securitylinkindia

Identiv’s Intelligent Temperature Datalogger Solution Wins Best New Product at 11th Annual RFID Journal Awards

Identiv, Inc. has recently announced the company’s next-generation uTrust Sense temperature tracker solution has won ‘Best New Product’ in the 11th Annual RFID Journal Awards during RFID Journal LIVE! 2017. The end-to-end solution includes a low-cost, secure, portable smart sensor label that tracks and stores temperature readings, and can be read locally by near field communication (NFC) readers including mobile devices, and can be uploaded to the Internet for analysis. “The scope of projects expands each year as the technology matures,” said Mark Roberti, Founder and Editor, RFID Journal, “In many cases, the technology is being used in mission-critical applications and delivering incredible benefits. Attendees at LIVE! 2017 will benefit from hearing about these deployments and seeing the products chosen as among the best this year.” Identiv’s uTrust Sense temperature tracker Datalogger solution monitors and tracks temperature-sensitive products for cold chain applications, smart packaging, government use cases, medical products and pharmaceutical logistics, and other fragile goods. The precise temperature accuracy of the tag makes it ideal for use with perishable goods, including fresh fish, caviar, wine, blood, vaccines, flowers, and more, protecting product and brand integrity and profits, while significantly minimizing costs for the shipper, receiver, and customer. The data can be read locally by a mobile device or uploaded to the cloud for analytics and remediation. “Identiv is thrilled to accept the award for ‘Best New Product’ during the 11th Annual RFID Journal Awards,” said Stephane Ardiley, Identiv Director of Product Management, “This compact, complete sensor solution for the Internet of Things (IoT) empowers businesses by providing a low-cost, self-adhesive temperature monitoring solution for virtually anything and protecting data integrity.”

Read More

Cybersecurity Product Suitefor New Ram Compound

Cyberbit to provide Cybersecurity Product Suite for Israel’s first secure-by-designGovernment facility Cyberbit, the wholly owned subsidiary of Elbit Systems, whose cybersecurity solutions protect the world’s most sensitive systems, has been selected by the Arison Group – Solel Boneh Infrastructure, one of Israel’s most prominent construction and infrastructure companies, to provide its cybersecurity product suite for the new Ram Compound, an ultra-secure facility under construction in the Israeli capital. The Ram Compound will serve as headquarters for sensitive government ministries and will integrate physical and cybersecurity to achieve unprecedented resilience. Deloitte was contracted to lead the cybersecurity aspects of the project. The team performed comprehensive hazard analysis to determine the core elements of the IT and operational (OT) infrastructure that must remain operational to survive an attack. The analysis was then used to define the cybersecurity requirements for ensuring undisrupted operation of these core assets. Deloitte selected the entire Cyberbit product suite to provide integrated security across the converged network. “Attackers are always looking for the weakest link to exploit, so security must be implemented seamlessly across both the IT and OT networks,” said Lior Kalev, Information Security Expert and Head of Cyber Risk Services at Deloitte, “We selected Cyberbit due to the technical superiority of its portfolio and ability to provide integrated, end-to-end cyber security across the entire IT/ OT stack.” “Physical and cyber security are blending,” explained Cyberbit CEO Adi Dar, “The most severe cyber-attacks are those that move from the IT realm into the physical. This project, with Deloitte and the Arison Group, is an extraordinary opportunity for collaboration of domain leaders to build a first-of-its-kind secure facility.” The Ram Compound will implement the following Cyberbit products: ●    EDR – Endpoint detection and response protecting against advanced and targeted threats, including ransomware, and providing advanced forensics and threat hunting tools. ●    SCADAShield – Visualization of the OT network to detect continuity and security risks in real time. The facility’s cyber security team will train in a local training center powered by the Cyberbit Range, the most widely deployed cybersecurity training and simulation platform. Created to protect the most high-risk organizations in the world, Cyberbit secures enterprises and critical infrastructure against advanced cyber-threats. The company’s battle-hardened cybersecurity solutions detect, analyse and respond to the most advanced, complex and targeted threats.

Read More

New Momentum forPPE Sales in a Digital World

Everything will revolve around safety, security and health at work in Düsseldorf during 17 to 20 October 2017 when trade visitors from all over the world will meet for the A+A International Trade Fair with Congress at the exhibition Centre. A+A 2017 will present the world’s latest trends and products in the fields of safety at the workplace, health promotion at work and security management in companies. Exhibitors to the tune of 1,900 will take part in the trade fair where companies from all continents have registered. Those coming to A+A in Düsseldorf in October will experience an industry in growth. The market for personal protective equipment is considered especially dynamic which currently boasts a volume of some EUR 18 billion worldwide: 38% of this (EUR 5.8 billion) are accounted for by EU markets, EUR 1.8 billion by Germany alone. Experts expect the market to continue growing. At A+A 2017 international specialist retailers for personal protective equipment will find a complete overview of innovations and new impulses for their business. The event will also conduct the pivotal international PPE specialist conference entitled ‘New Momentum for PPE Sales in a Digital World’ on 18 October. The conference will take place from 9.00 am to 2.00 pm at Congress Center Süd (CCD. Süd) at Düsseldorf exhibition center, where eminent speakers from Amazon Business, Lyreco, Kübler, Uvex Safety Group and Zamro to name a few companies, will deliver their viewpoints. The Employers’ Liability Insurance for the Construction Sector will discuss with specialist retailers from throughout the world the challenges posed by the speedy growth of e-commerce, in particular. New regulations governing PPE and cooperation possibilities between manufacturers and dealers also feature on the agenda. The lectures of the international specialist trade conference will be in English. Tickets cost EUR 110 online, and EUR 135 on site in Düsseldorf. Tickets include participation in all lectures of the specialist conference, a snack lunch and admission to A+A 2017.

Read More

Axis Awarded Gold Govies Government Security Award

The AXIS Q8631-E PT thermal network camera took home a gold win in the video surveillance cameras IP category of the 2017 Security Today Govies Government Security Awards Axis Communications has recently been honored by Security Today magazine as a gold winner of The Govies Government Security Award for 2017 for its AXIS Q8631-E PT thermal network camera in the video surveillance cameras IP category. The awards honor outstanding government security products in a variety of categories. Platinum and gold designations were announced during the ISC West Expo, Las Vegas. Designed specifically for the most challenging conditions, the AXIS Q8631-E PT thermal network camera is equipped with pan/ tilt mobility reducing the number of fixed thermal cameras needed to cover a single area. The AXIS Q8631-E also offers shock detection, which sends an alarm if it detects vandalism. The thermal imaging allows users to see people and objects more clearly in a variety of light conditions, from pitch dark areas to a sunlit parking lot making it perfect for outdoor installation. Additionally, its Arctic Temperature Control allows the camera to safely start up and operate in temperatures as low as -40°C/ °F and up to 55°C/ 131°F. “At Axis Communications we understand the unique needs and challenges associated with securing government facilities and strive to create products that adhere to those needs,” says Fredrik Nilsson, Vice President, Americas, Axis Communications, Inc, “Receiving a Gold Govies Award is wonderful recognition for the hard work we put into creating quality products and solutions for our many government customers.” “The Govies is an amazing product recognition program whereby companies in the security industry can highlight their technology and solutions that work flawlessly within the government vertical,” said Ralph C. Jensen, Editor in chief of Security Today magazine and securitytoday.com, “We received 28% more entries this year, which also corresponds to the need to provide better security options not only at the federal level but also at the state and municipal level of government. I believe these products and solutions only prove that the government relies heavily on the technology advances in the private sector.” An independent panel of judges from the security industry selected the top entries in the 2017 categories and named them winners using criteria including features, innovation, user friendliness, inter-operability, quality, design, market opportunity, impact in the security industry, technical advances, and scalability.

Read More

Hikvision & SGS Sign Memorandum for Joint Lab Collaboration

Hikvision, the world’s leading supplier of video surveillance products and solutions, and SGS, the world’s leading inspection, verification, testing, and certification company, have recently announced that they have signed an agreement for joint laboratory collaboration. The memorandum will pave the way for joint efforts in testing, inspection, verification and certification of Hikvision products. It will also see the two companies cooperating strategically in various areas including mutual technology exchange, training, information sharing and platform establishment. As a true manufacturer, product quality is of the utmost importance for Hikvision. Over the past few years, the company has stringently conducted testing processes on every product series and closely collaborated with SGS to optimize procedures. The joint laboratory marks the deepened collaboration between the both parties. With the expertise and knowledge of SGS, Hikvision aims to improve its product testing efficiency and capability to a new height, further responding to industry demands and satisfying customer needs. “SGS actively participates in the formulation of global standards and regulations. It has deep understanding and insight in these fields and the global market trend. We rely on our professional technical team and their rich experience who will assist Hikvision in the improvement of their product quality and competitiveness in the security market,” said Laurence Kwan, Director for Electrical and Electronic Business at SGS Asia-Pacific. SGS is the world’s leading inspection, verification, testing, and certification company. With more than 90,000 employees, SGS operates a network of over 2,000 offices and laboratories around the world. SGS-CSTC Standards Technical Services Co. Ltd. was founded in 1991 as a joint venture between SGS Group and China Standard Science and Technology Group.

Read More

BSIA Saddened by Manchester Terror Attack, Praised Private Security Personnel

The British Security Industry Association has issued a statement in reaction to the terrorist attack that took place in Manchester, on 22 May 2017. “We at the BSIA were saddened to hear of the recent horrific terrorist attack in Manchester, and would like to praise the quick actions of the private security personnel, who would have been among the first to respond to this incident, placing themselves at considerable risk in doing so. “In times of emergency and in day-to-day operations, private security personnel provide essential support to local police forces, and are often the ‘unsung heroes’ helping to ensure the continued safety and security of the British public. “Their ability to provide this vital service is thanks to the mandatory training they receive as part of our industry’s important licensing and regulatory regime, which plays a crucial role in making sure that private security personnel have the necessary skills and knowledge to support police and emergency services through even the most challenging situations. “Of course, our thoughts go out to the victims, their families and the city of Manchester at this difficult time.”

Read More

Two Things to Demand from the Access Control Provider

In today’s highly competitive environment, it is extremely important that providers have both the experience to deliver the right solution and the ability to deliver strong customer service. In the security industry, one solution in high demand is the use of mobile apps for critical functions such as credentialing, remote operations and alerts. Mobile credentialing frees the user from having to carry physical credentials such as tokens or ID badges. Further, mobile access control solutions are well-suited to applications that experience numerous spontaneous events such as lockdowns or weather related emergencies, or with a frequent need to activate/ de-activate access card holders. Key points include: Security: Security has always been a fundamental part of mobile operating systems, and the encrypted security of smart credentials and/ or door management apps makes them more secure and difficult to counterfeit. Mobile devices often require multifactor authentication while traditional access control devices do not. Convenience: Mobile users can control their facilities and access timely information from wherever they are. This is important for emergency situations, and convenient for other scenarios such as activating or deactivating credentials. Mobile credentialing provides, even more, convenience, with new readers that can accept both proximity cards and mobile credentials speeding the transition to mobile technology. Increased integration: With mobile technology, one credential allows access to doors, data and cloud applications, with security and tracking incorporated into every user action. This high-level integration can also be used to trigger automated tasks like time and attendance recording. Cost: Maintaining a physical and logical access control system with disparate applications can be costly, particularly when updates are implemented and integration must be performed across all systems. A physical access control system with mobile credentialing can be easily upgraded to add logical access control for network log-on. For card-based credentialing, material costs must be considered as well; digital credentials have no material cost. Still, users may not get the most out of their system if the provider does not have a customer-focused culture. At a minimum, providers should offer flexibility, post-sales support, availability, expertise and training. Flexibility: Recognizing that off-the-shelf solutions are hardly sufficient for addressing the specific requirements of every installation, customer-focused providers are willing and able to accommodate customization. Post-sales support/ training: The reality of access control systems is that – like any solution – they require ongoing service, support, and training to provide customers with the continuous, reliable operation they need. One true measure of a vendor is what they can – and will – do to address and accurately fix any issues in a timely manner. Post sales training is also key to assuring the customer knows how to best manage their system in multiple languages. Availability: In today’s connected world, customers have a wide variety of ways to contact a provider, all of which are irrelevant if they can’t actually connect with the vendor. Delays compromise security, so customers deserve a specific person they can rely on when they need help the most, often when something goes wrong and requires immediate attention. Expertise: The expertise and experience of customer-focused organizations can help end users make better and more confident decisions about an access control installation. When combined, customer service and mobile technology offer tremendous potential for maintaining the safety and security of people, places, and assets. Your chosen provider should be able to deliver to you the latest in mobile technology plus a commitment to the best possible customer service. Robert Laughlin, President, Galaxy Control Systems

Read More

Distributed Cybercrime Attack the World

Ransomware and banking Trojans dominate the cybercrime mainstream today, and their technical operations are heavily analyzed. But little attention has been given to the business model which plays a large role in dictating their behavior, targets, and tactics. A revolutionary concept in cyber crime is what I call ‘distributed cybercrime,’ a business model in which cyber criminals attack many victims in the same campaign. Like many other inventions now common in modern life, distributed cybercrime may seem trivial today. But this concept emerged little more than a decade ago and has already dominated the threat landscape. Improved ROI and the support of a newly erected ‘dark industry’ has made distributed cyber crime the hottest trend in cybercrime. Most of the professional cyber criminal groups today develop malware with a distributed business model, then use professional platforms, distribution services, and infection experts to attack the world. They don’t know who their victims are nor do they care. They’re not looking to get points on style. They’re just businessmen who built the perfect, automated money-making machine. 6 Reasons why cybercriminals love the new business model Beginning in 2006, innovations in malware, banking Trojans and ransomware created a new type of business model for cybercriminals: rather than concentrating all their efforts on penetrating high-quality targets, they can steal small amounts of money from numerous victims. The business model of distributed cyber crime has made some attackers multi-millionaires in a short amount of time due to its many business benefits: 1.    Attacks require less effort as they target ‘low-hanging fruit’ (i.e., individuals or organizations with sub-par security). 2.    Attack skill level is low compared to techniques such as spear-phishing – regular ol’ phishing is good enough for weak targets. 3.    Highly coveted zero-day vulnerabilities are no longer required for profitable attacks – mainstream CVE vulnerabilities with known exploits and existing patches will do, as many victims don’t patch regularly. 4.    Any standard endpoint is a potential source of revenue, making a lateral movement toward the crown jewels irrelevant. 5.    When you attack the world, the sky is the limit – the amount of potential revenues is endless. 6.    Less effort and more profit mean better ROI. Mass distribution, victim profiling, and outsourcing The new business model presented new challenges for cyber criminals. If you want to become filthy rich through distributed cybercrime, you can’t just attack 100 victims – you need to attack hundreds of thousands of victims. This drove professional cybercriminals to build mass-distribution platforms to spread their malware and automated-infection systems to exploit victims’ machines and run the malware. But the quantity of traffic is not enough. Victims must fit a desirable profile. Cyber criminals want to avoid targeting low-income victims with ransomware as they’re probably less able to pay the ransom, and the ransomware’s language should match the victims’ language to ensure instructions on purchasing bitcoin and paying the ransom are understood. Mass distribution experts and traffic dealers offer their shady customers this very type of targeted services. In addition to victim-specific traffic, infection services are also up for sale (or more commonly, for rent). Rather than coming up with new or unique exploits, pre-packaged exploit kits are readily available to launch the attack of your choosing. These kits supply the distribution and traffic services mentioned above, to use the best exploits available to infect victims’ machines and, if successful, run the customer’s malware. The exploit kit method essentially outsources distribution and infection to reliable, high-quality service providers at an affordable price. Where have all the targeted attackers gone? You may ask yourself: what happened to targeted attacks? The answer: absolutely nothing (and thank you for asking). In fact, targeted attacks today are easier than ever, as demonstrated by cyber attackers who do care about the identity of their victims (like nation-states). Targeted attacks did not disappear – they’ve only been eclipsed by the attractiveness of the ROI of distributed attacks. Only when the profitability of targeted attacks can compete with the distributed cybercrime business model will we see their rise to prevalence again. There are initial signs that cybercriminals are testing targeted attacks with malware more commonly used for distributed attacks, as evidenced by recent ransomware attacks on high-quality targets such as hospitals and hotels. The problem comes back to ROI: while cyber criminals demanded up to $5M ransom from one victim, the highest ransom paid by a single victim (as far as we know) was a meager $28K. The next big thing What’s next for the innovative cybercriminal? My Prediction: a hybrid business model with tailored ransom pricing. Imagine a mass-distribution platform doling out ransomware on a global scale that, when executed, will assess the victim’s environment. If that environment is a consumer’s machine, the calculated ransom will be relatively low; if it’s an enterprise network, considerably higher; if it’s critical infrastructure, astronomical. Whatever the next big thing is in cyber crime, you can be sure it will be driven by ROI – nothing dictates the dark industry more than these three simple letters. Tal Sheffer, CTO, Skybox Security

Read More

The Benefits of Safe Cities

Safer Cities Creating a Better Life For the first time in history, there are more people around the world living in cities than people in rural areas. While the global migration to urban areas is improving their living standards, health, and financial prosperity, it also brings challenges to a city’s infrastructure, resources, security procedures, and emergency response systems. Meeting these challenges will be critical to the success of cities in the decades that follow. The safe city concept has been developed precisely to help government stakeholders, city mayors, and police departments mitigate these challenges. Leveraging the internet of things (IoT) and the connectivity now found in core security and safety technologies, safe city solutions are providing a range of systems including predictive analytics and big data, real-time response procedures and emergency response systems. These solutions are enabling governments and police departments to better protect their citizens from everything from terrorist attacks to natural disasters. They are also supporting wider city organizations such as public health, fire and rescue, border control and social services to better serve their citizens. Safe cities create a better life The safe city concept is based on a consolidated ICT platform which combines public-safety information of different types and from different sources, obtained through sensors and multi-agency collaboration. Safe cities are an essential pillar supporting the development of smart cities throughout the world. They provide the security and safety required to protect citizens from crime and terrorism as well as mitigate, as much as possible, the impact of natural disasters and other threats. A successful safe city solution should support a city’s security agencies, fire and rescue departments, public health and social service departments before, during and after an event, and integrate the disparate technologies and government departments responsible for citizen safety.he safe city concept is based on a consolidated ICT platform which combines public-safety information of different types and from different sources, obtained through sensors and multi-agency collaboration. Four major requisites Prevention: It provides reliable and comprehensive security measures to predict threats and hazardous situations. City authorities must be able to take measures to prevent threats from occurring in the first place. Simulation and forecasting technology, based on big data mining, can help the relevant authorities to predict public threats and support police and military assets to prevent the event before it begins. Detection: It aids to public-safety organizations in collecting, sharing and analyzing data more effectively to provide early warnings and raise situational awareness. Sensor systems in the city will proactively gather information. These sensors may include video surveillance cameras, CBRNE (Chemical, biological, radiological and nuclear) sensors, gunshot-detection sensors, and weather sensors. The type of sensor used is determined by the scope of the safe city project and how much inter-operability is required. Information can be used to provide early detection and alerts when events occur. Increasingly, sensors include ‘listening’ to social media for relevant posting by netizens. Response: It enables the key organizations in the city to react to security threats in real time. City authorities must be able to prevent an adverse event from escalating. Safe city projects enable an effective response by using a consolidated ICT platform to provide a common operational picture to all relevant agencies, including law enforcement, public health, fire and rescue services; and to allow the critical communication systems of these agencies to inter-operate. This helps to raise the situational awareness for each of the responding agencies, and their command, control and coordination. Recovery: It provides post-event examination and analysis, identify victims and provide assistance in rescue actions. After an event, city authorities must be able to quickly examine and analyze all data received from the relevant sensor systems. This supports the subsequent search for suspects as well as the process of building a case based on incriminating evidence. Information can also be used to facilitate rescue actions, and the identification and assistance processes for both victims and survivors. Integration The safe city concept typically promotes inter-operability across law enforcement, emergency services and other government agencies (public health, border control, social services) to streamline operations and provides ‘situational awareness’ to all stakeholders involved in the management of a city’s security. This approach fosters better cooperation and sharing of intelligence. While much of the emphasis of the ‘safe city’ discussion involves security technology implementation and investment, the operational procedures and ICT backbone are just as important in the solutions’ ultimate success or failure. This reality means that ICT and security agencies must work together for the greater good of the safe city project. One cannot exist without the other. The size of the city does not impede its ability to be considered a safe city but differing city sizes require different levels of technology investment, stakeholder ‘buy-in’ and planning. Safe city solutions are often layered on top of the legacy infrastructure that is in place. Overall, detailed planning around the use of legacy technology and the need for new infrastructure are key considerations when deploying safe cities. Market drivers There are a number of market drivers that government agencies need to consider when deciding how to proceed with a safe city project. These can be broadly grouped as safety drivers, social drivers and economic drivers, and the government investment in safe cities has a positive impact on each of them. Safety drivers: at its core, a safe city addresses issues related to crime and terrorism. Often, these types of incidents cause regulations surrounding data privacy and national security to shift. For instance, after the September 11th attacks, the United States Congress passed the Patriot Act, which set up fusion centers to surveil and aggregate vast amounts of data including video surveillance streams, social media, arrest records, warrants and even mug shots. These centers, now known as ‘Intelligence Fusion Centers,’ are becoming increasingly important, as agencies emphasize predictive policing. Social drivers: Political motives are a key driver of safe city projects. Politicians can use safe city initiatives to generate support in their campaigns with citizens who are concerned about…

Read More