04:25 PM
Nancy Feig
Nancy Feig
Connect Directly

IP-Based Surveillance Leads to Capture of Serial Bank Robber

IP-based surveillance leads to capture of serial bank robber.

Offering a glimpse into the future of bank security, Internet Protocol (IP)-based equipment led to the recent capture of a serial bank robber, according to Toronto-based Visual Defence. "The video surveillance system installed by Visual Defence ... allowed us to provide police investigators with high-quality images of the robbery suspect," said Zohar Hamenachem, chief security officer for Tel Aviv-based Israel Discount Bank ($38 billion in assets), in a release.

Israel Discount Bank's security system includes the Visual Defence digital video recording (DViR) platform, which integrates security systems at the bank's branches, including closed-circuit TVs and the burglar alarm system. "The system not only alerts us to potential threats, but it also automatically records all aspects of the event, from video to pre- and post-alarm reporting and response actions," Hamenachem said. "The system gives us the ability to view our response and fine-tune it for future events."

Visual Defence focuses on security convergence, integrating multiple security systems into one solution via an IP infrastructure, says Bethany Moir, marketing manager for the company. This enables a bank's security systems, including biometrics, intrusion detection, alarms and transactional data, to interact with each other over public networks and enhances functionality, she explains.

For example, one of Visual Defence's converged solutions allows banks to automate event-response procedures using a flow chart tool, Moir adds. "The flow chart is then translated into step-by-step instructions for the operator to follow when an event occurs," she says, noting that "all of the operator responses are recorded" for future evaluation. In addition, as banks look for additional return on their investments, they can tap IP-based cameras to measure the effectiveness of a marketing campaign, Moir says, observing the number of people who pick up product information from an in-branch display, for example.

More Control and Flexibility

IP-based security cameras and systems give banks a command and control aspect they don't have with analog, says Jeff Vining, research VP at Stamford, Conn.-based Gartner. For example, a command center can have central control over all the cameras in the network and can easily pinpoint where there is a security breach, he explains. Additionally, IP-based security systems offer much more scalability compared to analog cameras, he says, noting that they're also less expensive because they lack expensive cabling.

According to Vining, IBM (Armonk, N.Y), Cisco (San Jose, Calif.) and Mobotix (Kaiserslautern, Germany) now offer IP-based video surveillance and security solutions. IBM offers a solution specifically tailored to banking, which it claims can provide remote video viewing from anywhere on the network, he says. But the market is about five years away from a complete IP-based security system offering, Vining asserts. He notes that the failings of IP-based surveillance lie in overloading the bandwidth.

The global market for IP-based surveillance servers and cameras will experience a compound annual growth rate of nearly 11 percent through 2009, according to New Delhi-based market-research firm RNCOS. The total market for IP-based closed-circuit TVs was about $227 million in 2005 and will reach almost $12 billion by 2010, the firm predicts.

For more, read:

IP-Based Security
Traditionally touted for cost savings, IP-based technologies are helping banks improve performance

Top 10 Most Overlooked Aspects Of IT Security

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.