their “bytes essence,” public authorities open the door to transformative programs that use these trusted online personas to get things done reliably and rapidly. Many regional nations are acknowledging the potential of digital ID systems and have cultivated track records for themselves in areas such as boosted citizen engagement and enhanced accuracy of outcomes.
Digital IDs offer a practical means to ensure useability when new e-government services come online. Identity verification, service accessibility, and data protection are three major, long-standing challenges encountered by regional governments on their digital transformation journeys. The digital ID solves all of them. It offers an elegant solution to the verification issue, obviously, but its simplicity enhances accessibility, and its security features protect data.
The ’guarantee’
The digital identity may look straightforward, but its elegance is built on a toolbox of advanced technologies such as biometrics, encryption, and blockchain. These building blocks come together to give a guarantee of authenticity when an individual presents their credentials to an online gatekeeper. And we should not use the word “guarantee” lightly. It lies at the core of the viability of any authentication system offered by a government. When waved through the door, verified users can access tax history and health records. They can pay bills or register with a government agency. If verification is erroneous, a host of problems can arise.
The digital ID is a holistic, citizen-centric approach that strikes a balance between security and performance and yet does not compromise either. It eliminates bureaucratic bottlenecks and elevates the citizen experience without the public-sector agency ever relinquishing control of any part of the process. But how? How do digital IDs allow government services to operate at peak efficiency and grant seamless access to every citizen while not faltering when it comes to risk management? How do responsive, always-on services guarantee privacy and security? Well, the answer comes full circle, back to digital transformation.
Governments in the Arab Gulf region mention digital transformation frequently in published guidelines that map the way to economic diversification. These same guidelines apply to the government itself, which must set about transforming systems, processes, and functions to prepare for digital IDs and the world they promise – one in which a digital service provider can offer both seamless access and security. Complexities come from the scale and interconnectedness of operations, and the need for every shred of data, every machine-to-machine process, and every user session to be secure. Regulatory obligations must be juggled with budgetary constraints while technology leaders play intermediary to vying stakeholder factions within the organisation. It is easy to see how challenging it might be to maintain interoperability and data-sharing in such a fraught environment.
Of course, none of this will deter government organisations in the MEA region. They know what the hurdles are, but they also know what is to be gained – smoother services that cost less to provide while engendering greater citizen trust and in fact are leading the way in some of these digital initiatives. Remember, regional governments also know that the expectations of their citizens have, in a very real sense, undergone a digital transformation of their own.
Success stories
If we cast our eyes around the region, we can see digital ID-centric transformation in action already. Some government organisations in the Middle East have introduced biometric facial recognition as part of digital identity phase-ins and are using the system for secure digital document storage. Also in current use are systems that allow single, mobile-based logins. In these countries, the government’s identity access management (IAM) system undergoes a sweeping overhaul that allows the unification of credentials data to provide secure digital identity.
In the Asian subcontinent, we find a government that directed its telecoms ministry to build a national information exchange layer using an API. Strict identity management was rolled out as part of this ambitious project. With digital identity in place, the government can enable slicker collaboration between its departments and enhanced efficiency in outputs. It can do all this while optimising data access and consumption, which empowers analysts to deliver more actionable insights to stakeholders across agencies and ministries.
In Africa, one country showed its peers how an integrated identity and access management solution can be used for risk-based authentication, single sign-on, multi factor authentication, and user self-service. The solution was designed to minimise the risk of identity theft, but it was also (through single sign-on) able to reduce complexity when onboarding and offboarding users.
Conflict resolved
If digital solutions are the future of government, then digital identity is the future of public-sector cybersecurity and risk management. Governments in the region have been trying for years now to transform service delivery and engender citizen trust and engagement, but security has always been in conflict with agility. Having leveraged digital identity, authorities rid themselves of the downsides and reap rewards such as those described here. These regional successes underscore not only the profound impact digital transformation can have on society, but the indispensable role digital identity will play in delivering those efficiencies in a way that promotes trust.
-
Tech News3 months ago
Denodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
Tech Interviews7 months ago
Navigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News7 months ago
Brighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign
-
Features4 months ago
Security in the Cloud Age: Combating Risks with Hybrid Cloud Solutions
-
Tech Features4 months ago
The Middle East to Lead with Next-generation Mission Critical Communication Advancement
-
Automotive7 months ago
Al-Futtaim Automotive Builds On 23-Year Legacy of Trust & Leadership in UAE’s Pre-Owned Car Market to Sell Over 25,000 Used Vehicles in 2023
-
Tech News10 months ago
Senet enters MENA’s Competitive Gaming Scene with ‘skill-to-earn’ Platform
-
Tech Features8 months ago
How Telecommunications Providers Can Best Tackle DDoS Attacks