securitylinkindia

New Revolution of IR Technology

Naturally, light is fundamental in determining video surveillance image quality. Featuring a unique optical design, robust light level calculation, and proprietary image processing, the new IR technology enhances image quality and light performance in security applications and provides clear and uniform night-time images even under severe lighting conditions. There are two fundamental techniques included in this new IR revolution – Vari-angle IR (VAIR) and Adaptive IR (ADIR). What’s new? Vari-angle IR (VAIR): Designed for vari-focal IP cameras When natural or artificial light is not available, IR illuminators are often used to enhance black and white night time images. Conventional IR illumination only covers a fixed general area. However, for long range PTZ surveillance, this limits the distance of the camera’s capable scope. Overcoming this limitation, the Vari-angle IR function on IP cameras are equipped with range adaptive IR which auto adjust the IR angles to precisely match the camera’s FoV without creating a hot-spot side effect. VAIR function supports on IR surveillance cameras provides efficient, uniform IR lighting intensity. It is an ideal choice for customers who require the ability to clearly capture video images in complete darkness and to detect previously invisible objects in a broad coverage FoV with IR illumination. Adaptive IR (ADIR): Designed for fixed-focal IP cameras I P cameras with Adaptive IR feature provide regional-controlled LED technology to improve image quality and brightness. Through advanced optical design, regional control and image analysis technology assisted brightness control, these cameras provide vivid imagery during night time surveillance. When a subject (e.g., an intruder) approaches the camera, excessive IR illumination can cause over-exposure and render an image unusable. By automatically dimming lighting on a near subject, ADIR technology avoids over-illumination while ensuring consistent overall brightness and clarity of all background detail. They are an ideal option for users who require clear imagery of completely dark scenes. How it works? Vari-angle IR (VAIR) Video surveillance requires a certain lux level of lighting to capture effective video images and in order to reliably detect people or objects. IR illumination is often used in poor lighting scenarios. Deploying the Vari-angle IR function on enabled network cameras will match the IR illumination to the camera’s lens angle. The optical zoom on speed dome IP cameras enables us ers to magnify their FoV with the performance of different IR illumination angles. The following table details the mapping between the optical zoom and the corresponding IR angle. Adaptive IR (ADIR) New Adaptive IR technology is designed with intelligence and control in mind. Adaptive IR divides image planes into multiple sections, with each section equipped with an independent IR control lighting device for regional illumination. This process ensures the retention of comprehensive details of any approaching subject while preserving clarity of the background image. Summary This revolutionary IR technology is an optical enhancement designed to empower users to view desired objects and capture video images with clear, identifiable detail in total darkness or at night. In low light environments, it is necessary to utilize these two techniques to produce usable image quality. With this intelligent technology, low light no longer means low vision.  

Read More

Major Considerations in Planning a Security System

As technology has been evolving very fast from year to year, it becomes a challenging task to determine parameters to build a secure, robust and almost fool proof system that will fulfill all basic security requirements. In practice, these parameters vary for each new system, and therefore the same cannot be applied across the board for all systems. Let’s assume a CCTV system as an example – for a robust CCTV system that can meet the security requirements of any new and/ or a green field project comprehensively; the following points will drive the decision-making process. Budget and time available to implement the security system. A thorough site survey. Detailed camera information such as mega-pixel rating, number of cameras required, location of each camera and it’s purposed function, type of camera – fixed, PTZ, indoor or outdoor, thermal performance, field of view etc., and any other requirements that are specific to the location of the camera to fulfill its intended function. Storage capacity per camera – both inside as well as outside the camera. Storage and network architectures of the CCTV system. Integration of other security components such as access control, perimeter intrusion detection systems, facial recognition, license plate recognition, under vehicle surveillance system, visitor management system, radar for areas not covered by cameras, and other special requirements. Remote access/ cloud connectivity. Physical guarding. Video analytics. Vendor(s) selection and so on. As such, there are several factors that influence the decision-making process in building a security system, let us elaborate some of them as given below: Available budget and time As in every sphere of life budget is the key factor. Based on the available budget and time, a determined effort needs to be put in place to prepare a project document of specific requirements. Several trade-offs need to be considered if the project requirements cost exceeds the available budget. This is an iterative process that consumes time and money in the planning phase. Each new or green field project, or an update/ refresh cycle of an existing deployment must go through this elaboration process to avoid nasty surprises in the implementation/ build phase. Site survey Conducting a site survey is the basis of building a security system. This phase is the most critical where a thorough site survey is done to determine security vulnerabilities. This also helps us determine as to what other systems are required to complement the main CCTV system. Once the required information is gathered from the survey and documented, it becomes the driving force for subsequent phases of the project. The best way to illustrate the process of building a security system is through an example. We are using an airport as the example. The following color coded table is used to distinguish the various inpurts/ requirements received from the customer. A typical airport is a super-set of any security deployment. We have used an airport as a used case. The illustrative airport diagram (#1) in the next page highlights all the components that constitute a surveillance/ security system. It also gives an idea of the other security components that need to be explored. The following table is a standard template that can be used to capture security requirements. These inputs are used to design the entire security system which can then be used to calculate the cost of the implementation. Using the above inputs from the customer and the respective bill of quantities (BoQs) for an airport, a complete design can be derived. The following table in the next page shows the output of the design process for 24 airports. Each airport has the same security requirements but BoQs are different. Once the design is complete by 90% of the target specification the budgetary process starts involving various vendors, RFQs etc. As the process varies with regions, geographical locations must be taken into consideration. Vendor selection Vendor selection has a significant impact on the quality, robustness and overall cost of the system. Customers desirous of building a security system can engage subject matter experienced consultants who can guide and evaluate all the variables/ entities in the decision making process. Cost optimization through simulation – The PGM way Design, build and implementation of a security solution are a complex system with many sub-systems within, that need to work in coordination with each other flawlessly. Every care must be taken in the early phases of the project as many variables are involved which can have a significant impact on the overall cost. One of the ways to enable this process is to run a simulation based on the customer inputs. Through a long and exhaustive experience we at the ‘PGM Security Group INTL’ have brought out the following facts: The customer knows what he wants but does not know how to get there. Almost all vendors oversell their products and services which do not benefit the customer in any way. A consultant is required in all cases to systematically evaluate all the options available and guide the customer to provide them with the highest performance at the lowest cost. The following graphs show how PGM simulator determines the highest performance at the lowest cost. The X-Axis shows the percentage of cameras running video analytics (VA), and the Y-Axis the cost in a standardized format. The delta between the lowest and the highest costs is 3x. VA stands for video analytics and VMS stands for video management software. The green line is the overall cost with the other colored lines that sum up the overall green line cost. Impact of Cost of Running Video Analytics for 24 airports Percentage of cameras running video analytics is the only single factor that influences overall CCTV system designed and hence overall cost. Can apply same design template across all airports as far as video analytics is concerned. Each airport has unique characteristics because of different BoQ camera quantities and functionality grouping of cameras. If one uses a single design template per airport then we run the risk of under…

Read More

PSARA 2005 : Critical Review and Analysis

Economists often talk about the institutional constraints which hinder the growth and development of a country, and one important example of such a constraint is the legal system in India. In 1998, a commission for the review of administrative laws in India was set up to examine all the central acts, and sets of rules, regulations and administrative instructions issued under different central acts. It was reported that there were 2500 central laws in force besides a large number of overlapping rules, regulations and instructions, and some of them could not even be traced out from the records. Further the legislatures of the states have also the power to enact laws as per concurrent list III (Seventh schedule) of the constitution whereby the states also issued state rules where central acts with model rules may be available already.  Labor laws Under article 246 of the Indian constitution, the subject of labor has been placed in the Concurrent List – except the labor and safety in mines, oilfields, and industrial disputes concerning union employees which were made the part of the Union list. Consequently, the enactment of labor laws by states has resulted in various loopholes such as inter-state variations in labor laws and their enforcement, the reports and returns under various labor laws are not uniform and standardized in all the states, and compliances are difficult as enforcement action varies from state to state. Moreover, in the case of a decision of discharge and/ or dismissal of a workman by the employer, it is the labor court which is to be satisfied with reasons, and if the labor court is not satisfied it may set aside the order of such discharge or dismissal. Similarly, a labor court may also set aside orders of reinstatements. Such blanket powers granted to the labor courts restrict the authority and freedom of employers, and that hinders the development of any industry. Private security industry Private security agencies were earlier required to comply with the statutory responsibilities under the labor laws and the rules prescribed thereunder, and other allied enactments like the Employees Provident Fund Act 1952, the Employees State Insurance Act 1948, the Equal remuneration Act 1976, the Minimum Wages Act 1948, the Workman Compensation Act 1923, the Payment of Gratuity Act 1972, the Interstate Migrant Workman Act 1979, and the Shops & Establishment Act 1958. Private Security Agencies (Regulation) Act (PSARA) was enacted in 2005 to oversee and regulate a large number of unregulated security groups and senas operating in the country. In the ‘Introduction’ to the Private Security Agencies (Regulation) Act 2005 it was laid that the growing tendency to hire private security guards had led to proliferation of private security agencies and there was a growing concern about the manner of functioning of these agencies, many of which were conducting their operations without any due care to even the verification of the an tecedents of the personnel employed as private security guards and supervisors. The union government was considering regulating the functioning of these private security agencies so that they are run within the legal parameters and are accountable to a regulatory mechanism. The private security agency regulation bill was passed by both the houses of parliament and received the assent of the President on 23 June 2005. This Act came into the statute book as ‘The Private Security Agencies (Regulation) Act 2005.’ Law and order – A state subject The seventh schedule of Article 246 of the Constitution has listed law and order/ police under the State List. Item 1 and 2 of the state list have often come in the way of any further mandate to be given to the center under Article 355, and any additional provision or amendment in the seventh schedule of Article 246, (State List), cannot be made without affecting the basic constitutional structure. Being a state subject, different state governments took their own time to frame state rules under PSARA. About twenty six states and UTs adopted PSARA and issued their rules at the end of 2010, and the remaining dispensed it by 2016. Analysis Any good law should be regulatory in nature. Though the acronym ‘PSARA’ connotes to ‘Private Security Agencies Regulation Act,’ but a number of provisions by way of restrictions and restrains inscribed in the Act are strangulatory in nature, and they are therefore not conducive for the growth and development of the sector. This can also lead to the legal wrangling and battles in the courts of law. In PSARA, some sections of the Act are not only restrictive but also vague and not properly worded. Their interpretations can vary and could create hurdles in the compliance of various provisions. Section 6(2) Section 6(2) of the Act lays down the eligibility criteria for procuring license for guarding services. The Section mentions that a person shall not be considered eligible for license for his firm, if the same is not registered in India; or is having the proprietor or a majority stakeholder or a director who is not a citizen of India. Intention of the provision is to allow licenses only to the companies and proprietors who are citizens of India; however, in the absence of any clear and direct limitation clause, there is a scope that the company could be run by someone from abroad by having stakeholders/ shareholders as Indian citizens. Section 7(4) Section 7(4) stipulates the need of making enquiries and verifications in writing for getting no objection certificate from the concerned authority for the purpose of registration and grant of license. The renewal of license under PSARA by the competent controlling authority is a painful, torturous and lengthy process. There are prolonged delays in view of the mind set of lower police functionaries. Further there is absence of proper dialogue or positive interaction between controlling authorities and the private security entrepreneurs which makes the process of verification and registration cumbersome and lengthy. Section 13 Section 13 defines the rank of controlling authority as the rank of…

Read More

Allegion & Identiv Announced Integration of Schlage® LE, NDE, AD-400 Wireless Locks

Allegion, a leading provider of security products and solutions, announced Identiv’s Hirsch Velocity Software and Mx controller now integrate with Schlage® wireless electronic locks for a highly scalable access control offering. The integration supports Schlage LE™ wireless mortise locks, Schlage NDE™; wireless cylindrical locks and AD-400™ wireless locks. “Allegion continuously looks for ways to improve security, efficiency and convenience for end users and integrators, which is why we’re excited to work with Identiv,” said Robert Lydic, Vice President of PACS/ OEM business at Allegion, “Schlage wireless locks are ideal for facilities that want an affordable way to upgrade traditionally mechanical doors to electronic credentials. When paired with Velocity Software, users can bring a reliable, seamless experience deeper into their buildings.” The award-winning, multi-door Hirsch Mx Controllers provide a wide range of features for enterprise-scale solutions. Hirsch Velocity Software is an integrated platform that manages access control and security operations, from single high-security rooms to multi-building, multi-location campuses, with the most stringent security compliance. When combined with the strength and flexibility of Schlage wireless locks, these offer an advanced access control solution that can be tailored to fit facilities of all sizes. These solutions are agile by design, enabling users to start small and grow as security needs evolve. “When flexibility and scalability are requirements, Velocity combined with Schlage’s wireless locking platforms is the perfect solution,” said Sam Tuthill, Identiv Senior Product Manager, “Velocity’s new integration with these Schlage wireless locks expands the capabilities of our software while incorporating the power of Hirsch Mx controllers.” This solution is ideal for customers looking to introduce or expand electronic access control in commercial real estate, K-12 and higher education campuses, assisted living buildings, medical offices and multifamily properties. Wireless electronic access control solutions allow users to secure more doors without the need to run wiring, enabling quick and easy installations with minimal interruptions. The Schlage LE wireless mortise lock, Schlage NDE wireless cylindrical lock and AD-400 wireless lock were designed to bring electronic access control beyond traditional perimeter and high-security openings. These locks are adaptable. The Schlage AD Series has a modular design that enables the reader or communication module to be changed as needed. The Schlage LE and NDE allow end users to upgrade from the ENGAGE web and mobile applications to a fully integrated system through a physical access control provider. The lock, credential reader, door position sensor and request-to-exit switch are combined in one unit to simplify installation and reduce costs.  

Read More

Dahua Wins Govies Award for Outstanding Security Product

Dahua Technology, a world-leading video-centric smart IoT solution and service provider, has been awarded a ‘Govie’ by Security Today, an integrated product and technology magazine for the North American security market. The award honors outstanding government security products in a variety of categories, including video surveillance cameras. “Each year we have the opportunity to view the latest and greatest products that will impact the government security sector, and this year’s contest is no different,” said Ralph C. Jensen, Editor in Chief of GovSec and Security Today magazines and the website SecurityToday.com, “The solutions that have been entered represent great technology and innovations. I applaud all our entries and appreciate their tireless efforts to secure the government sector.” An independent panel of judges from the security industry selected the winners in the 2019 Govies categories. The entries were evaluated for features, innovation, quality, design, market opportunity, and technical advances, among other characteristics. Dahua Technology’s Multi-flex™, a flexible, 4x2MP, multi-sensor camera, took home the Gold Award in the IP video surveillance cameras category. The Multi-flex boasts innovative flexibility, allowing users to position each sensor module independently around the camera’s internal track for 180-, 270-, or 360-degree fields of view. The camera’s integrated IR illuminators move along with the sensors for night time illumination. One of the Multi-flex’s notable benefits is that it can be easily configured to minimize blind spots and improve situational awareness. “The high-performing Multi-flex makes video surveillance more adaptable, easier to use, and more cost-efficient for a variety of vertical markets,” commented Jennifer Hackenburg, Senior Product Marketing Manager at Dahua Technology, “We are honored to be recognized for our contribution, which represents Dahua Technology’s continued innovation and commitment to quality.”  

Read More

Hikvision Announces Full-Year 2018 and First Quarter 2019 Financial Results

Hikvision, the world’s leading provider of innovative security products and solutions, has announced its fullyear 2018 financial results. The annual report shows a total operating income of RMB49.84 billion, corresponding to year-over-year growth of 18.93%. Net profits attributable to shareholders of the company amounted to RMB11.35 billion, corresponding to year-over-year growth of 20.64%. In 2018, the total operating income in domestic market was RMB35.65 billion, with year-over-year growth of 20.18%; while overseas operating income amounted to RMB14.19 billion, with year-over-year growth of 15.90%. The overall results were satisfactory given the complex market environment and slowdown in the domestic, Chinese economy. During 2018, Hikvision continued expanding the number of domestic provincial level business centres and opened five new overseas subsidiaries and multiple new branch offices. With confidence in the potential for future growth, the company maintained a high level of R&D investment and now employs more than 16,000 R&D engineers. The total workforce grew 31% to a total of more than 34,000 employees. The company also succeeded in launching new technologies, products and solutions. Among them, the Hikvision AI open platform was further consolidated to accelerate the deployment of intelligent applications; new-generation DarkFighterX series intelligent cameras were introduced to provide more clarity in dark places; and face recognition terminals that help improve building operations, workforce management and safety operations, to name a few. In 2018, Hikvision continued its investment in new busi ness areas. The EZVIZ Smart Home business demonstrated healthy growth and maintained profitability, while HikRobotics started to achieve profitability. Further investments were made in other new businesses such as Hikvision Automotive Electronics and Hikvision Intelligent Storage. Hikvision also announced its first quarter financial resultsdemonstrating a total operating income of RMB9.94 billion, corresponding to year-over-year growth of 6.17%. Net profits attributable to shareholders of the company was RMB1.54 billion, reflecting a year-over-year decrease of 15.41%. However, with recent increases in business opportunities in the domestic market and stable growth in overseas markets, the company do have a positive view on the second quarter of 2019. Hikvision is a world leading provider of security products and solutions. Featuring an extensive and highly skilled R&D workforce, Hikvision manufactures a full suite of comprehensive products and solutions for a broad range of vertical markets. In addition to the security industry, Hikvision extends its reach to smart home tech, industrial automation, and automotive electronics industries to achieve its long-term vision. Hikvision products also provide powerful business intelligence for end users, which can enable more efficient operations and greater commercial success. Committed to the utmost quality and safety of its products, Hikvision encourages partners to take advantage of the many cybersecurity resources Hikvision offers, including the Hikvision Cybersecurity Center.  

Read More

VIVOTEK Showcases Deep Learning Based People Detection Solution

VIVOTEK, a global leading IP surveillance provider, will showcase its latest comprehensive surveillance solutions at IFSEC 2019, during 18-20 June 2018 at ExCel London. They will present deep learning smart VCA, cybersecurity management solution, and a brand new license plate recognition camera. As one of the founding members of the Open Security & Safety Alliance (OSSA), VIVOTEK, in its shared pursuit of a common standardized platform, will also reveal an innovative Android-based AI camera at its booth. Deep Learning Based People Detection In the era of artificial intelligence, VIVOTEK aspires to bring more valuable analysis of human behavior to its solutions. Based on its self-developed deep learning based people detection technology, VIVOTEK has improved security with proactive detection and now focuses this technology on commercial opportunities. With accurate people detection technology, only the activities of persons will trigger an event. It thus significantly reduces false alarms as well as enhances operational efficiency by making use of data insight reports. Wide coverage 180-degree solution and cybersecurity protection VIVOTEK will demonstrate a series of 180-degree solutions offering panoramic supreme views for different applications. The 180-degree solution considerably reduces the total number of cameras required, and ultimately saves both cost and time spent on installation. In addition, VIVOTEK will introduce the latest end-to-end cybersecurity management solution and display how it responds to a live cyber attack targeted on network cameras at its booth. New license plate recognition solution As the demand for license plate recognition (LPR) rises, VIVOTEK continues to develop more advanced solutions to meet user requests. In IFSEC 2019, VIVOTEK will reveal the latest H.265 bullet license plate recognition camera, the IB9387-LPR. Featuring edge-computing technology, the brand new IB9387-LPR is embedded with license plate recognition software capability and is able to identify license plates on a black list or white list. It allows users to receive real-time recognition without delay and effectively reduces loading of the backend server. All of these features are making this camera an ideal product for parking access control and ‘stop & go’ toll applications. New Android-based AI camera for OSSA VIVOTEK is one of the five founding members of OSSA, the alliance aiming to create a common standardized platform for security and safety solutions. To support its mission, VIVOTEK has dedicated itself to developing its very first camera prototype on the Android platform to be displayed at IFSEC 2019.  

Read More

Avigilon Expands Subscription Cloud Service Platform into Australia & New Zealand

Avigilon Blue™, the company’s Video Security as a Service Platform, is now available in Australia and New Zealand. Powered by Microsoft Azure, Avigilon Blue is a subscription-managed video security platform featuring self-learning video analytics technology that detects the presence and movement of people and vehicles. When a potentially critical event is detected, the Avigilon Blue platform generates a notification to help business owners effectively self-monitor their security operations, while also offering the flexibility for users to contract a professional monitoring provider to efficiently verify and respond to events that may need further investigation. The Avigilon Blue platform enables video monitoring providers and integrators to remotely manage and service more customer sites with fewer resources. End-users benefit from easy web and mobile-enabled secure access as well as system upgrades that are pushed directly from the cloud, which help ensure systems remain secure and up to date. The platform’s architecture saves on bandwidth while making sure important video verification clips are archived in the cloud and accessible from anywhere. “The Avigilon Blue platform is designed to bring Avigilon analytics to virtually any security camera and help our customers simplify monitoring and event verification,” said James Henderson, Avigilon’s President, “We are excited to expand our cloud platform in Australia and New Zealand, bringing added value to our partners and their customers in the region.”  

Read More

CISO Benchmark Study: Anticipating the Unknowns

See no evil, block no evil Imagine if one could see deep into the future, and way back into the past – both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of the survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications and new data. The unknown is what keeps CISOs up at night. This report sheds light on what actions are reaping results in strengthening organizational cyber health. For example, when asked, only 35% confirm that it is easy to determine the scope of a compromise, contain it and remediate from exploits. It suggests that visibility into the unknown clearly is a key challenge. It means 65% of CISOs in the survey have room to improve. 46% said that they have tools in place that enable them to review and provide feedback regarding the capabilities of their security practices. While the good fight is far from over, it’s also far from being all bad news. At least some respondents in the survey seem to be feeling good about their jobs. When asked about cyber fatigue, only 30% of respondents claimed to suffer from cyber fatigue this year. While almost a third seems like a high number to be tapping the mat and raising the white flag, the drop from last year’s figure of 46% is moving in the right direction and this is worth the fight. State of the CISO For some time now, threat hunters have talked about knowing the unknowns. It’s time to expand that to the entire spectrum of cybersecurity – to users, apps, data and clouds. You can’t protect what you can’t see. You generally want to support the business, and not mire it down in bureaucracy. If you’re going to be a bit more open, how are you mitigating control? This is going to be different for everyone. CISOs must deal with that balance of organizational culture while combatting the most critical threats. Sometimes blocking everything and locking everything down doesn’t fit the culture of the enterprise. That might be right for a bank but not for a university. The CISO faces several challenges managing cyber-risk – whatever their organizational model: Breaches create adverse impacts to financial profitability, brand reputation, customer data security, customer satisfaction, and continuity of business. Losses can be substantial and non-recoverable, creating a higher risk score for the organization on insurability. Over the years, vendor point solutions looked promising; however, each generates their own set of alerts. Many point solutions competing on alerts makes it difficult to identify those threats posing the highest risk to the organization, and becomes a resource drain. IT is usually siloed across the organization, making inte gration of securing the network, the cloud, and employee endpoints highly complex. Aggressive tactics to hire security IT personnel are required, as the specialized pool of candidates cannot sustain the magnitude of the problem across global organizations. The talent shortage is, however, out of control and not solvable by trying to fill all jobs. New threats such as Emotet, Olympic Destroyer and others appear daily, even hourly, and are employing more stealth and sophisticated methods. Threat response as a category has to evolve and there is a need for tools to consolidate information and centralize remediation of infections and other incidents. Additional technologies and processes for the CISO to consider are: AI and ML, and used right are essential to triage the volume of work. The cost of a breach is falling – but don’t get too excited yet. There is head room to realize obvious benefits in process improvement e.g., training. There is more confidence in cloud-delivered security and in securing the cloud. 2019 findings The findings from the Benchmark Study revealed several areas that are critical to strengthening organization’s security posture. Set up for success? What does it mean to be a CISO day-by-day? What is their charter? The present survey revealed multiple areas that together determine a organization’s cyber health including being practical about risk, setting criteria for budgeting, collaborating across divisions, educating staff, conducting drills, knowing how to track outcomes to inform investments, and being strategic on vendor and solution implementation. Know your risk Risk management is hardly table stakes. Understanding the risks of cyberattacks and the compliance landscape that encompasses security breaches is paramount to understanding how to defend and prepare for the worst. When asked who were very knowledgeable about risk and compliance, only 80% of respondents were very knowledgeable. That leaves 20% of security professionals who could possibly use some of the discussed trainings. How to spend budget Almost half, or 47% are determining how to control security spending based on organizational security outcome objectives. Measuring outcomes against investments is the best data-driven approach. What’s more, 98% strongly or somewhat agree that their executive team has established clear metrics for assessing the effectiveness of their security program. 49% of respondents have metrics that are utilized by multiple areas of their companies to understand the risk- based decisions and improve processes to measure the security effectiveness throughout the organization. Back to the budget, and aside from outcome based measurement, there are some less healthy options. Controlling security spending on previous years’ budgets (46%) and percent of revenue respectively (42%) were both popular choices,…

Read More

LEGIC Orbit

LEGIC Orbit is the latest generation of a high-level key and authorization management solution that secures customer applications such as mobile ID and messaging from infrastructure components to back-end systems. It is the perfect choice for a secure creation, secure storage and secure distribution of cryptographic application keys. It can be used, wherever data integrity matters. In the need of a secure, convenient, instant and worldwide distribution of application keys, configuration data and much more, user-specific application keys can be generated, thanks to LEGIC Orbit, which are never visible to anybody, and can easily be distributed over the air. Secure key storage and flexible distribution Cryptographic keys are the central element for secure ID solutions and IoT projects and must be well protected. With LEGIC Orbit, the randomly generated application keys are always stored securely and are available at any time. LEGIC Orbit enables the distribution of cryptographic keys over the air to all the readers, so that they are ready for mobile ID and messaging applications. The LEGIC reader ICs contain a secure element to store the application keys. This is end-to-end security at its best. Full system control The new key and authorization management solution allows full control over all applications in a mobile environment. The users can just define the required security level of the system and use as many different keys as necessary, and then freely assign the right to configure readers to any trusted person on site. They benefit from a state-of-the-art security mechanism provided by LEGIC. This saves them valuable time to concentrate on their application design. How to use LEGIC Orbit To profit from the outstanding LEGIC Orbit advantages, the user only needs a LEGIC Connect account and compatible LEGIC reader ICs. LEGIC Orbit is already supported by these components.  

Read More