securitylinkindia

Security and Fire Expo – South India 2018

UBM India is all set to bring in the fourth edition of ‘Security and Fire Expo (SAFE) South India’ for the first time at Hitex, Hyderabad during 28 – 30 June 2018. The expo aims to bring together renowned Indian and international brands from video surveillance, access control, entrance and home automation, and perimeter protection industry to interact, network, view latest innovations, and source and gather business solutions  and invaluable expert supports – all under one roof. SAFE South India is supported by the Electronic Security Association of India (ESAI) and Asian Professional Security Association (APSA).  Highlights: Security services revenue to reach USD1.69 Billion by 2019 Central Government has shown commitment to enhance the security budget by 35% 70 plus brands showcasing their latest technological advancements Conference on the changing paradigm in security technologies With a distinguished line up of key exhibitors and thought leaders on board, the expo will add immense value to the commitment shown by the Central Government to enhance its security budget by 35 per cent for creation of a dedicated homeland security department, developing coordinated intelligence gathering, protecting critical infrastructure and upgrading maritime security. The revenue for security services accounted for 61% three years ago in 2015, and is expected to increase to 66% by 2020. Security spending on hardware, software and services in India is expected to cross the USD 1.69 billion mark by 2019. SAFE South India will be a launch pad for security companies to introduce products in this emerging market, and establish relationships with the key decision makers. The congregation will see security professionals from across industries including security and safety managers from hospitality, IT/ BPO & service industry, real estate, port authorities, power plants, logistics, construction, architecture, automobile, manufacturing, industrial, retail, jewellery, health, education, IT, networking, telecoms, automation, BFSI etc. The 4th edition of SAFE South India has attracted prime exhibitors such as Mark Electronics Corporation, Timewatch Infocom Pvt. Ltd., RoadPoint Ltd., N S Enterprises, ACJ Computronix, Advance Infotech, WYSE Biometrics Systems Pvt. Ltd., Mantra Softech (I) Pvt. Ltd., Matrix Comsec Pvt. Ltd., Prama hikvision India Pvt. Ltd., Pictor Telematics Pvt. Ltd., Axestrack Software Solutions Pvt. Ltd., R G International, Lana Technologies Private Limited, Tekno Electro Solutions (P) Ltd., Face ID Systems LLP, HiFocus Electronics India Pvt. Ltd., Enterprise Software Solutions Lab Pvt. Ltd., Futureeye Global Technologies, CAMTECH Solutions, Dahua Technology India Pvt. Ltd., and Vamo Systems Pvt. Ltd., amongst others. The event will also be organizing a unique conference on The Changing Paradigm in Security Technologies, slated for Day one. The conference will comprise in-depth speaker sessions and panel discussions on trending subjects such as ‘Security of a New-Age City,’ ‘The Role of Drones and UAVs in Homeland Security,’ ‘Visual Analytics in Ensuring Safe Cities,’ ‘IoT and Security of Assets’ and ‘The Threat of Cyber Attacks on Surveillance Systems,’ among others.  “The expenditure on surveillance and security has been increasing in the Indian market in recent years. The government has taken various initiatives to increase security services revenue which will benefit the citizens as well as the security and surveillance services industry. After all, a modern civil city should be able to showcase seamlessly safe, smart, energy efficient and technologically advanced features.  Notably, for the first time since its inception, SAFE South India is being brought to Hyderabad as a strategy to get the show closer to the end users by rotating it across the several key Indian cities that are situated in South India. SAFE South India provides an exclusive platform for the leading players in the security industry to tap into the growing South Indian market by    forging joint ventures, partnerships/associations, sourcing, dealerships and networks.”   Yogesh Mudras, Managing Director, UBM India Pvt. Ltd.                           

Read More

Gemalto Automated Border Control in Colombia

Gemalto and INCOMELEC SAS, a Colombian partner, are transforming the immigration and border crossing in Colombia through biometric iris verification implemented by Migración Colombia, the country’s border control agency. This innovative solution was launched in February with a pilot program at Bogota’s El Dorado International Airport. The Automated Border Control (ABC), known locally as ‘BIOMIG,’ is benefiting both citizens and border officials. Gemalto’s ABC speeds identity authentication and significantly reduces bottlenecks in the immigration process while maintaining strong security control for each traveller. Gemalto ABC Iris solution secures and speeds immigration A growing majority of airport arrivals in Bogota – up to 60% – are Colombian citizens re-entering the country. This often results in long immigration queues, congested waiting areas and travel weary citizens. ‘BIOMIG’ mitigates these challenges while complying with Colombia’s stringent border control security requirements. How does it work The solution integrates a highly intuitive iris recognition terminal that allows swift long range iris capture from 35 to 45 centimetres away. This eliminates physical contact with the terminal and improves comfort and ease of use. To use the service, Colombian citizens aged 12 and older only need to visit one of 30 BIOMIG enrolment stations at the airport as they exit the country. In less than one minute, their unique iris scan is securely registered with Colombia’s Border Management System (BMS). When re-entering the country, previously enrolled citizens simply enter their national ID number on a touchscreen integrated with an automated door barrier by INCOMELEC, SAS. After a quick glance at the iris reader terminal, identity is validated via a secure digital process and the automatic doors swing open. Gemalto has supported Migración Colombia with state-of-the-art solutions for secure document authentication, biometric solutions and software integration for their border operations. “The challenge with border control solutions is to minimize and simplify immigration procedures while improving ease, speed and convenience for end users – without compromising security. This is exactly what the ABC Iris solution achieves,” said Francesc Ortodo, Sales Director for Government Programs Latin America at Gemalto, “Colombian citizens can now benefit from strong biometric security within a trusted environment.”

Read More

Dahua Goes GDPR Compliant

Dahua Technology has become GDPR compliant and received the certification for its IP video products from TÜV Rheinland just a day before the General Data Protection Regulation (GDPR) comes into effect i.e., 25 May 2018. It means that its IP products are in full compliance with GDPR. Dahua is one of the first companies on the globe which has achieved this certificate. The General Data Protection Regulation (GDPR) is a set of new law by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union. It establishes strict, high-level, wide-scope protection standards for personal data. Wherever a company is located, as long as it processes personal data of an EU citizen during the provision of products or services, it must comply with GDPR. TÜV Rheinland, an internationally renowned independent third-party testing, inspection and certification organization, held Cyber Risk Management Forum 2018 in Shanghai on 24 May 2018. The forum, started by Lutz Frankholz, Executive Director of TÜV Rheinland Greater China, is among the highest level that is themed on information risk in China and is joined by professionals from both business and academic circles. Dahua Technology participated in the forum together with many outstanding companies from multiple industries. They successfully applied for GDPR personal data protection standards and TUV Rheinland’s IoT security and privacy protection standard for products that are being shipped globally, including those that are shipped to countries and regions outside of EU. Zhang Junchang, Director of Cybersecurity Product Line of Dahua Technology, received certification towards IP video products on behalf of the company. This means the Dahua IP products are in compliance with the GDPR (EU, 2016/679) and meet the TÜV Rheinland 2PfG 2624/06.17 standard (covering IoT security and privacy protection requirements) which are world-class in information security and privacy protection. This allows Dahua Technology’s global users to enjoy surveillance products that have the same protection level as those in EU. This also means that customers who use Dahua Technology’s certified IP products are able to meet the GDPR standard. The certification procedure is closely related to the company’s whole management system. Its smooth carrying out showcased Dahua Technology’s emphasis on product quality and compliance. Dahua will relentlessly make use of its internal source as well as professional third-party partners like TÜV Rheinland to create more value to its customers and users. Dahua has also shared a white paper named ‘How Can Dahua Products Help Users Comply With GDPR.’

Read More

VIVOTEK Tackles The Dynamic Challenges At Canadian Warplane Heritage Museum

“ It is far better to face bullets than to be killed at home by a bomb,” read out a World War I poster on display at the Canadian Warplane Heritage Museum. The poster gives its visitors a glimpse of how security, from outside and from within, had been an urgent need then, and how little things have changed as more of the same is required even today, albeit in a different form. But as we near the centennial celebrations of the iconic war, VIVOTEK has ensured that at least the glorious remnants of the era are safe and secured in the museum as they once made their homeland. In a bid to enhance its security, the heritage museum has deployed VIVOTEK’s sophisticated surveillance systems to effectively counter the modern-day challenges, securing the memorabilia from acts of theft, vandalism and pilferage. The deployment has been done through VIVOTEK’s Hamilton (Ontario) channel partner and regional leader in surveillance and security systems, A. S. Security & Surveillance, Inc. Securing a space, however, is not an easy task, particularly if it is of such a massive size as the Canadian Warplane Heritage Museum. The spectacular museum, for instance, is home to about 50 aircrafts, an extensive aviation gallery, and an exhibit gallery, besides a 400-vehicle parking lot, constantly moving crowd, and specific regions with contrasting lights and blind spots which could emerge as a soft target for the masked mob that has been lately defacing properties in Hamilton. VIVOTEK has tackled the dynamic challenges presented by the museum by tightening the security framework with sixteen network cameras. This includes the deployment of IB836B-HT bullet cameras having 2 megapixel full HD sensor (with 30 meter ranged built-in IR illuminators) that leverage WDR and SNV technologies for high contrast and low light environments. These devices, being rated with IP66 and IK10 standards, can also withstand rough weather and direct impact on them. Its ND9541 network video recorder, on the other hand, is a H.265 (high-efficiency video coding) recorder that comes equipped for up to 32-channel network and 4 hard disk drives for efficient and adequate storage. The updated surveillance system at the museum also includes VivoCam Layer 2+ managed PoE switch (AW-GEV-264-370) to provide uninterrupted power backup for all cameras. The building structure also required range extension through PoE extender AP-FXC-0210 for two cameras located indoor using the daisy-chain installation. Commenting on the surveillance blueprint Anthony Stayrer, the Director of A.S. Security & Surveillance said, “In our almost a decade-long reselling experience and being voted the #1 security company in Hamilton, we have never experienced the superlative quality and functionality of the equipment deployed and the level of sophistication extended by VIVOTEK in terms of service delivery. What serves as an icing on the cake is being able to complete the entire surveillance enabling operations within the tight 48-hour constraint that we had to adhere. Our collaboration with VIVOTEK has, in its truest essence, established a new benchmark in establishment security and we look forward to more such collaborations in the future.” VIVOTEK Canada tech support and representative, Oliver David stated, “We are delighted that our business associate and the end-customer are both deeply contented with our surveillance offerings. Our tie-up with A. S. Security & Surveillance has been effectual in delivering the desired result and we are glad to have the brand on-board as our gold partner.” “Establishing surveillance and security framework at Canadian Warplane Heritage Museum is an embodiment of the expertise that VIVOTEK holds in such deployments. Today, much like Canada, India also faces a unique challenge. Multiple statues are being vandalized throughout the country. We believe that preserving our legacy is an integral factor in building the nation and India needs it more right now than it has ever before. As various countries are preserving their national heritage using advanced surveillance systems, such systems can also help our center and state governments in ensuring better security and surveillance in public spaces “ – Sanjeev Gulati Country Manager – India & SAARC, VIVOTEK  

Read More

Implementing Mobile Credentials in the Access Control Market

There are several factors that make the widespread adoption now difficult, the first of which is the pitfalls of different phones and the platforms on which they run. Not everyone carries the same type of phone – or even a smartphone. When you have 3,000 people in a company who all need credentials to access a facility, it is rarely feasible to give each person a phone that will run the application needed. Another consideration is how to handle visitors and contractors that might require short- or long-term access to a facility. Perhaps more obvious is the challenge that emerges when a mobile device runs out of battery, thereby rendering it useless when trying to access a facility. Considering privacy Another challenge end users face when considering implementing a mobile-based access control solution is the concern employees may have regarding privacy. When using mobile credentials on a private mobile phone, there’s a certain level of access an employer has to the phone. Employees are concerned as to how employers are using their information with regards to location-based data, or where an employee is at any given moment. Naturally, with this level of access to personal information, there’s going to be a concern about how that data is used. While there is definite movement in the direction of mobile credentials across enterprises, another issue is the proprietary nature of the technology. Since it’s still emerging, there are no common standards in place that police can use, so end users that choose to invest in the technology are often locked into a single manufacturer’s system without the flexibility that more open-platform solutions allow. Addressing these concerns Many end users are now shifting toward a hybrid approach to access control that utilizes both traditional badges that allow access to a facility, as well as the option to use their mobile device as their credentials. The argument is that many employees will have their phones on them at all times, but might not always remember a badge or ID. Having the option to use either solution is becoming a more widespread use of mobile-based systems. With regard to privacy concerns, it’s important for security managers to work closely with human resources and other C-level executives to implement best practices for the use of this technology in an effort to better inform employees and guide implementation. Customer point-of-view We are seeing an increasing customer demand for mobile credentials, so it’s important to understand their needs when discussing which access control solutions are ‘right’ for an organization. Many want the flexibility to offer multiple options to their employees, but again, have to consider the privacy implications as well as the technology involved in trying to implement such a solution. Another consideration is the actual physical implementation. Most mobile based credentialing systems are built with bluetooth, which has a long-range capability; and this can be problematic. For example, turnstiles that are in close proximity to each other might pick up credentials that are a greater distance away. Standards such as near-field communications (NFC) that can be found in a lot of devices can address some of these concerns, but NFC’s ability to be used openly in an iPhone environment is not fully established and therefore isn’t a viable option unless the same kind of devices is used across an organization.

Read More

FICCI Smart Policing Awards

Vijay Goel, the Minister of State for Parliamentary Affairs and Statistics & Programme Implementation has recently presented FICCI Smart Policing Awards for 2018 in 18 categories to the representatives of the state police forces and central armed police forces. FICCI Smart Policing Awards were instituted in 2016 to recognise and propagate best practices in policing in India. The awards showcase initiatives taken by the police across the country for the safety and security of citizens. The objective is to change the public perception and build a positive and progressive image of the police forces. The awards were given in the categories of Anti-insurgency, Border management, Child safety, Community policing, Crime investigation & prosecution, Cybercrime, Disaster management, Elderly safety, Emergency response, Human trafficking control, Intelligence collection, Maritime security, Road safety & traffic management, Smart police station, Surveillance & monitoring, Training & capacity building, Women’s safety, and other policing initiatives. The jury comprised G. K. Pillai, former Union Home Secretary, Government of India; Ms. Manjari Jaruhar, former Special DG, CISF, Government of India; Jayanto N. Choudhury, former DG, National Security Guard; Alok Bansal, Director, India Foundation; and Dr. Sushma Yadav, Professor of Public Policy & Governance, Indian Institute of Public Administration (IIPA). Mr. Goel, in his opening address said that the awards should inspire the police personnel in the country to emulate the best policing practices exemplified by the awardees and earn the respect of the public. Mr. Goel also released the FICCI Compendium on Best Practices in SMART Policing 2018. The Home Secretary, Rajiv Gauba, called for proper and regular risk assessment of cyber-attacks and underlined the need for preparedness to stay ahead and foil the attempts of the cyber criminals. The readiness to face the growing challenges posed by cyber attackers required sound legal arrangements and state-of-the-art technological capacity which, in turn, needed investment and expertise. He sought cooperation and collaboration of the government, law enforcement agencies, and the private sector in enhancing the capability to stand up to the threats posed by criminals in the cyber space. G.K. Pillai, Advisor, FICCI Committee on Homeland Security said that awards bode well for the morale of the police forces at the grassroot level. “It was important not to be just smart, but also to focus on training and skills development, monitoring of crime and adherence to protocols at every level,” he said. He recognised that a major problem was the criminal justice system that gave rise to delays in trials and conviction, and hoped that the government would pay greater attention to address the issue. Immediate Past President, FICCI Ladies Organisation and Joint Vice-Chairperson, Shri Ram School, Ms. Vasvi Bharat Ram; and Co-Chair of FICCI Homeland Security Committee & Chairman’s Office, Head Special Projects, Reliance Industries Ltd. Rajan Luthra, also shared their perspectives on the subject. “It is critical to recognize police personnel and inspire public confidence in the police forces who act as guardians of the society. Awards should be instituted on ‘public confidence’ so that people look up to the police personnel with respect and help them perform their duties more effectively” – Vijay Goel Minister of State for Parliamentary Affairs and Statistics & Programme Implementation    

Read More

COP Portal to Verify Private Security Guards

Joint Secretary (PM) Ministry of Home Affairs has recently issued directions to all Controlling Authorities to use CCTNS (Crime & Criminal Tracking Network System) to check the crime record of private security guards, as well as the owners/ directors of the private security agencies so that the police verification of the private security guards can be done speedily and certificates can be issued at the earliest. This will speed up the verification processes for the renewal of PSARA license. Almost 90% police stations across country have been connected through computer network under CCTNS, thereby antecedents of a person especially his/ her criminal records can be checked and verified soon. CAPSI has been persuading MHA to speed up the verification process so that every security guard is verified through its systems. This notification of the MHA will really help in renewal of pending licenses.

Read More

Reducing the Cost, Enhancing the Efficiency at ATM surveillance

Zicom is one of the pioneers of the concept of SaaS and introduced a new business model called Zicom SaaS by leveraging the IoT space. Zicom Security-as-a-Service (SaaS) solution provides comprehensive security services on a monthly subscription basis without any ‘capital investment and management’ for the customers using the power of cloud. Historically banks spend an average of INR 30,000 to 40,000 per month on their ATM security towards ‘manpower security expenses,’ plus the CCTV equipment installed in the ATM which record the crime but never prevent it. India Infoline Ltd. (IIFL), a conglomerate of financial services company that offers loans against gold ornaments, relied on standalone closed-circuit TVs (CCTVs) and security guards to protect their branches. Many ATMs of Federal Bank Ltd. did not have even security guards.   Solution offered Zicom offered banks their SaaS to customize the e-surveillance system and use IOT to have twoway conversations – from one central hub to any ATM across the country. For the first time ever, CCTV cameras pro-actively prevented a crime instead of only recording. The Zicom ATM surveillance system uses internet to connect sensors installed at ATMs by which they are able to track each ATM, and connect it to the national command centre to monitor every activity taking place in real time, 24 hours and 365 days of the year. Unlike any other, Zicom command centre works towards preventing crime and getting into the rescue operation when required with features such as two-way communication at an ATM, panic button to raise an alarm, and quick response service (QRS) mechanism to inform the police about a crime taking place. Impact This strong fullproof mechanism for the e-surveillance system has made the entire security process simpler, and as a result banks can completely rely on it. SaaS helped re duce man power as well. Earlier banks were spending Rs. 40,000 monthly on security, ATM Surveillance under IoT by Zicom brought the cost down to Rs. 4000 a month which is 90% reduction at each ATM. Zicom has now created a security model for the bank that also helps in conserving energy with the help of remote monitoring. It has helped Federal Bank save about Rs. 7,000-8,000 per month on each ATM. Venu, Chief Administrative Officer of IIFL says that since Zicom partnered with IIFL the company is able to monitor any branch across the conglomerate’s large network from their office in Mumbai. He further adds that this has improved the productivity and efficiency of his auditors and vigilance team. Zicom Electronic Security Systems today covers over 5500 ATMs, and various banks across country such as ICICI, Indian Bank, Ratnakar Bank, HSBC, Punjab National Bank, Vijaya Bank, State Bank etc.

Read More

Confronting the New-Age Cybercriminal

Over the last few years, cybercrimes have become more intense, sophisticated, and potentially debilitating for individuals, organizations and nations. Law enforcement agencies are finding it difficult to check and prevent the crimes in the cyber space because the perpetrators are faceless and incur very low cost to execute a cybercrime whereas the cost of prevention is extremely high. Targets have increased exponentially due to the increasing reliance of people on the internet. Cybercrimes which were restricted to computer hacking till some time ago, have diversified into data theft, ransomware, child pornography, attacks on critical information infrastructure (CII) and so on. “Cyber related risks are a global threat of bloodless war. India can work towards giving the world a shield from the threat of cyber warfare” Narendra Modi Prime Minister of India India is becoming increasingly vulnerable to this menace because of rapid digitization and proliferation of mobile data without matching pace of cyber security and cyber hygiene. At present, India is ranked at 3% in terms of cybercrime incidents as per data shared by a leading security vendor, which compiled data of bot-infected systems controlled by cyber criminals in different countries. As per CERT-In, one cybercrime was reported every 10 minutes in India during 2017. These statistics are quite alarming and therefore, merit focused and collective attention from law enforcement agencies (LEAs).   Expansion of cyber ecosystem and its impact The increase in technology convergence has created an extremely complex ICT ecosystem of interdependencies within and among critical sectors. This leads to an increased number of stakeholders and a larger attack surface which can be easily exploited by cyber criminals. There is no silver bullet technology which can identify or predict which element of the system (people, process or technology) is more susceptible to cybercrime, though empirically it is observed that the people are the weakest component of the cyber ecosystem. Inherent anonymity and closed nature of the dark web has turned it into a safe haven for cyber criminals and their wares. The dark web hosts a wide range of illegal online markets of cyber exploit kits, drugs, counterfeit documents, stolen credit cards, bank account credentials, human trafficking, illegal immigration etc. It has thousands of forums which operate in a tightly controlled environment. Crypto-currencies are used for transactions so that these transactions cannot be traced to individuals or organizations. Ransomware continues to be a major threat the world over. In 2017, WannaCry, Petya, NotPetya etc., caused major disruptions in the connected cyber ecosystem of the world. India was also affected. CERT-In confirmed 37 incidents of WannaCry and Petya attacks in India between May and June last year. Petya caused extensive disruption of services in India. One terminal of JNPT (Jawaharlal Nehru Port), Mumbai had to switch over to manual operations due to this attack. India was the worst affected country in Asia and seventh overall, due to Petya attack. Apart from ransomware, another area of significant concern is theft of personal identifiable information (PII) and financial credentials of individuals. In another incident of cybercrime, criminals stole personal data of over 2.74 lakh Indian users of the Ashley Madison website. Hackers, who stole 300GB of personal information of the users, put it up on sale over the dark web. Also, Cryptojacking is another lucrative method adopted by attackers to deploy a malware forcefully and unknowingly into a victim’s computer to use their hardware for generating crypto-currency. It is becoming yet another tool of choice for cyber criminals because it cannot be classically categorized as a crime. Figure 2: Top cybercrimes in 2017 “The advent of Digital India and Smart City initiatives has brought about a paradigm shift in terms of connectivity, services and threats for both urban and rural eco-systems. While greater connectivity promises wider deliverables, it also paves the way for the emergence of new vulnerabilities. Leading companies in energy, telecommunications, finance, transportation and other sectors are targeted by new-age cyber criminals. The ‘Make in India’ initiative has identified 25 core sectors as part of its effort to give a special thrust. While cyber security is not one of the sectors, it could be embedded in certain sectors like defence manufacturing, electronic systems, and IT & BPM. It is crucial for ‘Make-in-India’ to focus on cyber security as well as promote development of indigenous solutions to combat cyber-crime.” – Dilip Chenoy Secretary General, FICCI Figure 3: Rise in cyber crime Cybercrimes in the connected world One reason why cybercrimes are becoming more sophisticated, better orchestrated and increasingly ambitious is because many of the perpetrators operate outside the jurisdiction of the victim’s country. As per industry estimates, 32% of the threat vectors originate from Eastern Europe and Russia, and social engineering is the preferred mode of launch for most perpetrators. A report indicates that there are four distinct groups of cyber-criminals – traditional gangs, state-sponsored attackers, ideological hackers and hackers-for-hire. The report also states that the entrance of new participants has transformed cybercrime from isolated and individualized acts into pervasive, savage practices run by distinct groups of individuals. Outsourcing is also possible for execution of these crimes on the dark web where cybercrime is offered as a service. “Cybercrime is the biggest challenge these days with development and access to technology across the globe. Cyber space is increasingly being used to radicalize young minds” Rajnath Singh Union Home Minister of India Cybercrime-as-a-service not only allows malicious actors to leverage other cybercriminals’ resources to conduct attacks but also provides a cheap and easy option to others who are willing to enter the world of cybercrime at a very low entry cost. Netizens have increasingly become more active in leveraging these services, which is driving a surge in activities like illicit drug sale, trafficking of human beings, terrorism, child pornography and other crimes. Illustrative rates of some of the services offered are given next page. Cybercrime-as-a-service model has led to the emergence of a complex and multi-layered cybercrime economy where overt acts of crime have been replaced by a covert criminal…

Read More