securitylinkindia

KKB Anadolu Data Center Adopts Matrix Solution

Kredi Kayıt Bürosu (KKB) was founded by the then nine leading banks of Turkey on 11th April, 1995, which is a highly regarded financial institution in Turkey and has a total of 156 members. The KKB Anadolu Data Center is located in the capital city of Ankara across 43,000 square meters of land, comprising three main sections. The facility is equipped with protection systems against lightning and earthquake. Issues The data center has cabinet system in place while access to data racks require biometric authentication. The center is equipped with numerous data racks for which they required a display device at the entrance. Each rack was locked with physical locks but the center required a cost effective solution that did not include a device for each rack. Moreover, they required devices that supported both smart card authentication as well as door locks. The center authorities were looking forward to provide the supervisors with an additional option of authentication through RFID cards. With respect to gaining access, they wanted a solution that would grant access through two steps, biometric authentication and physically opening the locking system. Finally, the center wanted a solution that could alert them in case of situations such as a door being left open. Solutions provided Matrix, in association with SouthCo, provided the KKB Anadolu Data Center with the following solution: To enable a display device at the entrance, integrated with the biometric device Matrix integrated data center solution with a touch screen display. Whenever any user tries to access the data center with their biometric credentials, the touch screen would display a list of racks the respective user is authorized to access. From the display, the user would be allowed to choose the racks he/ she would like to access. Once the user is granted access into the chosen racks, they will be allowed to access the same for a pre-defined period of time. User based access ensures the security of sensitive company data. They also installed 200 COSEC ARCs at the entry/ exit of racks between 400 SouthCo locks, one between two door locks, making it a costeffective solution for the center. Additionally, the COSEC ARC also provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps such as an open door, a forced opened door, door being left open etc. The personnel can also gather customized reports on events like who, when and which rack was accessed. Results Maintenance of diverse data. Foolproof security with biometric user-wise rack access. Accurate records of who accessed data center at what time.

Read More

TBS 2D Eye

The TBS 2D Eye is a revolutionary combination of iris algorithm and face detection designed for high security and multi-functionality at point of access. The sensor captures the iris of both eyes while the face sensor is used to automatically adjust to capture the height of the users, highly user-friendly and hygienic for sensitive applications. Developed in cooperation with a leading specialist in iris technology, the new 2D EYE is fully integrated into TBS platform, offering all the communication, integration and adaptability advantages that make the TBS solutions unique in the market.

Read More

Videonetics Bags Mayor of London’s India Emerging (IE20) 2018 Award

Videonetics has recently been honoured with the prestigious India Emerging Twenty (IE20) 2018 Award by the Mayor of London. Created by London & Partners and launched by the Mayor of London, the IE 20 Programme aims to discover 20 of India’s most innovative and highgrowth companies to help them grow to London. The award was adjudged using a robust rating scale by an esteemed panel of business leaders, venture capitalists and entrepreneurs. By flawlessly surpassing rigorous three-phase evaluations, Videonetics emerged as India’s top 20 emerging enterprises with global aspirations. The 20 winners were chosen from over 300 applications from some of India’s leading business hubs such as Mumbai, Bengaluru and New Delhi. London & Partners has a proven track record of working with over 2,000 international businesses and helping them with their global expansion plans. “ It is indeed an honor to receive ‘India Emerging Twenty 2018 Award’ from the Mayor of London and we all are set to lay the foundation for our success in the UK market. This recognition validates our drive for high performance, innovation, differentiation and global scalability “ – Dr. Tinku Acharya,  Fellow IEEE, MD & Founder, Videonetics  

Read More

CAPSI Stages Peaceful Protest against GST Rules

The Goods and Services Tax in India that is hailed as one of the most successful accomplishments of the current Government turned one year old on 30 June 2018.   The imposition of GST regime has echoed a mixed bearing on the service sector. On one hand, it is beneficial in various aspects such as one country one tax mode, seamless flow of credit, avoidance of multi-taxation etc., on the other it has produced snags in ease of doing business.  The Private Security Industry in particular, which is one of the largest employment generating industries in India making a workforce of over 7 million personnel is not going well along with the GST executions. They have shown utter disappointment with the regime and raised strong objections on the GST implementation.  Amongst others, the major impediment stems from the fact that GST is due to be deposited on the 20th day of every month while private security agencies receive payments for their respective services after 60 to 90 days; in the interim, however, they are mandated to meet the statutory compliances without fail. The gap between the business module of the private security industry and the imposed GST compliance regulations has created an unpleasant state of affairs for the industry. Central Association of Private Security Industry (CAPSI), the preeminent organisation for private security professionals in India have made several representations with the Government to amiably reach out to a rational reconciliation, but they could not fructify well. The CAPSI delegations knocked the doors of the Secretary, GST, CCI and MSME to suggest them to enable the system of reverse charge mechanism for security. Although the delegations at each stage were given a patient hearing, but no assurance towards the rectification of the anomaly has been suggested so far. The industry has decided not to give up and to proceed more pro-actively to counter the indifference. To begin with afresh, CAPSI has recently resolved to stage a nationwide peaceful protest (Dharna) on 18 July 2018 in front of GST offices of the respective states. The basic ethos of the protest is to simultaneously carry out multiple Dharna’s across the country with adequate media coverage in order to make the authorities aware about the seriousness of the issue. In this respect CAPSI State Chapter Presidents will sensitise all the security agencies in their states to participate whole heartedly in the protest. Along with CAPSI members, non-members of the industry are also requested to support the cause and participate in order to ensure adequate strength from the Industry. The participants will wear black T-shirts. CAPSI will also hold a press conference prior to the main event on 16 July at Press Club of India, which will coincide with the scheduled media conference at Delhi by CAPSI. The Dharna envisages an active involvement of APDI as well. APDI State Chapter Presidents are requested to garner the cooperation and indulgence of all the detective agencies operating in the states to actively participate in the Dharna and make it a huge success.  

Read More

Improving Personnel Productivity with Cloud Telephony

The private security industry in India has gained a strong footing in the last decade. With the largest number of private security agents – estimated at 7 million – this industry provides employment to a huge section of people. Urbanisation, and introduction of government proposals such as Mission Smart Cities and Make in India have created a demand for more and more security personnel. Current state of affairs Private security industry plays a huge role in the safety of commoners. For a densely populated country like India, the police to people ratio is not significant enough, which has made the private security industry all the more popular. However, this industry grapples with many crises every day. One of the major problems is the lack of accountability from the security personnel. Security industry in India is largely unregulated, and it’s not uncommon to see guards swapping their shifts without intimating their employer. This impersonation can be potentially harmful, not just for the customer, but also for the security company This is just one of the many problems plaguing the security service providers. Unless there’s a scheduled visit or patrolling by a supervisor, there’s no way to monitor if the guards are alert on their job. Surprise visits to the premises are not a productive alternative either. The human body which is designed to retire at sunset starts to inevitably feel tired and dull during night shifts. Therefore, it makes sense to place your trust in systems, rather than a person to supervise the security personnel. How cloud telephony can help Automated Calls with IVR based check-in To check if the guards are alert, a simple mechanism such as an automated call can be set to trigger at particular time intervals. These calls can solicit input from the guards to ensure that they’re alert. Alternatively, they can be imparted with small training modules in vernacular that are a minute long, asked a related question towards the end of the module, and solicit a response from them. A lot has been said about the lack of training for the security guards. This is an interesting and engaging way to keep them alert and awake. Their call response is an attestation to their situational awareness and alertness. Actions can be initiated by the agency if they fail to respond or answer the call. This method is more proactive than reactive, and adheres to the urgency of the situation. Apart from these call check-ins that fall into a predictive pattern, surprise check-ins can be done by triggering calls at random times. This keeps the security officers alert and ensures they don’t nod off on duty. Automated check-in calls are a more sustainable solution, and the message or structure of the call can be changed every now and then to break the monotony, which is one of the major gripes of security officers. Reminder calls for shift changes Automated reminder calls can be set to go out an hour or 30 minutes prior to the shift, which ensures that the security officer is on time to relieve the on-duty officer. This reduces the chances of no-show or turning up late to the shift. SMS updates to the customer Since the shift rotation chart is prepared in advance, the details of security personnel on duty can be setup to be sent to the customer via an automated SMS message, which they can verify with the help of the personnel identification card. This ensures no impersonation can take place, thus assuring the safety of the customer. IVR to handle new/ potential customer queries For a security services provider, it is essential to be available at all times and put the customer’s safety interests first. Instead of employing a full-scale call center solution, IVR automation can be introduced to answer FAQs. This helps to optimize existing resources better, while also ensuring that an agent does not have to be on-call at all times. A technology like cloud telephony can bring responsibility to this unorganized sector. What’s more – it is not a stand-alone solution. A virtual number that is obtained from a cloud telephony service provider can help provide all the features mentioned above. By Shivakumar Ganesan – CEO & Co-founder of Exotel  

Read More

The Rise of IT and Integration with ID Management

Convergence has been a continual trend in the security industry for over a decade. It began with simple integrations of similar types of security equipment such as adding video cameras to an intrusion system or break-glass detectors to an access control system. The level of integration, however, has quickly evolved – now physical security is being integrated with systems designed with functionality outside of security applications. End users are no longer satisfied with a lack of return on investment from security equipment. Rather, their priorities have shifted from wanting to improve the effectiveness of their security systems toward finding new ways to earn a positive return on investment from these very systems. Historically, physical access control has always been a local, on-site responsibility for those in charge of security management. This is due to huge variations in the methods used to secure buildings, both regionally and by building type. As such, it has always been difficult for larger enterprises to roll out ‘one-size fits all’ access control solutions across multiple sites because of huge variances in the requirements for a given system. The result therefore is that end users responsible for managing these systems now require different training or must issue multiple credentials for multiple locations. Many of these pain points and inefficiencies could be eliminated if credentials are managed centrally; this is where logical integration becomes beneficial. Despite companies often possessing multiple access control systems (each with their own unique database of access rights), they also often have a central database, known as an active or corporate directory. An active or corporate directory is a database that companies use to keep track of employees, contractors, and even customers for a variety of purposes including human resources or IT login credential management. As this database spans multiple sites, it could potentially be used to pull user credentials to create physical access control credentials for the entire enterprise. There is already a wide variety of different levels of logical and physical access control integration. However, pulling physical security access rights from the corporate or active directory is essentially doing so in its most basic and simple form. Features and benefits of integrating these two systems Automation of credential management: Rules-based access control can be implemented by automating system assignments. For example, when a new user is added from the corporate/ active directory, the system can also look every attribute (location, job role, time with the company, etc) associated with the employee. The system then sets default access rights depending on an employee’s attributes. This can greatly speed up the process of adding new users, and it also helps sync access rights with the company’s corporate structure. Unifying credentials: Integrating logical and physical security systems also creates more opportunities to unify credentials. Access control badges or cards can be used for additional functions outside of physical security. Examples include using the credential for two-factor authentication when accessing the IT network, secure printing, or micropayments in the company cafeteria. Improved auditing capabilities and increased accountability: Across an enterprise, the summation of access right changes, on-boarding/off-boarding, and temporary access rights provisioned from its access control system equals a huge volume of requests each month. Without an overarching system, the methods available to senior management for accessing and reviewing logs are limited and inefficient. Corporate governance integration and automation: Logical integration provides the potential to roll out uniform governance across all of the company’s access control systems by enforcing company policy through identity management. Policy checks can be programmed into permission requirements, allowing companies to ensure that best practices are followed. The system also allows the company to verify whether policy was followed, further increasing accountability among employees. Barriers to further adoption Cybersecurity concerns: Connecting every access control system to the IT network, and also managing all of the identities associated with the company via a single system creates huge network risk. If the system is hacked, every identity associated with the company is quickly compromised. Additionally, connecting all the new devices offers hackers new routes into the network, which means that all of the hardware’s software needs to be updated regularly to reduce cybersecurity risk. The lack of an ‘off-the-shelf’ solution: Logical integration projects often require large commissioning and design efforts because they are highly complex both initially and after implementation, particularly with respect to maintenance. This means there is a cost involved for the entire lifecycle that the system remains in place. Lack of developed identity management infrastructure: Many smaller-sized enterprises lack identity management platforms capable of supporting physical access management. And with many larger-sized projects, end users often find that their current authorization policies and best practices have not been updated since they first adopted the identity management system. The result is that these systems must be updated before being integrated with physical access. By Jim Dearing – Analyst, Access Control & Fire, IHS Technology  

Read More

INTERPOL: Wildlife Crime

An international operation against the illegal trade in wildlife and timber has seen hundreds of seizures worldwide as well as suspects arrested. Code named Thunderstorm and targeting the people and networks behind global wildlife crime, the operation involved police, customs, border, environment, wildlife and forestry agencies from 92 countries and resulted in millions of dollars-worth of seizures. The month-long (1-31 May) operation has so far brought 1,974 seizures and the identification of some 1,400 suspects, triggering arrests and investigations worldwide. Further arrests and prosecutions are foreseen as ongoing investigations unfold. Total worldwide seizures reported to date include: 43 tonnes of wild meat (including bear, elephant, crocodile, whale and zebra). 1.3 tonnes of raw and processed elephant ivory. 27,000 reptiles (including 869 alligators/ crocodiles, 9,590 turtles and 10,000 snakes). ● Almost 4,000 birds including pelicans, ostriches, parrots and owls. Several tonnes of wood and timber. 48 live primates. 14 big cats (tiger, lion, leopard and jaguar). The carcasses of seven bears, including two polar bears. The operation saw eight tonnes of pangolin scales seized worldwide in cluding almost four tonnes by Vietnamese maritime authorities on board a ship arriving from the Democratic Republic of Congo. Two flight attendants were arrested in Los Angeles attempting to smuggle live spotted turtles to Asia in their personal baggage. Both suspects have been charged with smuggling CITESprotected species and a transnational investigation has been opened between the involved countries. A man was arrested in Israel and awaits deportation to Thailand after his hunting photograph on social media led to the seizure of multiple wildlife items at his home including fox, jackal and mongoose bodies. Follow-up inquiries have revealed that the suspect was also engaged in people smuggling and illegal employment. Canadian authorities intercepted a container holding 18 tonnes of eel meat arriving from Asia. Thought to be poached from Europe originally, the juvenile glass eels had been reared in Asia before being dispatched to North American markets for consumption. An integrated global response The second in a global ‘Thunder’ series initiated by the INTERPOL Wildlife Crime Working Group, Operation Thunderstorm was coordinated by INTERPOL and the World Customs Organization (WCO) in conjunction with the International Consortium on Com bating Wildlife Crime (ICCWC), which includes the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) Secretariat, UNODC and the World Bank. “Operation Thunderstorm has seen significant seizures at global level, showing how coordinated global operations can maximize impact,” said INTERPOL Secretary General Jürgen Stock, “By revealing how wildlife trafficking groups use the same routes as criminals involved in other crime areas – often hand in hand with tax evasion, corruption, money laundering and violent crime – Operation Thunderstorm sends a clear message to wildlife criminals that the world’s law enforcement community is homing in on them.” An intelligence-driven operation Investigative crime intelligence was gathered ahead of the operation to help target specific hotspots for action including land and airport border points and wildlife parks. Cars, trucks, boats and cargo transporters suspected of moving illicit products were also targeted with searches carried out by officers, often with specialist sniffer dogs and x-ray scanners. “By leveraging the global network of worldwide environmental law enforcement experts and customs community’s commitment to protecting wildlife, WCO and its partners have clearly illustrated the power and effectiveness of in ternational cooperation in keeping our natural heritage safe, both now and for future generations,” said WCO Secretary General Kunio Mikuriya, “Operation Thunderstorm clearly demonstrates that by pooling our transnational law enforcement collaboration in the field, WCO and INTERPOL firmly contribute to making sure that borders everywhere divide criminals but connect customs and law enforcement as a whole to make the world a safer place.” Results will continue to be analysed globally to generate intelligence which will be used as guidance in future national, regional and international law enforcement efforts. Organized wildlife crime: Everybody’s business The organized crime groups behind wildlife crime target high-value animal and plant specimens, and operate through complex global criminal networks. Driven by profit, the activities of these groups can have devastating economic, social and environmental impacts. Ben Janse van Rensburg, CITES Secretariat Chief of Enforcement Support said, “No one country, region or agency can tackle illegal wildlife trade alone. Collective action across source, transit and destination states is essential. On behalf of all ICCWC partner agencies, I commend the excellent work done in member countries – Operation Thunderstorm is testimony to what can be achieved if we all work together.” Ben Janse van Rensburg, CITES Secretariat Chief of Enforcement Support said, “No one country, region or agency can tackle illegal wildlife trade alone. Collective action across source, transit and destination states is essential. On behalf of all ICCWC partner agencies, I commend the excellent work done in member countries – Operation Thunderstorm is testimony to what can be achieved if we all work together.” Mr. Miller is also chair of the INTERPOL Wildlife Crime Working Group, which leads a number of projects to combat the poaching, trafficking, or possession of legally protected flora and fauna.

Read More

Security and Fire Expo – South India 2018

UBM India is all set to bring in the fourth edition of ‘Security and Fire Expo (SAFE) South India’ for the first time at Hitex, Hyderabad during 28 – 30 June 2018. The expo aims to bring together renowned Indian and international brands from video surveillance, access control, entrance and home automation, and perimeter protection industry to interact, network, view latest innovations, and source and gather business solutions  and invaluable expert supports – all under one roof. SAFE South India is supported by the Electronic Security Association of India (ESAI) and Asian Professional Security Association (APSA).  Highlights: Security services revenue to reach USD1.69 Billion by 2019 Central Government has shown commitment to enhance the security budget by 35% 70 plus brands showcasing their latest technological advancements Conference on the changing paradigm in security technologies With a distinguished line up of key exhibitors and thought leaders on board, the expo will add immense value to the commitment shown by the Central Government to enhance its security budget by 35 per cent for creation of a dedicated homeland security department, developing coordinated intelligence gathering, protecting critical infrastructure and upgrading maritime security. The revenue for security services accounted for 61% three years ago in 2015, and is expected to increase to 66% by 2020. Security spending on hardware, software and services in India is expected to cross the USD 1.69 billion mark by 2019. SAFE South India will be a launch pad for security companies to introduce products in this emerging market, and establish relationships with the key decision makers. The congregation will see security professionals from across industries including security and safety managers from hospitality, IT/ BPO & service industry, real estate, port authorities, power plants, logistics, construction, architecture, automobile, manufacturing, industrial, retail, jewellery, health, education, IT, networking, telecoms, automation, BFSI etc. The 4th edition of SAFE South India has attracted prime exhibitors such as Mark Electronics Corporation, Timewatch Infocom Pvt. Ltd., RoadPoint Ltd., N S Enterprises, ACJ Computronix, Advance Infotech, WYSE Biometrics Systems Pvt. Ltd., Mantra Softech (I) Pvt. Ltd., Matrix Comsec Pvt. Ltd., Prama hikvision India Pvt. Ltd., Pictor Telematics Pvt. Ltd., Axestrack Software Solutions Pvt. Ltd., R G International, Lana Technologies Private Limited, Tekno Electro Solutions (P) Ltd., Face ID Systems LLP, HiFocus Electronics India Pvt. Ltd., Enterprise Software Solutions Lab Pvt. Ltd., Futureeye Global Technologies, CAMTECH Solutions, Dahua Technology India Pvt. Ltd., and Vamo Systems Pvt. Ltd., amongst others. The event will also be organizing a unique conference on The Changing Paradigm in Security Technologies, slated for Day one. The conference will comprise in-depth speaker sessions and panel discussions on trending subjects such as ‘Security of a New-Age City,’ ‘The Role of Drones and UAVs in Homeland Security,’ ‘Visual Analytics in Ensuring Safe Cities,’ ‘IoT and Security of Assets’ and ‘The Threat of Cyber Attacks on Surveillance Systems,’ among others.  “The expenditure on surveillance and security has been increasing in the Indian market in recent years. The government has taken various initiatives to increase security services revenue which will benefit the citizens as well as the security and surveillance services industry. After all, a modern civil city should be able to showcase seamlessly safe, smart, energy efficient and technologically advanced features.  Notably, for the first time since its inception, SAFE South India is being brought to Hyderabad as a strategy to get the show closer to the end users by rotating it across the several key Indian cities that are situated in South India. SAFE South India provides an exclusive platform for the leading players in the security industry to tap into the growing South Indian market by    forging joint ventures, partnerships/associations, sourcing, dealerships and networks.”   Yogesh Mudras, Managing Director, UBM India Pvt. Ltd.                           

Read More

Gemalto Automated Border Control in Colombia

Gemalto and INCOMELEC SAS, a Colombian partner, are transforming the immigration and border crossing in Colombia through biometric iris verification implemented by Migración Colombia, the country’s border control agency. This innovative solution was launched in February with a pilot program at Bogota’s El Dorado International Airport. The Automated Border Control (ABC), known locally as ‘BIOMIG,’ is benefiting both citizens and border officials. Gemalto’s ABC speeds identity authentication and significantly reduces bottlenecks in the immigration process while maintaining strong security control for each traveller. Gemalto ABC Iris solution secures and speeds immigration A growing majority of airport arrivals in Bogota – up to 60% – are Colombian citizens re-entering the country. This often results in long immigration queues, congested waiting areas and travel weary citizens. ‘BIOMIG’ mitigates these challenges while complying with Colombia’s stringent border control security requirements. How does it work The solution integrates a highly intuitive iris recognition terminal that allows swift long range iris capture from 35 to 45 centimetres away. This eliminates physical contact with the terminal and improves comfort and ease of use. To use the service, Colombian citizens aged 12 and older only need to visit one of 30 BIOMIG enrolment stations at the airport as they exit the country. In less than one minute, their unique iris scan is securely registered with Colombia’s Border Management System (BMS). When re-entering the country, previously enrolled citizens simply enter their national ID number on a touchscreen integrated with an automated door barrier by INCOMELEC, SAS. After a quick glance at the iris reader terminal, identity is validated via a secure digital process and the automatic doors swing open. Gemalto has supported Migración Colombia with state-of-the-art solutions for secure document authentication, biometric solutions and software integration for their border operations. “The challenge with border control solutions is to minimize and simplify immigration procedures while improving ease, speed and convenience for end users – without compromising security. This is exactly what the ABC Iris solution achieves,” said Francesc Ortodo, Sales Director for Government Programs Latin America at Gemalto, “Colombian citizens can now benefit from strong biometric security within a trusted environment.”

Read More

Dahua Goes GDPR Compliant

Dahua Technology has become GDPR compliant and received the certification for its IP video products from TÜV Rheinland just a day before the General Data Protection Regulation (GDPR) comes into effect i.e., 25 May 2018. It means that its IP products are in full compliance with GDPR. Dahua is one of the first companies on the globe which has achieved this certificate. The General Data Protection Regulation (GDPR) is a set of new law by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union. It establishes strict, high-level, wide-scope protection standards for personal data. Wherever a company is located, as long as it processes personal data of an EU citizen during the provision of products or services, it must comply with GDPR. TÜV Rheinland, an internationally renowned independent third-party testing, inspection and certification organization, held Cyber Risk Management Forum 2018 in Shanghai on 24 May 2018. The forum, started by Lutz Frankholz, Executive Director of TÜV Rheinland Greater China, is among the highest level that is themed on information risk in China and is joined by professionals from both business and academic circles. Dahua Technology participated in the forum together with many outstanding companies from multiple industries. They successfully applied for GDPR personal data protection standards and TUV Rheinland’s IoT security and privacy protection standard for products that are being shipped globally, including those that are shipped to countries and regions outside of EU. Zhang Junchang, Director of Cybersecurity Product Line of Dahua Technology, received certification towards IP video products on behalf of the company. This means the Dahua IP products are in compliance with the GDPR (EU, 2016/679) and meet the TÜV Rheinland 2PfG 2624/06.17 standard (covering IoT security and privacy protection requirements) which are world-class in information security and privacy protection. This allows Dahua Technology’s global users to enjoy surveillance products that have the same protection level as those in EU. This also means that customers who use Dahua Technology’s certified IP products are able to meet the GDPR standard. The certification procedure is closely related to the company’s whole management system. Its smooth carrying out showcased Dahua Technology’s emphasis on product quality and compliance. Dahua will relentlessly make use of its internal source as well as professional third-party partners like TÜV Rheinland to create more value to its customers and users. Dahua has also shared a white paper named ‘How Can Dahua Products Help Users Comply With GDPR.’

Read More