securitylinkindia

Oncam Honored with Awards

Oncam, the leading provider of 360-degree video capture and business intelligence technology has been honored with two awards as part of Retail Risks’ Fraud Awards 2017 program. Oncam, alongside partner Video Analysis Solutions (VAS), was named the winner of the Most Innovative In-store Solution for its Live Customer Occupancy Watch platform and received a ‘highly commended’ recognition in the category of Most Innovative In-store Surveillance for its one box video surveillance solution. Each year, the Retail Fraud Awards highlights advanced technologies, programs, teams and services designed to reduce retail fraud and enhance loss prevention efforts. Submissions are judged by leading retailers across the globe, including representatives from Amazon, Adidas, JD Sports Fashion, Cotton On Group, McDonald’s and more. Oncam and VAS were awarded for their collaborative effort to provide a holistic approach to customer-based analytics using Oncam’s award-winning, 360-degree surveillance solutions and VAS analytics software. The Live Customer Occupancy Watch platform uses captured video to determine customer conversion rates, high-traffic areas, customer-to-employee ratio information that can be used to boost customer service, and much more. The result is a solution that utilizes IP surveillance, along with key business intelligence capabilities that many retailers demand in an effort to deliver higher levels of customer service, operational efficiency and the protection of critical assets within a store. “Partnership is the key to our success and this award demonstrates how our focus on understanding specific retail requirements delivers real-world results,” said Scott Brothers, Executive Vice President of Corporate Development, Oncam, “We continually align ourselves with key stakeholders both on the loss prevention and retail side to understand their operation and needs. The collaboration between Oncam and VAS has grown at an ever-increasing rate to ensure we are aligned in how we support the retail community, both technically and culturally. ”

Read More

ISO IEC 27007 Standard

To continue providing the expected, products and services that we expect, businesses handle increasingly large amounts of data. The security of this information is a major concern to consumers and companies alike fuelled by a number of high-profile cyberattacks. The havoc caused by such attacks runs from celebrities embarrassed by careless photos, to the loss of medical records, to ransom threats amounting to millions that have hit even the most powerful corporations. Where such data contains personal, financial or medical information, companies have both a moral and legal obligation to keep it safe from cybercriminals. That’s where International Standards like the ISO/IEC 27000 family come in, helping organizations manage the security of assets such as financial information, intellectual property, employee details or information entrusted to them by third parties. ISO/IEC 27001 is the best-known standard in the family providing requirements for an information security management system (ISMS). It’s an International Standard to which an organization can be certified, although certification is optional. For the person charged with auditing a particular company it can be a complex process. Likewise, getting ready for a smooth audit requires preparation and attention to detail. That’s precisely why ISO/IEC 27007 Information technology – Security techniques – Guidelines for information security management systems auditing exists. It helps both parties thoroughly prepare by providing clear guidance. First published in 2011, ISO/IEC 27007 has now been updated to align it to ISO/IEC 27001:2013. It provides guidance on the management of an information security management system (ISMS) audit programme, the conduct of internal and external ISMS audits in accordance with ISO/IEC 27001, and the competence and evaluation of ISMS auditors. Additionally, it provides extensive guidance for auditing all requirements stated in ISO/IEC 27001. It’s intended to be used in conjunction with the guidance contained in ISO 19011:2011, and follows the same structure as that International Standard. ISO/IEC 27007 bring benefits to any type of business and is designed to be applicable for all users, including small and medium sized organizations.

Read More

NVIDIA’s Metropolis Software Partner Program

Presents high accuracy video analytics SaaS for smart cities at the GPU technology conference in Tel Aviv. Agent Vi™, the leading global provider of video analytics solutions has joined NVIDIA’s Metropolis Software Partner Program. Agent Vi employs NVIDIA GPUs to deliver cutting-edge intelligent video analysis via deep learning algorithms. Being a part of the Metropolis Partner Program enables Agent Vi to better leverage deep learning technology to create safer and smarter cities. Agent Vi was a pioneer in the use of deep learning technology on cloud-based GPUs for video analytics applications in the realm of surveillance. Agent Vi offers innoVi™ for smart cities – a cloud-based video analytics Software-as-a-Service (SaaS) that transforms the enormous number of cameras deployed across cities into smart IoT devices that become the core of the city’s ability to improve security, safety, and incident response. Employing advanced AI and machine learning algorithms that continuously monitor video feeds captured by the city’s surveillance cameras, innoVi for smart cities enables city authorities to become immediately aware of a wide range of events of interest as they unfold, enhancing the operator’s situational awareness and ability to dispatch the most appropriate response. The solution also allows law enforcement agencies and city authorities to make sense of massive amounts of data hidden in recorded video by utilizing advanced big data algorithms and an automated video search engine for rapid investigations. “With more than a decade of experience in deploying thousands of video analytics installations worldwide, we were among the first companies to develop deep learning algorithms utilizing NVIDIA’s cloud-based GPUs,” commented CTO of Agent Vi, Zvika Ashani, “Agent Vi delivers the highest level of automated video analysis that enables the effective management of extremely large surveillance systems, even in crowded city environments.”

Read More

MOBOTIX Wins Merlion Award

The MOBOTIX Allround Dual MI6 has received a Merlion award in the ‘Surveillance’ category at this year’s Safety and Security Asia 2017, in Singapore. The Merlion awards, which were being held for the 10th time, recognise outstanding new designs and products in the field of security and the importance of innovation. MOBOTIX and its distributor Spiraltech Pte. Ltd. showcased solutions at the show and were honoured with the Merlion Gold award. “We are proud to have been presented with a Merlion Award for the MOBOTIX M16 camera for the third time in 5 years. It is a well-deserved recognition of our position as market leader, and of the innovation and flexibility of MOBOTIX technology,” says Ryan Fairclough, Sales Director for MOBOTIX Asia-Pacific. The robust, weatherproof MI6 with interchangeable sensors is part of the new Mx6 camera line, the most powerful and flexible MOBOTIX camera system yet, which was released earlier this year. The first MOBOTIX camera to support the H.264/ ONVIF industry standard, it comes with a dual core processor architecture, allowing it to deliver twice as many images per second as before, at the same resolution, and frame rates up to 34 frames a second. Not only is the camera faster, but it also has greater capacity for additional software applications such as 3D motion analysis or number plate recognition.

Read More

GJD at ‘Creating a Security Culture’ Programme

GJD features in the ‘Creating a Security Culture’ programme, introduced by national newsreader Natasha Kaplinksy. The Security Institute and ITN Productions partnered to produce the programme in a news and current affairs style. ‘Creating a Security Culture’ was launched at the Security Institute Annual Conference, on 3rd October 2017 at Armoury House in The City of London. Security affects everyone on a daily basis. The ‘Creating a Security Culture’ programme looks at how and what makes us feel safe online, in the workplace and during a day out. Drawing upon ITN’s 60 year heritage and expertise in storytelling, the programme features key industry interviews and news-style reports along with sponsored editorial profiles from a wide range of industry experts including GJD. Mark Tibbenham, GJD’s Managing Director said, “We are honoured to have been featured in the ‘Creating a Security Culture’ programme. GJD designs and manufactures accurate and reliable outdoor security detection systems and illuminators, which prevent the crime before it happens. People prefer to know that there is an intruder at a boundary or fence, rather than an alarm of someone inside the property.” Mark continued, “Being featured will help increase awareness of the importance of external detectors and illuminators as part of a complete surveillance system.” During the programme, television presenter Jonathan Gibson interviewed some of GJD’s customers about the features, benefits and applications of using the company’s products. Director at Polhill Garden Centre, Mark Novell, discussed how the garden centre uses GJD products to protect the premises and its stock. Martin McCormick, Director of the Basson Group, which specialises in remote CCTV monitoring discussed how GJD’s IP enabled detectors are helping the company to transform site security. Dominic Obry, Managing Director of FLR Security and Stuart Tinto, Team Leader at FLR Security, specialist alarm receiving centre talked about how the capabilities of the GJD range enables the company to monitor effectively, whilst reducing false alarms. Tony Lloyd, Managing Director of Lloyd Asset Protection discussed how GJD’s Laser products create virtual ceilings to protect sensitive sites such as prisons and airports from increasingly popular drone intrusion. External detectors and illuminators are an excellent and essential component to security systems. ‘Creating a Security Culture’ highlights how GJD’s state of the art technology is beneficial for a wide range of industry sectors.

Read More

PKI to Accelerate IoT and Cloud Adoption

From VPN to email to cloud and now IoT, digital transformation has ushered in powerful new applications for PKI. The results of Thales third annual 2017 PKI Global Trends Report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals the Internet of Things (IoT) is playing an increasingly important role in influencing public key infrastructure (PKI) planning and usage. PKIs, widely used for authentication, digital signing, and encryption, are considered a core service supporting many different use cases and applications. While a majority (54 percent) of respondents believe cloud-based services is the most important trend driving the deployment of applications using PKI, 40 percent also cited the IoT – a number that has doubled in the past three years. The findings, which reflect the responses of over 1,500 IT security practitioners worldwide, paint a picture of technological evolution and some uncertainty, but also opportunity: In the next 2 years, almost half (43%) of IoT devices will use digital certificates for authentication. 43% of respondents believe PKI deployments supporting the IoT will be a combination of cloud-based and enterprise-based PKIs – a number that reflects the scale of the IoT and resulting scale of PKIs issuing certificates for it. Over one-third of respondents (36%) cite new applications like the IoT as the fastest growing area of PKI evolution (a number that has almost tripled since 2015). On average, PKIs support more than 8 different applications within a business; SSL tops the list, followed by VPNs, public cloud apps, and device authentication. Almost two-thirds of organizations now report having a PKI and 36% of respondents use hardware security modules (HSMs) to protect their PKI Dr. Larry Ponemon, Chairman and Founder of The Ponemon Institute said, “Last year, we underscored that it is hugely important PKIs be future proofed – and we still stand by that recommendation. Not only are PKIs a core enterprise asset, but they are playing an increasingly important role supporting certificate issuance needs for cloud applications and the IoT. Smart organizations have determined that successful IoT deployment rests on trust being established from the beginning, and they’re leaning on their PKI as one component for building that trust.” PKI is an established technology which is well-positioned to address growing authentication needs and challenges as we embrace cloud applications and the IoT. While the sheer number and types of IoT devices pose security and interoperability challenges, authentication is a critical building block in transforming trust from an IoT barrier to an IoT enabler. One way a root of trust can be accomplished is through HSMs, which are high-assurance sources of credentials for both IoT and non-IoT applications. In the years to come, we expect to see even more HSM deployment and other indicators of higher PKI security maturity to help underpin the digital transformation of enterprises – John Grimm Senior Director Security Strategy, Thales e-Security  

Read More

CyberArk Associates with Puppet

CyberArk that protects organizations from cyber attacks across the enterprise, into the cloud and throughout the DevOps pipeline, has associated with Puppet as an advanced technology partner. They are working together to create supported modules that provide automated, enterprise-grade protection of secrets and are seamlessly integrated with Puppet’s configuration automation, enabling secure, high-velocity DevOps  workflows. In dynamic DevOps environments, tools, scripts and applications/ services are constantly being created, used and disabled. Each step requires secrets, including SSH/ API keys, passwords and certificates, which regularly go unchanged or revoked, or may not be available for a range of reasons, making the application unable to run or run properly. Because these accounts provide access to sensitive resources, they are a prime target for an external attacker or malicious insider to facilitate enterprise-wide cyber attacks. CyberArk Conjur is the only platform-independent secrets management solution that allows organizations to integrate secrets management and machine identity security into their projects with minimal effort. It is specifically architected for containerized environments and can be deployed on premises or to any cloud at massive scale. “This integration balances security and productivity by allowing Puppet users to continue to work within the familiar Puppet interface to secure and manage secrets used by Puppet Masters, nodes and users,” said Tim Zonca, Vice President of Business Development, Puppet, “The integrated solution provides security with a strong authentication mechanism for machines before granting secrets, as well as implementing least privilege for nodes.” CyberArk Conjur allows DevOps teams to integrate security best practices into their cloud-native application development projects with ease, while giving security teams assurance that security and compliance best practices are being applied to these dynamic environments, without creating new security silos. “The CyberArk Conjur module for Puppet is designed with both DevOps users and security teams in mind. It provides visibility and flexibility for Puppet secrets workflows and users can view and manage host accounts maintained by Puppet,” said Adam Bosnian, Executive Vice President, Global Business Development, CyberArk, “The integration with Puppet furthers CyberArk’s commitment to automating secrets protection and makes it easier for organizations to recognize the benefits of using Puppet to improve productivity without changing the way developers work.” As part of this integration, Puppet is also joining the CyberArk global technology partner program that brings together enterprise software, IT security and service providers to build on the power of privileged account security to better protect customers from cyber threats across multi-platform environments. CyberArk recently joined Puppet’s Technology Alliance Partner Program (TAPP).

Read More

SIL4 Certification for Artesyn Platform

Artesyn Embedded Technologies announced Safety Integrity Level 4 (SIL4) certification for the Artesyn Embedded Computing, Inc., including ControlSafe™ Carborne Platform with Carborne Computer and Carborne Software. Rail network integrators and operators can save a significant amount of time, cost and risk associated with the system development and certification process for rail safety applications by using a SIL4 certified commercial off-the-shelf (COTS) platform. Certified by TÜV SÜD, one of the most trusted certification bodies worldwide, the ControlSafe Carborne Platform is a fail-safe and fault-tolerant computing platform designed for a wide range of train control and rail signaling applications, especially on board applications such as automatic train protection (ATP), automatic train operation (ATO), and positive train control (PTC). The new platform can also be used in wayside train control and rail signalling implementations. Housed in a compact 4U chassis with front access I/O and a DC power supply, the ControlSafe™ Carborne Platform can accommodate up to 12 I/O modules and a variety of I/O types. An innovative data lock step architecture, used in all Artesyn ControlSafe Platforms, allows customers to make seamless technology upgrades while a hardware-based voting mechanism maximizes application software transparency. The ControlSafe™ Carborne Platform leverages the same safety architecture and technologies as Artesyn’s ControlSafe Platform, ControlSafe Expansion Box Platform and ControlSafe Compact Carborne Platform providing an application-ready and cost-effective common platform to enable a variety of applications through the integration of Artesyn I/O modules. In addition, Artesyn offers customers the flexibility to develop I/O modules and specify I/O backplane connectivity to meet their specific needs by providing all necessary technical specifications, product support and service. The first three platforms in the portfolio have now been certified to SIL4, while SIL4 certification of the ControlSafe Compact Carborne Platform is planned.

Read More

OT-Morpho Becomes IDEMIA

The result of the merger of Oberthur Technologies (OT) and Safran Identity & Security (Morpho), the OT-Morpho group recently became IDEMIA. The group’s ambition is to empower citizens and consumers to interact, pay, connect, travel and even vote securely while taking advantage of the opportunities of an increasingly connected world. At an event that brought together nearly 2,000 guests at the Seine musicale (an iconic cultural venue in the west of Paris, France), Didier Lamouche, Chairman CEO of OT-Morpho, officially renamed the group IDEMIA. In a world directly impacted by the exponential growth of connected objects, the increasing globalisation of exchanges, the digitalisation of the economy and the consumerisation of technology, IDEMIA stands as the new leader in trusted identities placing ‘Augmented Identity’ at the heart of its actions. As an expression of this innovative strategy, the group has been renamed IDEMIA in reference to powerful terms – Identity, Idea and the Latin word idem, reflecting its mission to guarantee everyone a safer world thanks to its expertise in trusted identities. This event furthermore provided an opportunity to discover all of the group’s latest innovations. These include the automated air passenger boarding process, the new generation biometric payment card, and embedded security systems to equip the connected cars of tomorrow. Supported by a workforce of 14,000 employees from all over the world, including 2,000 in the Research and Development department, IDEMIA is the result of the merger between OT and Morpho completed 31 May 2017. Today a leading player in the identification and authentication sector, the group serves clients in 180 countries and provides services to five main customer segments – financial institutions, mobile operators, connected objects, citizen identity, and public security. “Our future will be built through innovation and disruption which will revolutionise our daily lives. Our vision when we merged OT and Morpho was to build a new offer capable of revisiting the world of digital security. And this is what the creation of IDEMIA has achieved. Thanks to our talented people and the solutions they invent, citizens and consumers can now connect, interact, exchange, pay, travel or even vote in total confidence, drawing on the benefits of a connected world,” explained Didier Lamouche, CEO of IDEMIA, “The accomplishment of this promise is what we call Augmented Identity. It is about using the biometric characteristics of each person as a unique signature of individual identity, thus facilitating exchanges. It fosters confidentiality and trust and guarantees secure, authenticated and verifiable transactions. This is a decisive step towards a more frictionless, safer world.”

Read More

Bringing Aimetis under the Senstar Brand

Senstar announced the beginning of a transition period to bring Aimetis under the Senstar brand. Senstar acquired Aimetis in April 2016. Since that time the two companies have worked in parallel to continue to provide market-leading PIDS and VMS solutions, but over the coming months, Senstar and Aimetis will become one company, resulting in reduced complexity, improved performance, and unified support. “Bringing together the PIDS expertise of Senstar with the VMS and analytics knowledge of Aimetis enables us to offer an unrivaled range of innovative security solutions and world-class support,” said Senstar President Brian Rich, “Throughout the transition period we are committed to ensuring as little disruption as possible to our business. Our customers and partners can expect the same accessible, responsive and flexible sales and support they have always relied on, and to be well-informed regarding any changes that may affect them.” The combination of PIDS and VMS addresses a growing trend in the security industry to reduce complexity by enabling customers and partners to source comprehensive security solutions from a single provider, resulting in reduced costs and greater accountability. Senstar also introduces the integration of its Network Manager alarm reporting system and Symphony VMS (formerly Aimetis). Network Manager is a software gateway that allows communication with a wide array of Senstar sensors, including FlexZone®, FiberPatrol®, OmniTrax®, and UltraWave™. Symphony, the new benchmark for intelligent video management, is an ideal software solution for recording, monitoring and analyzing video from both single server installations and multi-server deployments. The integration enables Symphony to receive the full range of alarm and status information from Senstar sensors via an IP connection. For each sensor alarm the full range of Symphony’s security responses can be initiated, including commanding camera actions and providing visual and audio alerts.

Read More