securitylinkindia

Aid for Smiling Angel

On May 28, the Yangtze Finless Porpoise Conservation Project was launched in central China’s Hubei province. As a part of this project, Hikvision joined forces with the World Wide Fund for Nature (WWF) and the One Planet Fund (OPF) to provide advanced products and technologies for protection of the Yangtze Finless Porpoise, the only aquatic mammal left in China’s longest river. When talking about endangered species in China, most people may immediately think of the Giant Panda. However, the Yangtze Finless Porpoise (renowned as ‘smile angel’ for the iconic perma-grin, and as cute as a panda), is even closer to extinction. The International Union for Conservation of Nature (IUCN) has identified it as ‘critically endangered,’ with only about 1,000 of them remaining in the wild in 2017. The good news is that more and more people have been working together in conserving the Yangtze River ecosystem, the home to the ‘smiling angel.’ The Yangtze Finless Porpoise Conservation Project is just an example. By using Hikvision’s equipment such as underwater cameras and unmanned aerial vehicles, the project will support the nature reserve in monitoring the Yangtze Finless Porpoises’ habits as well as the hydrobiological environment in an efficient way. It will also be able to collect necessary data for the research on the porpoise’s life habits in natural waters and for the improvement of protection. According to Lei Gang, Director of WWF Wuhan region, the number of Yangtze Finless Porpoises in this area has grown from only about 20 to nearly 100. However, it still requires joint efforts of governments, enterprises, NGOs and other social organizations to address the severe challenges and prevent those porpoises from extinction. As an important technical partner of this project, Hikvision is working closely with other partners to realize effective management of habitat patrol and protection for Yangtze Finless Porpoises. “In recent years, Hikvision has been deeply engaging in sustainable development initiatives, including our efforts to protect the Yangtze Finless Porpoise and the local biodiversity through innovative technologies,” said Fu Hao, Head of Hikvision Hubei Business Center in China.  

Read More

Delta Scientific DSC501 Prevents 2 Vehicle Attacks 8 Days Apart at Naval Station

Mayport Naval Station (Fla.) stops both intruders from penetrating grounds On June 3, 2019, when a man couldn’t produce credentials at Mayport Naval Station, he gunned his engine and attempted to enter. The security staff activated their vehicle access barrier, a Delta DSC501, to pop out of the ground. The vehicle crashed into it and was brought to a standstill. The violator was taken to the hospital and died two days later. Eight days later, on June 11, a man, driving a Ford F-350 truck, also tried to get on base. Again, the DSC501 popped out of the ground and the attacker collided with it where the truck was stopped in its tracks. The violator was arrested and is now facing state and federal charges. “This high security barricade was originally designed for the U.S. Navy and has also been selected for use at U.S. Embassies, among many others. Set in a foundation only 18 inches deep, the Delta DSC501 is able to survive and operate after a 1.2 million foot pound impact,” attested Greg Hamm, Vice President, Sales and Marketing, Delta Scientific, “In testing, the DSC501 not only stopped and destroyed a 65,000 pound (5.4 million foot-pounds) dump truck but the barricade continued to stand, preventing a potential second attack.” Its K12/L3 certification meets the government’s highest levels. With its shallow foundation and aesthetic design, this anti-terrorist barricade obviates the concerns of interference with buried pipes, power lines and fiber optic communication lines. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. The DSC501 is suitable for high water table locations and areas with corrosive soils. Delta Scientific Corporation is the leading manufacturer of vehicle access control equipment with over 260,000 square feet of production facilities in Palmdale, Calif. Delta’s three product lines consist of high-security vehicle barricade systems, parking control equipment and guard booths. Delta Scientific has been engineering and manufacturing vehicle access control equipment since 1974 and sells its products worldwide.  

Read More

HID Global Helps Put ID Cards and Documents into the Hands of Millions Throughout Africa

It is essential that governments be able to issue identification credentials so citizens can exercise their civic rights and duties, access programs and services, and travel freely to and from other countries. HID Global® has enabled numerous African countries to issue millions of these credentials as the company helps to propel a variety of initiatives across the continent aimed at providing ‘identity for all.’ “Secure issuance is a key part of our identity portfolio that is helping nations in Africa and other emerging economies close a big gap between citizens who have a legal way to identify themselves and those who don’t,” said Craig Sandness, Vice President & Managing Director – Secure Issuance with HID Global, “Our successes in Africa range from Angola’s voter ID card program to deployments in multiple countries that enable governments to issue national IDs, driver’s licenses, health cards, work permits and refugee identification credentials. We are also actively involved in designing programs for civil servants to securely access government buildings and government assets such as PCs or server rooms.” For many countries, an e-Passport is the building block of democracy and cornerstone of citizenship as their first step to launching an identification program. HID Global’s secure issuance offering spans all aspects of creating and managing these and other credentials and issuing them wherever citizens are located. Notable deployments in Africa include: Resident, healthcare and other national IDs: Eight African countries have either deployed or are developing one or more of these ID card programs using HID Global printers. Several are also in the early stages of deploying systems for issuing government employee ID cards for use by members of their military and police forces. Voter IDs: Angola used HID® FARGO® DTC5500LMX printers to roll out a voter ID program in over 200 municipalities and cities across the country. Over 650 systems were deployed in Angola to issue over 8 million cards in less than 8 months. ePassports: Several countries in Africa are using HID Global’s ID personalization systems for ePassports that provide successful identification and an easier travel experience for citizens. Driver’s licenses: HID Global’s decentralized driver’s license issuance solution is being used by several African governments. Noticeably, one country is using these solutions to speed program deployment for over 25 million citizens. The company is also supplying pre-printed smart cards that include various overt and covert security features. The cards are then personalized locally with photo, variables data, custom holographic laminate and owner biometrics using FARGO HDP5000 printers. Refugee identification: HID Global is working with international organizations to help connect African refugees with vital resources in multiple countries. HID FARGO HDP8500 and HDP5000 printers are being deployed at refugee camps to issue the necessary credentials for accessing food, water, shelter, financial aid, and educational and other services. Student IDs: The West African Examinations Council (WAEC) is using HID FARGO Direct-to-Card ID card printers/ encoders to improve the efficiency, accuracy and integrity of its educational testing program for more than 2 million students annually. The latest additions to HID Global’s portfolio address the challenges African nations face in issuing credentials to remote locations while also serving high-volume needs of large metropolitan areas. The company’s HID® FARGO® ConnectÔ solution enables ID cards to be issued from anywhere and any device via a web interface in a trusted environment, changing the paradigm for governments whose citizens live in distant, hard-to-reach locations with limited infrastructure. For governments that need to meet the needs of large metropolitan populations, the new HID FARGO HDP6600 printer offers the world’s fastest retransfer throughput for ID card personalization.  

Read More

Avigilon AI Technology Selected to Protect Independent Express Cargo

Avigilon was selected to help protect the security of Independent Express Cargo Ltd. in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC™ software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search™ and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras – including the H4 Pro, the H4 Multisensor and the H4A Bullet with self-learning video analytics – were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, Director of Independent Express Cargo, “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority – our customers.” “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, Chief Executive Officer of Usee.ie, “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”  

Read More

360 Vision Technology Helps Felixstowe Coastwatch Save Lives

The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organisation with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organisation established in 1994 to restore a visual watch along UK shores after many small Coastguard stations had been closed. “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” said Ian, “That would have been a prohibitively costly exercise for a charity-based organisation. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station. “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast. “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organised by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” said Ian, “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explained. Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch,’ a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” said Ian, “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any colour and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch is currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.  

Read More

Gemalto Identity Management System Empowers the World’s Citizens with Secure and Unique Identities

Users retain full control over their private and personal data Gemalto, a Thales company, is launching its Identity Management System (IDMS) that can help governments address the challenges posed by a world in which over one billion people have no official ID. Using the latest biometric capture and identity verification techniques, Gemalto’s solutions enable public authorities to empower citizens with a fully secured and trusted foundational identity. This system supports people identification and authentication so they can securely access online and offline services such as education or healthcare, and proves their right to participate in elections, apply for a passport or open a bank account. Users retain full control over their personal data, choosing how and when it is shared with service providers. UN targets universal provision of ID by 2030 The staggering number of citizens rendered invisible to public agencies by the absence of an official ID includes one out of three children worldwide. Most international financial institutions are supporting digital ID schemes in many countries over the next ten years. These initiatives are also backed by the UN, which has itself set the target of everyone on the planet having a legal identity by 2030. Mobile, biometric-based registration can reach remote and isolated areas Gemalto’s IDMS provides authorities with a fully integrated, end-to-end solution which can adapt to existing identity schemes and orchestrate its interactions. The process starts with registration of a person and capture of their biometrics, with easy to use mobile technology ensuring coverage can reach even the most remote regions. Registration is followed by entry onto a central database or civil registry and the creation of a unique individual identifier. Reaping the benefits of foundational ID This Foundational Identity can provide the basis for issuance of digital and physical ID credentials, and subsequent registration with numerous different public bodies and services. All these processes can be verified beyond doubt using the individual’s biometrics and unique identifier. Gemalto’s approach also offers citizens outstanding protection, and assurance that their data will not be used for commercial gain. Promoting inclusion, fighting fraud For governments, a universal ID program facilitates accurate planning of public services, and comprehensive social inclusion strategies. Robust protection against the threat of fraud is also provided as part of the digital ID platform to further boost efficiency, convenience and adoption of eServices. The foundational identity also eliminates the need for individual bodies such as those responsible for health and welfare, to continually repeat enrollment procedures. “A unique legal ID is a basic human right that can unlock access to many more – including education, welfare and participation in the democratic process,” said Frédéric Trojani, Senior Vice President Identity and Biometric Solutions for Thales, “Our identity management system leverages unrivalled experience in delivering digital identity solutions that empower citizens, defend their personal data, and ensure unhindered access to the rights and services.”  

Read More

Safe and Smart: The Differences and Similarities in IoT and Security Deployments in Global Cities

From the power of AI-enabled solutions to increased mobility through smart devices, the idea of the connected world is being shaped by the increased demand for and adoption of transformative technologies. These networked devices and platforms are having a significant impact on our daily lives, changing how we interact with each other, how we do business and how we communicate. Furthermore, these solutions are converging – allowing people and businesses to think about interacting with once separate entities in new and exciting ways. Most discussion around the connected world is centered on smart and safe city projects. These initiatives are emerging in cities around the world as a more reliable, efficient and cost-effective way to ensure safe, secure, intelligent and sustainable urban environments. According to a Black & Veatch Smart Cities and Utilities Report, an estimated 20 safe city pilot programs were underway in the United States in 2018, in addition to the other initiatives in place in Dubai, Singapore, London, Mumbai and many others. Building intelligence Both safe and smart cities rely on information collated from an array of sensors and databases combined with video data and analytics including facial recognition, behavioral analysis, license plate recognition and other intelligence. Effectively collecting, analyzing, storing and acting on all of this information in real time is critical to achieve the goals of both safe and smart cities. When you think about a smart city, I’m sure you imagine smart parking systems, streetlights and transportation systems. It is the emergence of these intelligent digital technologies that are critical in the effort to improve the quality of life of residents and make everyday services run smoothly. When you think of a safe city, I’m sure video surveillance cameras come to mind and some of those highly advanced scenarios with analytics that you’ve seen on CSI-type shows. In typical smart city projects, public safety takes a back seat – but it shouldn’t. The very foundation of a smart city is safety. A safe city means reduced crime and safer conditions for visitors, which is more attractive for local businesses. A strong public safety stance also helps improve response to potential incidents, stopping unwelcome behavior before it escalates further. But these functions – safe, smart or both – rely on data. The question then begs, what do we do with all this data being collected? The future of the intelligent city While most major cities rely on video, security and IoT platforms to better protect and optimize their communities, these solutions are often decentralized, disconnected, outdated, prone to failures and costly to maintain. Additionally, increased requirements for real-time analytics to improve situational awareness grow as data capture efforts increase. As collected data expands, traditional IT infrastructures often fall short of fulfilling the demands of safe and smart city initiatives. In addition to effectively monitoring, storing, securing, processing and mobilizing data from hundreds to thousands of cameras and sensors spread across a city at all times, a city’s IT infrastructure solution must integrate seamlessly with existing and new IoT technologies. Additionally, it must support the multi-use case demands of safe and smart city initiatives, as well as big data and analytics applications of video-based metadata, crowd management, sanitation, public transportation and traffic monitoring. An agile, software defined infrastructure solution with the right combination of performance, resilience and scalability can ensure all the elements of a city’s safety and security environment work together to protect citizens from crime and terrorism and mitigate risk associated with natural disasters and other threats. Additionally, it can support and facilitate communication between law enforcement agencies, fire and EMS departments, and public health and social service organizations. Intelligent hyper-converged infrastructure (HCI) allows for the consolidation of video management, IoT data collection, video and data analytics and storage, access control and other related safe and smart city applications onto a single, simple-to-deploy, easy-to-manage industry-standard appliance. Intelligent HCI eliminates the complexity of separate physical servers and storage and provides a more seamless way to scale the infrastructure as camera or sensor counts grow and analytics demands increase. Where smart and safe cities stand From my perspective, smart cities and safe cities are one and the same and that’s how it should be. As IoT technologies continue to converge, it will be easier for safe and smart devices to ‘talk’ to each other and build more intelligent, secure environments. This interconnectivity will be vital in not only creating convenient cities, but also ensuring those cities are safe for our people. Brandon Reich  Vice President of IoT and Security for Pivot3  

Read More

The Network Gets Smarter, Simpler and More Secure with Artificial Intelligence and Machine Learning

Cisco has recently announced software innovations designed to make managing and securing networks easier. As today’s businesses increasingly invest in digital technologies, IT teams are struggling under the amplified workload. To alleviate this burden and allow IT to focus on delivering innovation, Cisco is introducing new artificial intelligence and machine learning capabilities to allow IT teams to function at machine speed and scale through personalized network insights. As part of its broadened capabilities offering, Cisco is also unveiling innovations to more effectively manage users and applications across the entire enterprise network – from campus networks and wide-area networks, to data centers and the IoT edge. IT teams currently face a daunting challenge. According to 451 Research, nearly two-thirds of organizations report that their IT teams are facing increased workloads; but increased IT headcount is in the cards for only about one-third of companies in the coming year. At the same time, it has never been more imperative for IT to deliver great digital experiences in this hyper-competitive landscape. Bridging the gap between the needs of a business and the resources available requires innovative network automation and analytics tools, powered by data and underpinned by artificial intelligence and machine learning. Cisco, as a leader in networking and security, collects one of the most well-informed, context-rich telemetry data sets in the IT industry. Now, Cisco is leveraging new software capabilities designed to utilize deidentified and aggregated data, which when combined with Cisco’s 35 years of institutional knowledge building the world’s networks, results in more intelligent solutions that allow IT teams to operate more effectively. These new capabilities will grant IT teams: More visibility: No two networks are the same. Environments are always changing. Cisco continuously collects relevant data from local networks and correlates it against the aggregate deidentified data set to create highly individualized network baselines. These baselines constantly learn and adapt as the number of devices, users and applications evolves, and as environments change. Greater insights: Network complexity has grown beyond the human scale of processing. Cisco uses machine learning to correlate the immense amount of data coming from the network against the individualized network baselines to uncover the issues that will have the greatest impact on the network. This improves issue relevancy, alerting IT of the issues that matter most. It also discovers trends and patterns, so IT can pre-emptively identify issues before they become a problem. Guided actions: Cisco uses machine reasoning algorithms and automated workflows to perform the logical troubleshooting steps that an engineer would execute to resolve a problem. This helps IT detect issues and vulnerabilities, analyze the root cause and execute corrective actions faster than ever. “As the pace of change and diversity of the environment continues to rapidly evolve, Cisco is committed to continually simplifying our solutions,” said Scott Harrell, Senior Vice President and General Manager of Cisco’s Enterprise Networking Business, “Artificial intelligence and machine learning can enable businesses to efficiently discern which issues to prioritize, becoming more nimble and proactive. This will have a profound effect on network operations and the IT teams that run them. At Cisco, we’re future proofing our networks and the workforce through automation and intelligence.” Reducing complexity with the multidomain network To help customers simplify the unprecedented complexity of modern IT, Cisco is building an architecture that spans every domain of the intent-based network – campus, branch, WAN, IoT, data center and cloud. Cisco has created solutions optimized to meet the unique needs of each of these networking domains. Today, Cisco is introducing new integrations, so users have a secure, consistent experience no matter where, when or how they connect. The new integrations allow for end-to-end: Network segmentation: The integration of Cisco SD-Access with Cisco SD-WAN and Cisco Application Centric Infrastructure (ACI) makes it easier for IT teams to consistently authorize, onboard and segment users and devices across campus, branch, data center and cloud networks, even when users and applications change. Because of this segmentation, IT is able to safeguard against unauthorized access to sensitive data and critical applications. Application experience: Cisco now automatically conveys application requirements between the data center and the WAN, allowing the network to select the best path and prioritize traffic even if applications move or change. This allows IT teams to dynamically elevate application performance across the enterprise and branch. Pervasive security: As an industry leader in cybersecurity, Cisco is leveraging its security innovations across all domains. By extending the ability to detect threats in encrypted traffic across public clouds, and by protecting the campus, branch and WAN against threats, Cisco is providing the end-to-end security customers need. Cisco’s ecosystem drives innovation As the network becomes increasingly programmable, Cisco’s ecosystem of partners and developers has been crucial to drive innovation. To help organizations keep up with the relentless pace of change, Cisco DevNet, the company’s developer program, has introduced community-backed efforts to make adopting networking technology easy and accessible. This includes machine learning and artificial intelligence developer resources, which include use cases and resources to get started with new applications; the Cisco DevNet Automation Exchange, which contains a curated repository of code for all levels of network automation use cases; and the Cisco DNA Center Platform, which helps networking professionals and software developers alike to build new applications and integrations  

Read More

NIST Updates SP 800-171 to Help Defend Sensitive Information from Cyberattack

An update to one of the National Institute of Standards and Technology’s (NIST) information security documents offers strategies to help protect sensitive information that is stored in computers supporting critical government programs and high-value assets. The document, entitled ‘Draft NIST Special Publication (SP) 800-171 Revision 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations,’ now has a new draft companion publication, NIST SP 800-171B, that offers additional recommendations for handling controlled unclassified information (CUI) in situations where that information runs a higher than usual risk of exposure. CUI includes a wide variety of information types, from individuals’ names or social security numbers to critical defense information. When CUI is part of a critical program or a high value asset – such as a weapons system – it can become a significant target for high-end, sophisticated adversaries. In recent years, these programs and assets have been subjected to an ongoing barrage of serious cyberattacks, prompting the Department of Defense to request additional guidance from NIST. “We need to provide safeguards and countermeasures that can stand up to these attacks,” said NIST’s Ron Ross, one of the publication’s authors, “We are requesting comments on this initial public draft, which we hope will help organizations protect CUI against our most advanced and persistent adversaries.” NIST is accepting comments on both SP 800-171 Rev. 2, which received minor editorial updates, and SP 800- 171B until July 19, 2019. In the future, NIST plans to issue final versions of both publications. In addition, a previously available companion document, NIST SP 800-171A, will be updated with new assessment procedures for the enhanced security requirements. The original version of SP 800-171 appeared in 2015 and provided 110 recommended requirements to ensure the confidentiality of CUI residing on the computers of contractors and other organizations that interact with the government. The guidance in SP 800-171 supports more consistent and robust security implementations across the federal government’s supply chain. Over 60,000 unique business entities that serve as defense contractors are required to implement NIST SP 800-171 to protect CUI in their systems and networks. To address CUI in non-federal systems and organizations that support critical programs or that form part of a high value asset, NIST has created SP 800- 171B, which offers 32 recommended enhanced security requirements. This new companion publication does not alter the original guidance in the 2015 version, but simply provide additional tools to help deal with what are considered ‘advanced persistent threats’ – those adversaries which possess the expertise and resources to play the long game of cyber warfare. They often attempt to establish long-term footholds within a target’s infrastructure to steal information or undermine critical aspects of its mission, sometimes years after the initial breach. “When this happens, you need additional safeguards and countermeasures to confuse, deceive, mislead and impede the adversary,” Ross said, “The strategies in SP 800-171B can help you take away the adversary’s tactical advantage and protect and preserve your organization’s high value assets and critical programs, even after the adversary has penetrated your system.” “The game is not lost after that initial penetration or breach,” he said, “It’s just beginning.” The requirements in SP 800-171B are largely drawn from two other draft publications, NIST SP 800-160 Vol. 2 and NIST SP 800-53 Rev. 5, both of which NIST is developing to help engineer security into information systems. Ross cautioned that only a small fraction of organizations would need to employ the new requirements. “It’s important to recognize that these requirements will only be levied upon a small percentage of programs and assets,” he said, “Determining what those are is up to individual federal departments and agencies.” Recognizing that many contractors do not have the in-house resources to implement the requirements fully, the revised draft indicates how an organization might use appropriate third-party contractors to perform specific tasks such as evaluating an organization’s resiliency to cyberattack or providing a security operations center capability. Ross also said that the requirements could be applied on a voluntary basis far beyond the world of government contracting, including in critical infrastructure systems. “Everyone has high value assets, from small businesses to Fortune 500 companies,” he said, “These enhanced defenses are great tools for anyone to use. We do our jobs primarily for the federal government, but everyone gets to take advantage of NIST’s cybersecurity guidance.”  

Read More

Dallmeier HEMISPHERE Integrates with AnyVision Facial Recognition for Security and Business

German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier HEMISPHERE. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to forensic evaluations, the use of facial recognition technologies is becoming increasingly important for customers of video technology solutions. The integration of AnyVision’s technology will enable Dallmeier customers to utilize facial recognition data within various modules of the Dallmeier HEMISPHERE software platform. In this way, security and business processes can be optimised e.g., through blacklist/ whitelist procedures, marketing optimization through VIP-customer recognition, forensic evaluations in law enforcement procedures or the automation of access controls in office or manufacturing environments. This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data within various solution suites. Specifically, AnyVision’s facial recognition solution will be integrated into the Dallmeier HEMISPHERE SeMSy® video and security management suite, as well as in other solution suites of the HEMISPHERE platform such as the situational awareness/ incident management or data and security information management. “In today’s increasingly complex world, customers need solutions that can integrate powerful components from leading manufacturers within a single platform strategy. Partnerships like this with AnyVision ensure that our customers always have the optimal combination of leading technologies at their disposal,” said Dieter Dallmeier, Founder & CEO, Dallmeier, “Dallmeier’s solutions in sectors such as safe city, stadiums, airports, logistics, casinos and also in the processing industry cover more and more topics that go far beyond classic video security technology. This makes it all the more important to work together with the right partners for complementary technologies which, when combined, offer decisive added value.” Plug-and-play for easy integration The partnership is also part of AnyVision’s mission to make its innovative AI-powered technology available to more businesses and environments across the globe. Unlike other software solutions in the market, AnyVision’s software is plug-and-play for new and existing systems, and able to overcome challenges such as occlusions, different angles of view, and poor lighting conditions. AnyVision currently develops technology for security and surveillance, mobile authentication, access control, and real-world analytics. Boris Gokhman, Vice President of Strategic Partnerships at AnyVision commented, “Facial, body and object recognition have real-world benefits right now. Collaborating with best-of breed technology partners to help more organizations – working across diverse sectors – harness new capabilities and achieve those benefits is hugely important to us. We are delighted to be working with Dallmeier on this and look forward to expanding this partnership in the future.”  

Read More