securitylinkindia

INTERPOL Hits Wildlife Trafficking

A joint worldwide customs and police operation has resulted in the seizure of large quantities of protected flora and fauna across every continent. Recently, INTERPOL and the World Customs Organization (WCO) coordinated Operation Thunderball, with police and customs administrations leading joint enforcement operations against wildlife and timber crime across 109 countries. The intelligence led operation identified trafficking routes and crime hotspots ahead of time, enabling border, police and environmental officers to seize protected wildlife products ranging from live big cats and primates to timber, marine wildlife and derived merchandise such as clothing, beauty products, food items, traditional medicines and handicrafts. A team of customs and police officers together coordinated global enforcement activities from an Operations Coordination Centre at INTERPOL’s Global Complex for Innovation in Singapore. Worldwide environmental impact Initial results have led to the identification of almost 600 suspects, triggering arrests worldwide. Further arrests and prosecutions are anticipated as ongoing global investigations progress. Global seizures reported to date include: 23 live primates, 30 big cats and large quantities of animal parts, 440 pieces of elephant tusks and an additional 545 Kg of ivory, More than 4,300 birds, Just under 1,500 live reptiles and nearly 10,000 live turtles and tortoises, Almost 7,700 wildlife parts from all species, including more than 30 kg game meat, 2,550 cubic meters of timber (equivalent to 74 truckloads), More than 2,600 plants, Almost 10,000 marine wildlife items, such as coral, seahorses, dolphins and sharks. The operation saw half a tonne of pangolin parts bound for Asia seized in Nigeria, and the arrest of three suspects in Uruguay attempting to smuggle more than 400 protected wildlife species. The operation highlighted the continuing trend for online wildlife trade, with 21 arrests in Spain and the seizure in Italy of 1,850 birds resulting from two online investigations. “Wildlife crime not only strips our environment of its resources, it also has an impact through the associated violence, money laundering and fraud,” said INTERPOL Secretary General Jürgen Stock, “Operations like Thunderball are concrete actions targeting the transnational crime networks profiting from these illicit activities. We will continue our efforts with our partners to ensure that there are consequences for criminals who steal from our environment.” Police-customs cooperation: A sustainable approach against organised wildlife crime “As clearly illustrated by the results of Operation Thunderball, close cooperation at international and national levels to combat wildlife crime must never be under-estimated,” said WCO Secretary General Kunio Mikuriya. INTERPOL and the WCO have a long history of cooperation, regularly supporting each other’s operations in the field. Operation Thunderball marks a new direction in their partnership, bringing them together as joint operational partners on the frontline to ensure wildlife trafficking is addressed comprehensively, from detection to arrest, investigation and prosecution. “Such initiatives will be replicated to raise awareness within the global law enforcement community on the gravity of global wildlife crime and to better coordinate cross-agency efforts, including the engagement of civil society groups to detect and deter wildlife criminal networks,” added Dr Mikuriya. Slight declines in the seizures of certain species are a sign that continued enforcement efforts are bearing fruit, and that compliance levels are improving. “For the sake of our future generations and the world we live in, it is vital that we stop criminals from putting livelihoods, security, economies and the sustainability of our planet at risk by illegally exploiting wild flora and fauna,” said Ivonne Higuero, CITES Secretary General. CITES is the convention on international trade in endangered species of wild fauna and flora, which ensures that international trade in specimens of wild animals and plants does not threaten their survival. “Operation Thunderball sends a clear message – we will continue to work closely with our International Consortium on Combating Wildlife Crime (ICCWC) partners in support of efforts to implement CITES and address wildlife crime, deploying our collective strength and expertise to ensure that no stone is left unturned and wildlife criminals face the full force of the law,” added Ms Higuero. Throughout Operation Thunderball, customs and police officers, supported by environmental authorities, wildlife and forestry agencies, border agencies and CITES management authorities, worked together to identify and intercept shipments containing flora and other species protected and regulated under the CITES convention. Coordinated jointly by INTERPOL’s environmental security programme and the WCO environment programme, Operation Thunderball is the third in the ‘Thunder’ series, following Thunderbird in 2017 and Thunderstorm in 2018. Operation Thunderball is financially supported by the European Commission’s Directorate-General for International Development and Cooperation as a deliverable of the ICCWC, the US Department of State’s Bureau of International Narcotics and Law Enforcement Affairs, the United States Agency for International Development and the UK Government, Department for Environment, Food & Rural Affairs.  

Read More

SDG 16 is the Key to the 2030 Agenda

As the High Level Political Forum on Sustainable Development recently began at the United Nations in New York, the global anti-corruption coalition Transparency International called on the UN to annually review Sustainable Development Goal (SDG) 16 – Peace, Justice and Strong Institutions. SDG 16 is one of six goals being reviewed in depth at the United Nations this week. SDG 16 includes commitments to fight corruption, increase transparency, tackle illicit financial flows and improve access to information. As such, the goal is critical to the entire 2030 Agenda, because corruption undermines progress on all other SDGs. “Whether the focus is ending hunger and poverty, ensuring access to health, education, and clean water for all, or protecting marine environments and combatting climate change, fighting corruption is an essential pre-requisite for advancing the 2030 Agenda,” said Delia Ferreira Rubio, Chair of Transparency International, “When aid is siphoned off by the corrupt, when politicians come under undue influence from vested interests, or when citizens are unable to hold their governments to account over the delivery of essential services, the entire sustainable development programme is set backwards.” The United Nations estimates that corruption, bribery, tax evasion and related illicit financial flows deprive developing countries of around US$1.26 trillion per year. This has recently been reinforced by IMF research showing that corruption reduces global tax revenues by US$1 trillion annually. “Reducing corruption is an important component of the sustainable development agenda, and one that all state parties have an obligation to address,” said Patricia Moreira, Managing Director of Transparency International, “The scale of the challenge and its impact on sustainable development should compel the UN to review SDG 16 every year and set concrete, advanced indicators to measure its progress.”  

Read More

2019 Thales Access Management Index

According to new research from Thales, almost half (49%) of businesses believe cloud apps make them a target for cyber-attacks. Surveying 1,050 IT decision makers globally, Thales’ 2019 Access Management Index revealed that cloud applications (49%) are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%). With cloud applications now a crucial part of day-to-day business operations, the majority (97%) of IT leaders believe that cloud access management is necessary to continue their cloud adoption. However, despite four in 10 (38%) organizations appointing a CISO due to concerns over data breaches in the past 12 months, and 79% of IT decision makers stating that CISOs are responsible for selecting the solutions their company has in place, just one in 10 (14%) are given the final decision on cloud access management. In fact, companies are more likely to put their faith in a traditional IT role, CIOs (48%) when dealing with this, suggesting a disconnection between the decision-making and implementation surrounding cloud security. “Thales protects our customers’ business by enabling them to securely access and use cloud applications. The 2019 Thales Access Management Index findings clearly show concerns surrounding cyber-attacks when deploying cloud applications. Trusted access to the cloud is key to our customers’ digital transformation, but without adequate investment in a dedicated CISO office, organizations will lack the leadership required to implement the correct security strategy or solutions to keep them secure in the cloud,” said Tina Stewart, Vice President Market Strategy for Cloud Protection and Licensing Activity at Thales. Breaches bringing changes Positively, the growing awareness of consumer data breaches has led to organizations taking action – almost all (94%) have changed their security policies around access management in the last 12 months. What’s more, the biggest areas of changes have focused around staff training on security and access management (52%), increasing spend on access management (45%), and access management becoming a board priority (44%). Obstacles blocking access management In spite of the updates to security policies, the majority of IT leaders (95%) believe ineffective cloud access management is still a concern for their organization. In fact, their biggest concerns are its impact on security (48%), IT staffs’ time (44%) and on operational overheads and IT costs (43%). Worse, when it comes to implementing access management solutions, they cited costs (40%), human error (39%) and difficulty integrating them (36%) as the biggest obstacles. When it comes to cloud solutions, three-quarters (75%) of organizations already rely on access management to secure their external users’ log-ins to online corporate resources. In particular, two-factor authentication is the most likely (58%) tool to be seen as effective at protecting cloud and web-based apps, followed by smart single sign-on (49%) and biometric authentication (47%). Stewart concluded, “While organizations are getting to grips with access management solutions, IT and business decision makers must ensure they understand the risks to their cloud solutions in order to implement the relevant ones. These solutions must be perimeter-free, compatible with a zero-trust model, and flexible and adaptive in order to make the most of the latest technologies such as smart SSO. Without effective access management tools in place organizations face a higher risk of breaches, a lack of visibility and incur extra costs from poorly optimized cloud.”  

Read More

Hikvision IPS Intelligent Video Analytics First to Join the Hikvision Embedded Open Platform (HEOP) Program

IPS Intelligent Video Analytics is the first company to join the Hikvision Embedded Open Platform (HEOP) program. Through HEOP, IPS will upload its cutting-edge analytics modules to Hikvision 5 series network cameras. The global HEOP program enables third-party providers to develop their own applications and install them directly on Hikvision cameras. This brings a greater variety of intelligent functionality directly to customers, while development partners can benefit from Hikvision’s global reach. Five innovative camera based analytics modules I PS Intelligent Video Analytics has decades of analytics expertise, and has developed a wealth of advanced analytics functionality. Through HEOP, IPS is embedding five analytics modules into Hikvision 5-series network cameras. They are motion detection, sabotage detection, intrusion detection, loitering detection and indoor detection. Motion detection This intelligent video analytics module offers real-time alerts when objects are seen to move within predefined areas. Sabotage detection Sabotage detection alerts users in real-time when attempts are made to tamper with the camera e.g., if the camera is covered, redirected, sprayed or blinded. Intrusion detection Intrusion detection delivers real-time alerts in the event of an intruder entering a secured outdoor area. Loitering detection This module delivers real-time alerts if individuals are loitering in monitored areas. Indoor detection The indoor detection module alerts users in real-time in the event of intruders entering secured indoor areas. More cost-effective, more flexible Embedding these modules into the cameras means there is no need for additional servers, which saves money for Hikvision customers and increases flexibility in solutions architecture design. One module can be operated per installed camera, and the data can be viewed easily on a web browser. Building on state-of-the-art technology The Hikvision 5-series network cameras are already impressive, combining DarkFighter low-light surveillance with high definition recognition for the first time. Improved codec technology also boosts transmission efficiency. The cameras are ideal for any where that needs 24-hour colorful images from streets and shopping malls to office buildings. Jens Berthelsen, Global Partner Alliance Manager at Hikvision said, “We’re excited that IPS has become our very first partner for the HEOP program. We’re looking forward to seeing how their functionality can help our customers extract new value from our Hikvision 5-series network cameras, while helping them to build even more streamlined, cost-effective security solutions.” Alain H. Benoit, Head of Marketing and Sales at IPS said, “The HEOP platform design makes it incredibly easy to integrate our video analytics into the Hikvision cameras. This integration provides customers with an advanced solution when it comes to real-time detection of suspicious objects or events.”  

Read More

Avigilon’s Product Line up for GSX 2019

Avigilon Corporation, a Motorola Solutions company, is showcasing some of its latest and most innovative products and technologies at GSX 2019 during September 10 to 12, 2019 in Chicago, Illinois. Avigilon will showcase the next generation of video analytics, artificial intelligence, access control and cloud solutions, as well as some of the integrations with Motorola Solutions. Avigilon will be demonstrating how these latest technologies are redefining how customers consume data in order to help them gain actionable information. Through the power of cutting-edge video analytics and AI, these new products and technologies can help customers verify potentially critical events and act faster. Avigilon will preview its latest solutions including: The most advanced edition of Avigilon’s Control Center (ACC™) video management software featuring Focus of Attention – a new concept for live video monitoring, powered by AI. The H5A camera line – built with Avigilon’s next-generation of advanced video analytics with the ability to detect more objects with even greater accuracy. The latest updates to Avigilon Appearance Search™ technology, a sophisticated deep learning artificial intelligence (AI) search engine that sorts through hours of footage with ease. New exciting features will be released closer to the show. The latest version of Avigilon Blue™, a subscription-managed cloud video security platform that enables flexible site monitoring and utilizes analytics that provide important information about a site. Avigilon unusual motion detection (UMD) technology, an advanced AI technology designed to continuously learn what typical activity in the scene looks like and focus the operator’s attention on atypical events that may need further investigation. The new high resolution H4 Thermal camera which combines patented Avigilon technology with heat-sensing capabilities to improve perimeter security in areas with poor visibility, difficult lighting conditions and absolute darkness. The integration of Avigilon Control Center (ACC) video management software into Motorola Solutions’ CommandCentral Aware and Ally.  

Read More

Sophos IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up

Sophos has recently announced the findings of its global survey, ‘the Impossible Puzzle of Cybersecurity,’ which reveals IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology. The survey polled 3,100 IT decision makers from mid-sized businesses in the US, Canada, Mexico, Colombia, Brazil, UK, France, Germany, Australia, Japan, India and South Africa. Cybercriminals use multiple attack methods and payloads for maximum impact The Sophos survey shows how attack techniques are varied and often multi-staged, increasing the difficulty to defend networks. One in five IT managers surveyed didn’t know how they were breached, and the diversity of attack methods means no one defensive strategy is a silver bullet. “Cybercriminals are evolving their attack methods and often use multiple payloads to maximize profits. Software exploits were the initial point of entry in 23 percent of incidents, but they were also used in some fashion in 35 percent of all attacks, demonstrating how exploits are used at multiple stages of the attack chain,” said Chester Wisniewski, Principal Research Scientist, Sophos, “Organizations that are only patching externally facing high-risk servers are left vulnerable internally and cybercriminals are taking advantage of this and other security lapses.” The wide range, multiple stages and scale of today’s attacks are proving effective. For example, 53 percent of those who fell victim to a cyberattack were hit by a phishing email, and 30 percent by ransomware. Forty-one percent said they suffered a data breach. Weak links in security increasingly lead to supply chain compromises Based on the responses, it’s not surprising that 75 percent of IT managers consider software exploits, unpatched vulnerabilities and/ or zero-day threats as a top security risk. Fifty percent consider phishing a top security risk. Alarmingly, only 16 percent of IT managers consider supply chain a top security risk, exposing an additional weak spot that cybercriminals will likely add to their repertoire of attack vectors. “Cybercriminals are always looking for a way into an organization, and supply chain attacks are ranking higher now on their list of methods. IT managers should prioritize supply chain as a security risk, but don’t because they consider these attacks perpetrated by nation states on high profile targets. While it is true that nation states may have created the blueprints for these attacks, once these techniques are publicized, other cybercriminals often adopt them for their ingenuity and high success rate,” said Wisniewski, “Supply chain attacks are also an effective way for cybercriminals to carry out automated, active attacks, where they select a victim from a larger pool of prospects and then actively hack into that specific organization using hand-to-keyboard techniques and lateral movements to evade detection and reach their destination.” Lack of security expertise, budget and up to date technology According to the Sophos survey, IT managers reported that 26 percent of their team’s time is spent managing security, on average. Yet, 86 percent agree security expertise could be improved and 80 percent want a stronger team in place to detect, investigate and respond to security incidents. Recruiting talent is also an issue, with 79 percent saying that recruiting people with the cybersecurity skills they need is a challenge. Regarding budget, 66 percent said their organization’s cybersecurity budget (including people and technology) is below what it needs to be. Having current technology in place is another problem, with 75 percent agreeing that staying up to date with cybersecurity technology is a challenge for their organization. This lack of security expertise, budget and up to date technology indicates IT managers are struggling to respond to cyberattacks instead of proactively planning and handling what’s coming next. “Staying on top of where threats are coming from takes dedicated expertise, but IT managers often have a hard time finding the right talent, or don’t have a proper security system in place that allows them to respond quickly and efficiently to attacks,” said Wisniewski, “If organizations can adopt a security system with products that work together to share intelligence and automatically react to threats, then IT security teams can avoid the trap of perpetually catching up after yesterday’s attack and better defend against what’s going to happen tomorrow. Having a security ‘system’ in place helps alleviate the security skills gap IT managers are facing. It’s much more time and cost effective for businesses to grow their security maturity with simple to use tools that coordinate with each other across an entire estate.” Synchronized security solves the impossible puzzle of cybersecurity With cyberthreats coming from supply chain attacks, phishing emails, software exploits, vulnerabilities, insecure wireless networks, and much more, businesses need a security solution that helps them eliminate gaps and better identify previously unseen threats. Sophos Synchronized Security, a single integrated system, provides this much needed visibility to threats by integrating Sophos endpoint, network, mobile, Wi-Fi, and encryption products to share information in real-time and automatically respond to incidents.  

Read More

7 Home Security Mistakes You Need to Avoid

Security is one aspect of our homes that we should never overlook. Instead, home security is something that we need to constantly evaluate and improve upon. There’s always an opportunity to improve the security of our homes; we just need to know where to look. Here are some common mistakes that homeowners commit when it comes to home security, as well as some tips to make sure your home is always secure and your family is always safe. Hiding a spare key outside This should go without saying, but you should never leave a spare key outside your home. Experienced home intruders will know all the common hiding places, so just avoid it altogether. If you absolutely need a backup plan to enter your home, consider giving a spare key to a trusted neighbour or purchasing smart door locks, which will allow you to remotely open your door, even if you can’t find your keys. Leaving doors and windows unlocked This may seem like a no-brainer, but there are many instances where you may forget to close and lock your doors or windows. For example, during a hot summer, you may decide to leave a few windows cracked while you’re out of the house. Or if you’re in a hurry, you might leave the house without locking the door. Leaving your doors and windows unlocked is an open invitation to home intruders, so always double-check them before leaving the house. If you decide to get smart locks, you can also use your smartphone to make sure your doors are locked while you’re away. Not securing your garage door I n addition to doors and windows, your garage is one of the most vulnerable areas of your home. Many garage doors are electronically controlled by universal remotes, which can be easily opened by other modified ones. To protect your property, never leave your garage-door opener in plain sight, and always secure your garage with a heavy-duty padlock or an automated garage-door lock, which will automatically lock your garage as soon as it closes. Having poor outdoor lighting A home invader wants to get in and out of your house as quickly and covertly as possible. Because of this, a home with a dark front or back garden will be their preferred target. Make sure there are no blind spots on the outside of your home. Get a light for your front porch that stays on all night, and place motion-activated floodlights around your property. Providing hiding spots for home intruders Thick shrubbery and tall plants are great ways to provide some extra privacy for you and your home. Unfortunately, they also provide great hiding spots for home intruders lurking in your garden. If your entire front garden is visible from the street, a home invader will most likely think twice before trying to break-in. If it’s possible, be sure to keep the plants in your garden trimmed and use accent lights and floodlights to expose dark areas. Posting your plans on social media You should never be too trustworthy of your ‘friends’ on social media. Globally, there are countless horror stories of people announcing their plans online and getting robbed by people in their social networks, so you always err on the side of caution. Wait until you return from your trip or event before talking about it on social media, and if you absolutely need to share your plans, do it with a private group of people you can trust. Having no security visible outside Savvy home invaders will know of all the latest security devices, and they’ll avoid homes if they know that they have effective security solutions in place. Sometimes, even just a security sign can deter a thief from breaking in, so get your devices set up, and make sure home intruders know that your home is protected. Some homeowners try to save money by mounting fake security cameras around the house, but experienced home intruders know all about the fake and ineffective devices you can buy. Home security is something you should never short-change, but there are ways to save money on effective home security solutions. With smart, Wi-Fi-connected security devices, you’ll always have home security at your fingertips, and you can respond to and prevent suspicious activity as it happens.  By Mohammad Meraj Hoda Vice President of Business Development Middle East & Africa at Ring  

Read More

Blockchain Technology Provides Biometric Technology Vendors an Edge

Biometrics to find high-growth opportunities in border control Rising consumer demand for convenience without compromising security is driving companies to adopt biometric technologies, propelling the $4.60 billion market toward $11.10 billion by 2023, at a compound annual growth rate of 19.3%. The proliferation of devices at the network’s edge and the rise of the Internet of Things (IoT) are creating a need for enhanced cybersecurity. In response, biometric companies are establishing new partnerships with blockchain technology companies to deliver identity management solutions. Meanwhile, the Biometric-as-a-Service business model is expected to gain considerable traction in both government and commercial applications. thentication. Artificial intelligence (AI) and machine learning will be increasingly used to complement biometrics and enhance security,” said Ram Ravi, Industry Analyst at Frost & Sullivan, “Besides, with smart connected devices shifting customer preferences towards alternate commerce channels, biometric market players are establishing a blockchain strategy to augment their offering.” Frost & Sullivan’s recent analysis, North American Biometrics Market, Forecast to 2023, covers the modalities of fingerprint, face, iris, vein, voice, and others. It presents the key growth drivers and restraints, the impact of micro and macro trends on the market, key competitors and their offerings, as well as the strategies that they need to adopt. The study examines the application sectors of government (border control, law enforcement, e-ID) and commercial (physical access control, logical access control, surveillance). “Biometrics has been gaining prominence in border control since 2017, with facial recognition showing potential to become a ubiquitous modality,” noted Ravi, “Airports are witnessing increasing biometric deployments across the United States due to the government’s focus on border control. Biometrics usage in law enforcement is also anticipated to rise gradually.” Vendors can tap further growth opportunities by: Offering greater visibility, machine-to-machine connectivity, and real-time interaction between people and assets to make the most of the rise of connected healthcare. Collaborating and partnering with select blockchain vendors. Including an AI engine. Providing cloud-based services. Building in-house capabilities to offer as value additions. Fostering partnerships with AI vendors to cater to the changing customer environment.  

Read More

The Evolution of Video Data Protection

Over the past year, we’ve been focusing on a lot of big buzzwords. Deep learning, artificial intelligence and cybersecurity are hot topics, and these trends undoubtedly define the current landscape. In today’s evolving business environment, none is more complex and challenging than cybersecurity. The growing number of cyber threats around the world has ensured that data security is a top concern for all types and sizes of organizations. It is more vital than ever to protect video and corporate data to ensure critical data is secure and safeguarded from unauthorized use. In addition to protecting IT assets, video data requires stringent logical and physical protection to ensure compliance and reduce unauthorized breaches. When seeking to ensure the protection of critical data, the first step of any effort should be the deployment of an infrastructure solution that can provide the highest levels of performance, resiliency and availability so that video data is stored without loss, protected from any failures, and always available when and where it is needed most. But ensuring data is protected from all sources is critical. A threat could enter from anywhere in an organization’s ecosystem and regardless of the nature of the attack, the cyber criminal’s goal is to exploit vulnerabilities quickly and profit from them. Therefore, the industry needs to ensure that it provides products and services that deliver resilient protection methods, align with current IT processes, and reduce the opportunity for exploitation. Below, we take a look at the ways in which companies are taking proactive measures to ensure robust levels of cybersecurity from point of manufacture to deployment. A changing tide With so much data to be protected, security leaders need to evaluate not only how to store video data but how to secure it along with its entire video surveillance ecosystem. In the past, this meant making sure that physical security processes were aligned so that an individual could not physically tamper with a camera; however, now the focus has turned to IT processes ensuring that no one can access the camera and its data via the network. This trend is quite a change from years past when cybersecurity wasn’t part of any physical security conversation. However, the adoption of IP connected devices made the cyberattack a genuine possibility. Additionally, cyber threats continue to increase and evolve in sophistication. The industry must stay proactive in its approach to mitigating these risks. Video surveillance is the first real IoT application, and in fact, connected cameras are ubiquitous. Since we have already seen the impact of unsecured IoT devices (the Mirai Botnet attack), there is a greater risk of additional vulnerabilities. Unforeseen risks could lead to more damaging attacks such as accessing or tampering with private video, controlling door locks and access control systems, disabling alarm systems, and more. The reality is that we continue to move toward a world of more interconnected devices and this will bring to light new cyber vulnerabilities. As security professionals, we are entrusted by our customers to provide secure products and guidelines to safeguard these products from potential hacking. By working together as an industry to provide a system that is rigid against cyber-attacks, we improve overall cyber protection, and this level of collaboration gains further importance going forward. A collaborative approach At Pivot3, we’ve looked carefully at how we can reduce network vulnerabilities. We’ve expanded our relationship with HyTrust, a leading data security vendor, to deliver secure and compliant video surveillance infrastructure solutions that ensure high levels of data protection. Through highly secure encryption and comprehensive role-based access control, HyTrust workload security solutions ensure the highest levels of data protection. Combined with Pivot3 HCI for video surveillance, we can deliver a video surveillance solution that meets the data security and compliance requirements of mission-critical environments. Let’s look at how these two functionalities can be used to protect video surveillance data: Encryption is typically a resource-intensive process that requires more powerful servers to maintain video performance, resulting in the need for customers to purchase additional costly hardware. By leveraging HyTrust’s software-based encryption, video system performance is maintained with nominal CPU overhead, eliminating additional hardware investments. Beyond encryption, HyTrust also provides a comprehensive feature set that secures all aspects of a video surveillance infrastructure. Role-based access control provided by HyTrust Cloud Control allows only authorized individuals to have control over system management, while forensic logging and auditing help achieve regulatory compliance. This is only an example of how we as a company are working to meet the cybersecurity needs of our customers. There are other solutions and processes to consider, and each security leader needs to evaluate what parameters work best for their environment. Regardless of the application, a secure, compliant video surveillance infrastructure enables organizations to maintain strict levels of cyber and physical security to ensure brand protection and data security, and that is our overall goal. By Brandon Reich – Vice President of IoT and Security for Pivot3  

Read More

Where are the Opportunities for Non-Leading Safety Suppliers Amid the Global Economic Slowdown?

Leading automation suppliers often have long-term relationships with their customers. These customers tend to be experienced in automation systems and are highly educated about safety concepts. As a result, these companies demand more advanced safety services from their automation suppliers. For leading automation suppliers, safety services present the biggest growth opportunities. The innate advantage held by these leading manufacturers is not easy for non-leading safety focused suppliers to acquire. Their clients tend to be more price-sensitive and have lower demand for high-end safety services. Economic challenges bring fear – and opportunity I n late 2018, an economic slowdown was seen in almost all major economies. The automotive industry in China showed a decline in sales in the last quarter of 2018, highlighting the potential economic risk in Asia Pacific. Brexit, the Italian economic crisis and other political and economic uncertainties are leading to decreased gross domestic product (GDP) growth and reduced manufacturing capital investments. As a result of the global economic slowdown, many OEMs and end-users have become more cautious and are postponing investment decisions. The global risks may not affect the safety market immediately, but the fear is contagious and creates uncertainty. However, where there is a challenge, there is also an opportunity. The global economic slowdown represents a turning point wherein many non-leading suppliers can target more high-end products and solutions to build better brand images. Clients soon will require basic safety products to meet the regulatory demands. Meanwhile, most clients are postponing investments on advanced safety projects to eliminate the risk of further negative sales performance. However, in the long term, the highest growth and highest revenue opportunities will come from the advanced integrated safety solutions in accordance with the developments of the IIoT. This is the good time for non-leading safety suppliers to cultivate new clients and promote a positive brand image by introducing high-end safety solutions. Creating a progressive brand image could help those suppliers enter the high-end market to capture long-term opportunities Safety market opens up On the other hand, with the acceleration of IIoT and connectivity, the market is embracing open standards. The OPC Unified Architecture (UA) is a machine-to-machine communication protocol that’s gaining popularity. The protocol can enable users of independent platforms to run their solutions on any operating system, allowing more advanced systems to be compatible with earlier systems, as well as enabling easier configuration and maintenance. Open industrial communication provides the foundation for non-leading suppliers to compete with larger manufacturers. As the amount of data generated at the machine-level increases, the network architecture should grow and change. The capacity and performance of standard Ethernet and industrial Ethernet may not keep pace with evolving needs. Released in 2018, the OPC UA time-sensitive networking (TSN) provides a vendor-neutral communications infrastructure for industrial automation based on open standards. OPC UA maps to IEC TSN to enable real-time, or nearreal-time, communication between different machines, controllers, clouds and other information technology solutions. In less regulated countries with more open market cultures, OEMs and end-users are willing to accept new concepts and qualified products that have competitive prices. According to the latest IHS Markit Machinery Production Market Tracker, the total revenue of Chinese machinery production in 2018 was $525 billion. With such a huge market base, China is one of the most promising markets and highest growth opportunities for suppliers, especially in the safety market. The market is still developing and normalizing its safety standards. Chinese IIoT and big data policies generate new opportunities As a national strategy, big data will be supported by key policies during China’s 13th five-year plan period. Driven by the demands of the logistics and material handling industry, the big-data industry will witness an annual growth rate of over 100 percent, as intelligent logistics based on IIoT become commonplace, according to an estimate from the Chinese government. All foreign suppliers are being encouraged by the Chinese government to cooperate with local enterprises to realize the success of IIoT. For those non-leading safety suppliers, this is a good time to enter the Chinese market because it will be easier to establish relationships with local clients. China is still demanding more advanced automation and safety solutions to shift to high-end manufacturing. Currently, China mostly requires basic safety products – with the sales of these products outperforming advanced safety components. Over 60 percent of China’s users, which usually are small and medium enterprises (SMEs), require basic-function safety products. Safety relays, E-stop and interlock switches are popular among these Chinese clients. However, national strategies illustrate the huge long-term opportunities in advanced products. The strategies now undertaken by safety manufacturing companies will shape the market share structure during the next five to 10 years. When trying to capture the opportunities in China, non-leading suppliers must make a trade-off between stable revenues in short-term and high-growth during the long-term. Basic safety components include E-stops, safety interlock switches, safety relays, safety mats and safety drives. Advanced safety components include light curtains, laser scanners, safety I/Os and safety programmable logic controllers (PLCs). In conclusion, the demand for IIoT, big data and open industrial connectivity is creating the highest growth opportunities for non-leading suppliers. Within developing countries, non-leading suppliers can acquire more market share by educating potential customers on the importance of safety solutions and by providing lower priced safety products.     By Jessica Nian  Research Analyst, Manufacturing Technology  

Read More