background image
According to the new Memoori
report "Cyber Security in Smart
Commercial Buildings 2017 to
2021", the increased number of
smart devices, combined with
concerns over cyber-risk and data
privacy and more cyber attacks,
will drive the demand for new cy-
ber security hardware, software and
services in the market. Memoori
estimates that global revenues only
for smart building cyber security
will reach 8.65 billion dollars by
2021, which means a CAGR of
over 15 per cent.
Try to hack the software
Bosch is one of the companies
that has emphasised its work on
data security and has equipped its
cameras with a trusted platform
module to safely store certificates
needed for authentication and
encryption.
Boudewijn Hak, Regional BU
Marketing at Bosch says: "I think
cyber security is a big concern
because everything is connected ­
and things that are connected are
vulnerable if you do not take the
correct measures. We focus on data
security in everything we bring to
the market. We have a company
called Escrypt and they do tests
on all our products and software
before we launch it. There is a very
good test procedure for that and
they do all penetration tests on our
products."
Suprema also stresses they do
penetration tests.
HC Kim, Director of Global
Sales at Suprema says: "We have
learned to be prepared for cyber
attacks and we go through various
penetration tests with all products
we build today and we hire experts
to actually go into our hardware,
trying to break into our software to
protect and to build walls so these
devices are protected from any
external attacks."
HC Kim, says the reasons for
using penetration tests are obvious:
"Because we have software
devices that are connected to IP
connections, and any time you
have an IP connection, you have to
be aware that there are hackers that
will try to get into the system, so
we are very cautious of this."
Third party testing
Tim Biddulph, Head of Product
Management at Hanwha says
Hanwha updated and reinvented
its cyber security strategy in 2012.
­ We closed all back doors and
removed all vulnerabilities that we
could find. At that point we also
implemented third party testing,
we publish our testing criteria and
our policy on cyber security and
we have a dedicated response team
so when we find any vulnerabili-
ties, we respond within 7 days to
those and get those fixed as soon as
possible."
Tim Biddulph stresses that
if you do not have that kind of
response, things go wrong rapidly
and when they go wrong it means
that vulnerabilities can be really
broad.
He says: "They can be across
the business, they can be across the
nation, so we will have to be aware
of cyber security and everybody
has to do their part."
Genetec uses a multi
front approach.
Pierre Racz says: "It starts off by
securing our own infrastructure,
and going through all kinds of
certifications and audits to make
sure that we are doing the most
cyber responsible things to be
secure. The second thing is that
we are teaching our customers the
things that we have learned and
helping them to do something
similar. We have done a lot of
work hardening our software, but
also trying to harden the system
design, because our software
The industry's heavyweigh t players on cyber security
How manufacturers secure their products
Many companies conduct third-party tests and hire experts (hackers) to try to
break into their own products. Another important measure to make the prod-
ucts safer is to have clear procedures for what to do when a bug is detected.
is just one component in a
larger system and of course, the
criminals will go after the weakest
link."
Genetec also has a cyber emer-
gency response team that can be
used by its customers if they get
attacked.
Axis co-founder Martin Gren
says that the main way in which
Axis works with cyber security
is by educating its partners: "We
try to educate the end users and
bring them these hardening
guides, that is something we have
done for a long time, and we
also have policies when we detect
cyber issues in our products,
because like anyone who designs
big software with a lot of code,
there will be some bugs. And
what matters is to have proce-
dures when you find one of those
bugs", he says.
everyone has taken action
Vanderbilt CEO Joe Grillo says
they regularly have all of their
products checked by independent
third parties, to make sure that
they are secure. Anthony Petrucci,
says HID has an identity in access
management group that is very
focused on cyber security.
Keen Yao, Vice President for
Hikvision International Business
Centre stresses that Hikvision
started to use more complex pass-
words for their products in 2014
and that even though there will
always be bugs, you need to en-
hance research and development
investment to secure products.
Mobotix CEO Thomas
Lausten says cyber security is a
very important part for all devel-
opment at Mobotix.
" It is something that is
reflected in all our development
and testing and it is done in a
very solid German way. All test
and manufacturing is done in
Germany and that enables us to
secure a quality control", he says.
By Henrik Söderlund
Vanderbilt CEO Joe Grillo says they
regularly have all of their products checked
by independent third parties, to make sure
that they are secure.
Keen Yao, Vice President for Hikvision
International Business Centre stresses that
Hikvision started to use more complex
passwords for their products in 2014 .
We try to educate the end users and
bring them these hardening guides,
that is something we have done for a
long time, and we also have policies when we
detect cyber issues in our products.
Security News Every Day ­
www. securityworldmarket.com
d e t e k t o r i n t e r n a t i o n a l · 2 3
Security News Every Day ­
www. securityworldmarket.com
trend
cyber security
Det INT 3_17.indd 23
2017-09-07 15:56