securitylinkindia

Matrix Comsec is All Set for IT EXPO’19

Matrix Comsec, the leading manufacturer and provider of security and telecom solutions, is participating in IT EXPO 2019 at Fort Lauderdale, Florida during 30 Jan to 1 Feb 2019 to showcase their comprehensive range of people mobility management, IP video surveillance and unified communication solutions. For SMB market, the company will showcase SPARSH VP710 that sets a new benchmark by offering enhanced video and voice capabilities, SMB IP-PBX SPARK100, an all-in-one communication solution with enterprise grade unified communication and collaboration, and next generation door controller COSEC ARGO that is equipped with features like 3.5” IPS touchscreen LCD with Gorilla glass, powerful processor for ultra-fast user identification, intuitive user experience, and vandal resistant (IK08). Further, Matrix will demonstrate seamless integration between Matrix IP video surveillance, access control and unified communications solutions along with Matrix video management and device management software suite. Matrix will also exhibit its range of gateways which allow easy integration with most of IP-PBX, TDM PBX, softswitch and hosted solutions. Award winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions for multi-site connectivity and remote survivability while offering superior voice quality and state of the art routing features. Matrix is known for its customer centric, innovative range of solutions for unified communications, IP video surveillance, access control and time-attendance applications catering to diverse and complex deployments especially for the SMB, SME and large enterprises.

Read More

Streamvault Analytics Appliances

Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions has recently announced a new line of offthe-shelf analytics appliances within its Streamvault™ portfolio. Designed to analyze more camera streams per unit than traditional security appliances, the new devices come preloaded with Genetec Security Center and unified analytics modules, reducing the cost and time required to deploy video analytics in new and existing systems. Available immediately through Genetec certified distribution and channel partners, the new Streamvault analytics appliances come in two versions – Model SVA-100, a compact unit ideally suited for retail and banking customers who are looking to anonymize patron/ clients identities in service environments, and model SVA-1000E, a rackmount unit designed for customers with high camera counts looking to automate the detection of potential threats or monitor large public spaces while respecting individual privacy. To protect the privacy of people in public spaces, both models come pre-loaded with KiwiVision Privacy Protector™, a real-time video anonymization module that dynamically pixelates individuals within a camera’s field of view. This also maintains an operator’s ability to monitor actions, something that is impossible with static masking. The new appliances also include KiwiVision Intrusion Detector™ which detects individuals and objects in sensitive areas, reducing reliance on visual monitoring and helping operators detect threats faster. Specifying a server for video analytics can quickly become a complex process. Scene activity, composition, and lighting directly impact how many streams can be analyzed by an appliance or a server. Previously, system integrators had to design servers themselves, test performance, and assume any risk associated with under-specifying a solution. Genetec Streamvault analytics appliances remove the uncertainties that come with deploying video analytics on a new or existing system, and reduce the cost-per-video stream analyzed by optimizing appliance components. The Streamvault SVA-100 and SVA-1000E are designed to handle more streams than a typical video server with an analytics add-on. In the latter scenario, the server is not streamlined for analytics processing, rather for video archiving. The new analytics appliance can be deployed alongside existing servers, ensuring surges in analytics activity do not compromise video monitoring or archiving operations. Once analyzed, video and analytics data are then directed to other products in the Streamvault™ family. “Traditional servers are not adapted to video analytics requirements. When analytics add-ons are installed, they are limited in the number of streams they can analyze and require extensive customization and configuration before deployment, resulting in higher equipment costs,” said David Grey, Streamvault Product Line Manager, “Streamvault analytics appliances are designed to complement them, allowing each device to focus on tasks they are best suited for. This allows us to deliver a more cost-effective, turnkey solution and decrease the total number of appliances needed for a project.”

Read More

Matrix Comsec Announces Participation in Convergence 2019, to be Held in the Pragati Maidan, New Delhi from 29th – 31st Jan’19

Matrix Comsec has confirmed its participation in the 27th Convergence 2018, to be held in the Pragati Maidan, New Delhi from 29th – 31st January 2019. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and new portfolio of IP Communication endpoints. Matrix is well-known for its indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Each of our solutions is specifically designed for large, multi-location enterprises, SME and SMB organizations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Telecom solutions at the 27th Convergence 2019 Meet. Event Highlight Matrix Comsec will be showcasing its recently launched video conferencing solution – PARISAT VC as the highlight of the event. This Enterprise Meeting solution sets a new benchmark by offering enhanced video and voice capabilities. PARISAT meets the communication needs of modern enterprises to brainstorm ideas and devise effective strategies. Matrix PARISAT VC empowers organizations to make quick decisions and enhance customer experience. Products and Solutions Network Management solution – Matrix will be exhibiting its all-in-one solution for centralized control of every connected Matrix communication server and Gateway within a single network. Range of Gateways – Based on SIP (Session Initiation Protocol), Matrix range of Gateways allows easy integration with most of IP-PBX, TDM PBX, Softswitch and Hosted solutions. These award winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions. Starting from a single port VoIP adaptor to high density VoIP-GSM-PRI-FXO/FXS Gateways, Matrix Telecom Solutions align with all requirements of Small to Large Business. Preloaded with superior voice quality and state-of-the-art routing features, Matrix Gateways are ideal for multi-site connectivity, remote survivability and SIP trunking. “Convergence India is a major technology event bringing ICT professionals on a common platform. Matrix is all set to showcase its latest Telecom solutions at Convergence this year. We look forward to meeting key decision makers and service providers and give them a first-hand experience of our Telecom solutions that are redefining business communications and providing a competitive advantage to our customers worldwide.” said Ganesh Jivani, Managing Director, Matrix Comsec. For further information, please contact:  394-GIDC, Makarpura, Vadodara-390010, India Toll Free (+91) 1800-258-7747  E-Mail:  Inquiry@MatrixComSec.com Website: http://www.MatrixComSec.com

Read More

HID goID Provides End-to-End Solution to Govt. Agencies

HID goID™ solution has been extended to provide an end-to-end system for deploying and managing a mobile citizen ID program. From issuance through verification, HID goID is backed by the same high security standards for data, communication and privacy protection that are used in today’s physical electronic ID (eID) programs. “This is a major step in delivering the full value of our goID solution, as we extend its capabilities for provisioning, updating and revoking mobile IDs to include the full range of citizen ID program functionality,” said Wei Jin Lee, Regional Director Secure Issuance, APAC with HID Global, “Governments now have everything they need to move to a fully mobile society including support for integrating goID with existing issuance systems, developing a citizen app, and ensuring compliance with international standards for digital credentials.” Key HID goID solution components include an issuance system, utilizing HID Global’s renowned Integrale™ modular software suite for the management of physical and mobile IDs; a gateway for mobile ID provisioning which can be managed locally by governments or offered as a service; and a software development kit (SDK) for the development of the citizen app to meet local requirements. HID Global also provides comprehensive support and training for the creation and deployment of the citizen app and verification solutions. HID goID includes off-the-shelf data structures enabling governments to issue mobile passports that will help comply with digital travel credentials currently being developed by the International Civil Aviation Organization (ICAO), and to issue mobile driver’s licenses that will help promote compliance with ISO18013-5 specifications being developed by the International Organization for Standardization (ISO). The solution enables countries to move from paper or electronic documents to mobile IDs, streamlining proof of identity issuance through overthe-air provisioning directly to citizens’ phones. It protects privacy with end-to-end encryption and four layers of fraud-fighting security mechanisms. Additionally, citizens can control what verification data they share, and with whom. Post-issuance technologies keep mobile IDs current and trustable, and verification can be performed from distances up to 66 feet (20 meters). HID goID also enables issuing authorities to easily add other government agencies and authorized private sector entities into its ecosystem. This creates new opportunities to improve communication between governments and their citizens while opening the door for people to carry many different citizen and commercial IDs in one convenient mobile application.

Read More

Intesa Sanpaolo Turns to Gemalto for Italy’s First Biometric Contactless Payment Card Pilot

Gemalto is supplying Intesa Sanpaolo, the leading banking group in ltaly, with the first Mastercard biometric contactless payment card. The pilot promoted by Intesa Sanpaolo and Mastercard allows to test an EMV contactless biometric card for the first time in Europe. Consumers may simply tap their card to any POS terminal to pay and authorize the transaction with their fingerprint, combining a fast and convenient user experience to an advanced cardholder authentication approach. In addition, the card works without a battery as it’s powered by the terminal which means that there is no limit on the number of transactions. Enhanced contactless payment working with existing  infrastructure Intesa Sanpaolo’s initiative is the latest step forward in the bank’s ambitious digital transformation strategy. Fingerprint authentication sweeps away limits on the value of contactless payments, removing the need to enter a PIN or sign the receipt, As a result, it simplifies the consumer experience at the point of sale and makes it faster and safer. The card works with existing EMV card terminal infrastructure, so merchants can easily maximize the shopping experience delivered to their customers without the need to upgrade their current hardware or software. For issuers, the technology helps detect and prevent fraud, increase approval rates, reduce operational costs and foster customer loyalty. Fully secure, on the spot fingerprint enrolment Intesa Sanpaolo has 11.9 million customers and 4,400 branches in Italy. Gemalto’s solution includes secure onthe-spot fingerprint enrollment at selected locations and in the future customers could even enroll for the service at home. To ensure the right to privacy, biometric data is stored on the card itself, not the bank’s servers. Protection is further enhanced by the fact that personal data is encrypted and never leaves the card. “We are proud to have undertaken the first step to introduce in Italy a card which technology offers the consumers clear and concrete benefits, following our choice to anticipate and facilitate the diffusion of innovative technologies functional to people’s everyday banking,” said Cinzia Bruzzone, Retail Manager Intesa Sanpaolo, “The Intesa Sanpaolo – Mastercard pilot project, achieved with Mercury Payment System support, avails itself of Gemalto’s contribution as a global operator, who provided the technology behind the new biometric cards and the tools necessary for storing the fingerprint on the chip.” “Consumers are quickly recognizing the combined power of contactless and biometric technologies to take the stress and strain out of secure transactions,” said Bertrand Knopf, Executive Vice President Banking and Payment for Gemalto, “We are delighted to work with Intesa Sanpaolo and Mastercard on another pioneering project, this time bringing the effortless safety of a biometric sensor EMV card to their consumers.” Intesa Sanpaolo’s initial pilot will run in Turin, Milan, and Rome and is scheduled to last 16 weeks.

Read More

Gemalto Pilots Biometric Boarding at Los Angeles International Airport

Gemalto has announced a joint pilot with a leading airline to bring additional convenience and security to the traveler’s experience via biometric boarding in Terminal 4 at Los Angeles International Airport (LAX). The test will confirm that passenger needs and expectations are met through use of facial recognition versus a traditional boarding pass as well as satisfying CBP (Customs and Border Protection) U.S. Exit requirements. The world of travel is changing rapidly, and with air traffic expected to double and reach 7.8 billion passengers by 2036, airlines and airports are innovating to meet new government and consumer demands for enhanced security and efficiency. Gemalto will satisfy these needs together with biometric boarding using facial recognition. “Being able to use your face instead of your boarding pass will not only enhance security but allow passengers to board more easily and quickly,” said Neville Pattinson, SVP of Government Programs, Gemalto, “The passenger process is changing globally and we are pleased to be on the leading edge of this change by enabling our partners to offer improved service and security with our biometric capabilities.” Easier boarding process with minimal hardware and infrastructure changes for the airport and airlines The pilot program at LAX is uniquely flexible with regards to space limitations and future options as the solution will be integrated into the existing agent podium to facilitate boarding. Passengers will approach the gate and receive confirmation via a computer screen and camera following a facial verification from Customs and Border Protection’s Traveler Verification Services. Once verified, the captured images will be wiped from the system to ensure privacy for all passengers. At a recent Department of Homeland Security biometric testing rally Gemalto’s Live Face Identification System (LFIS) achieved a 99.44% successful acquisition rate in less then five seconds, comparing very favorably to the average of only 65% over the same period amongst the other vendors present.

Read More

Avigilon King Abdulaziz International Airport

Challenges To deploy a high-performance, reliable, and easy-to-use HD surveillance solution in KAIA’s 13 parking lots, terminal lobbies, retail shops, duty free areas, and restaurants for greater security, more efficient management, and to protect travellers and airport assets were a great challenge. Solution 274 Avigilon HD cameras ranging from 1MP to 16MP provide complete coverage of KAIA’s parking lots, terminals’ lobbies, and all internal mar ket shops; all of which are streamed and monitored around the clock in the airport’s state-of-the-art control room. Security personnel manage the Avigilon HD surveillance system using Avigilon Control Center Enterprise Network video management software. Benefits With the Avigilon HD Surveillance System installed, security officers can easily navigate and manage its 274 cameras, delivering irrefutable evidence to facilitate investigations, monitor inventory levels, and ensure best practices in terminal lobbies and all market shops. The airport lowered installation and labor costs by reducing the number of cameras required from 2300 analog-based cameras to just 274 Avigilon HD cameras. Leveraging Avigilon’s use of JPEG 2000 compression technology and high definition stream management technology, KAIA was also able to achieve superior image quality with minimal network bandwidth requirements.  

Read More

Gallagher LABS London

Many companies who hire space are high tech, and therefore they expect the facilities they work in to include the latest technology. The challenge LABS faced when developing a co-working environment was to offer a safe and secure working environment that is easy to use by both the clients and staff, and uses the latest technology features and provides flexibility and future proofing.   The Gallagher solution The Gallagher solution was specified for the project because of the central hub it provides, as well as its ability to integrate with a number of products such as visitor management software (VMS) and CCTV. The Gallagher channel partner was able to offer a tailored security package that ensured LABS premises are safely monitored, guaranteeing smooth day-to-day operation. The business value Community Manager at Camden, Fran, is able to use Gallagher Command Centre for a number of tasks such as monitoring who enters the building including visitors, checking which meeting rooms are reserved, what hospitality is required etc. Leases can be short, medium or long term and range from the occupation of offices to desks. This means there are lots of leases starting and ending at different times making it difficult to keep track. By integrating with Command Centre access can be instantly revoked should a lease lapse, saving Community Managers time by not having to manually deny access.

Read More

Matrix Manages UAE Based One-stop Retail Chain

A chain of one-stop shopping destinations is one of the pioneers of discount shopping centers in UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors, and electronics including mobile phones and computer accessories are also available here. The stores offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah, being the biggest branch till date. Challenges Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky chal lenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Solution offered Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. The solution also allowed generation of several specific types of reports with de tailed filtering options for smooth process and analysis of employees’ attendance details. Results Matrix people mobility management solution assisted the retail chain achieve following results: Centralized attendance management and monitoring. Easy shift & schedule management. Elimination of overtime issues. Smooth HR process with various precise reports. Products COSEC DOOR FOT: Fingerprint and card based door controller for time-attendance. COSEC CENTRA ME: Application server platform with 500 or more users and expandable up to 1,000 users. COSEC ME TAM: Time-attendance module for 500 or more users. COSEC USER 100: User license for 100 users

Read More

Rethinking Cybersecurity in the Digital Transformation Age

During the last couple of years, most enterprises have been accelerating the pace of their digital transformation based on the adoption of leading-edge ICT technologies like cloud/ edge computing, big data and the Internet of Things (IoT). At the same time, organizations are still suffering from security attacks, which are among the most important barriers in the implementation of their digital transformation agendas. Earlier this year, the famous ‘Wannacry’ ransomware attack affected major organizations all around the globe such as UK’s NHS (National Health Service). Another example was a fraudulent cyberattack against the SWIFT international transactions system that took place in February 2016 and resulted in the theft of $81 million from the Bangladesh Central Bank. These attacks highlight the vulnerabilities of modern cyber infrastructures, as well as the importance of cybersecurity as an integral element of an organization’s digital transformation strategy. It is important to understand the main drivers and trends in future cybersecurity solutions to make the most of security investments. Drivers of future cybersecurity The expanding scope and sophistication of cybersecurity systems are based on the following: Technology evolution As a result of the introduction of new technologies like cyber-physical systems (CPS) and IoT, enterprise IT infrastructures are gradually growing in size and complexity. These paradigms are typically based on systems and devices that bridge the physical and digital worlds such as sensors, smart machines, connected cars, robots and more. While these systems provide opportunities for enhanced productivity and improved decision making, they also broaden the scope of potential vulnerabilities. For example, a large-scale Distributed Denial of Service (DDoS) attack that exploited vulnerabilities of IoT devices took place last year and affected major Internet sites like Amazon, Twitter and Spotify. Regulatory complexity Nowadays several organizations operate in complex regulatory environments, which impose a need for compliance with many security regulations and standards. For instance, U.S. financial organizations must adhere to regulations associated with the Payment Card Industry Data Security Standard (PCI DSS), the Sarbanes-Oxley Act of 2002 (SOX, P.L. 107-204), the Gramm-Leach-Bliley Act, the Financial Services Modernization Act of 1999, and more. Cybersecurity systems are evolving in order to support organizations in their alignment to the required regulations and standards. Sophistication of attacks Over the years, cybersecurity attacks are increasing in sophistication through becoming asymmetric and less predictable. For example, ransomware attacks have been added to the list of phishing, DDoS and social engineering attacks, while the methods used by cybercriminals are constantly evolving based on the use of advanced sniffing and encryption techniques. Limited resources Many businesses lack the resources, expertise and equity capital needed in order to cope with modern cybercrime. This is particularly the case with SMB (small medium businesses) typically on the hunt for cost-effective solutions. Emerging cybersecurity solutions & services Driven by the above factors, emerging cybersecurity solutions feature the following characteristics: Security automation and intelligence The automation of cybersecurity solutions is the key to coping with the growing number and sophistication of cybersecurity threats. This gives rise to the implementation of machine learning systems, which are able to detect attack patterns in a fully or semi-automated fashion. There is also a trend towards employing deep learning and artificial intelligence technologies to identify indicators of complex attacks, which are hardly identifiable based on conventional machine learning. Cybersecurity datasets and data-driven approaches The collection of security related datasets is becoming very important for the development of future cybersecurity systems. These datasets are a key prerequisite for training and validating the data-driven systems including machine learning and AI algorithms. Without large amounts of data about the operation of the cyber assets and the attack incidents against them, the deployment of security automation and intelligence isn’t possible. Standards Standards development organizations tend to incorporate latest technologies and best practices in their work. So, standards based solutions are usually more effective in increasing the cyber resilience of modern organizations. The latter need to adopt and implement not only conventional and well-established standards (e.g., the popular ISO27001), but also emerging ones such as the Industrial Internet Consortium Security Framework (IISF). The latter provides a blueprint for securing CPS systems in the era of Industry 4.0. Integrated policies for cyber and physical security As part of the integration of IoT and CPS systems there is a close interaction between cyber and physical systems including an inter-play between their security mechanisms. For example, electronic access gates and CCTV (Closed Circuit Television) systems are increasingly used as primary physical security technologies. This close interplay is gradually leading to an integration of physical and cybersecurity measures and related policies. Sectors that operate both cyber and physical infrastructures (e.g., energy, transport, buildings) have the leading role in this integration. Vulnerability databases Following many years of collecting information and knowledge about cyberthreats, the cybersecurity community has established a range of vulnerability databases, which are used to maintain and disseminate information about known security vulnerabilities. NIST’s National Vulnerability Database is one of the most popular databases of this category, which provide developers and deployers of cybersecurity systems with the means to automatically access up-to-date information about cyber threats. This is important because of the need to support the collection and processing of large amounts of data towards security automation and intelligence. Managed Security & Security as a Service There is a surge of security solutions that are offered based on the Security-as-a-Service paradigm or as a pay-as-yougo option. Typical examples are the popular managed security solutions (MSS), which are a primary choice for SMBs and other organizations that operate based on constrained budgets. Solutions for small organizations come with easy web-based interfaces for their configuration, which makes them appealing to employees with low security expertise. Decentralization & Blockchains The advent of the BitCoin cryptocurrency has revealed the capabilities of the distributed ledger technology towards decentralizing and securing transactions across IT systems and devices. Distributed ledger technology is currently exploited as a secure, privacy preserving and anti-tampering infrastructure in a wide range of applications beyond financial transactions and it’s therefore likely to become mainstream…

Read More