securitylinkindia

Hikvision Introduces 2-Wire Modular Video Door Phone

Hikvision has launched its new 2-Wire modular IP video door phone for retrofitting in multi apartment buildings. This is an extension solution to already successful 2-Wire kits that are mainly used for small residential houses, using the same housing and components as the recently launched 2nd Generation IP video door phone technology. It ‘inherits’ its modular nature which makes it flexible for any scenario. The video door phone delivers all the benefits of IP surveillance through just two wires – data and power. This makes it simple to install, saving time and cost – great for retrofitting and modernizing large residential and office building projects. Full HD images give a clear picture of the door area on an indoor station. IR provides excellent night vision, and the inclusion of WDR (wide dynamic range) means there’s no problem if the camera is faced with direct light from outside. All in all, the indoor station screen will give a clear overview of the doorstep, and a mobile app can manage entry from anywhere. The modular nature of the video door phone gives the system massive flexibility with a range of modules to choose to build the right system for the scenario. This can also be integrated with video surveillance, access control and intrusion systems so it can be a seamless part of a total security solution. The 2-Wire system can be combined with IP intercoms through a network that is connected to power and data distributors while also sharing common accessories and modules. Other features include: Great looking image from camera that can be recorded in video surveillance system. High quality of audio even on noisy streets. Remote control via common mobile application. Simplified configuration. Optional wall or flush mounting installation. Common Hikvision software and application. Up to 16 additional cameras can be observed at the indoor station. Typical applications of this new product will be in modernization of residential apartment buildings, school buildings and office buildings.  “This extension to our video door phone range is a great example of Hikvision as a smart home security solution provider, combining intercoms with video surveillance, access control and intrusion,” said Bhupendra Kumar, Product Head, Video Door Phone, Prama Hikvision India, “It brings a variety of modern functions such as mobile app control, high resolution images delivered at high speed, and audio quality to bring residential intercom systems to the next level.”  

Read More

Axis Introduces High Performance PTZ Camera

Axis Communications has announced AXIS P5655-E PTZ Network Camera, a cost-effective, high-performance PTZ camera for versatile surveillance applications. It comes with the new generation chip offering improved im aging, enhanced security features, extended capabilities for analytics and radically more efficient video compression. AXIS P5655-E features a light sensitive sensor and Forensic WDR for clarity even when there’s both dark and light areas in the scene. Additionally, thanks to Axis Lightfinder 2.0 technology it captures low-light images with more saturated colors and sharper images of moving objects. Electronic image stabilization minimizes the effects of vibration and shaking. Including extended processing power for advanced analytics, it also offers a choice of four scene profiles (indoor, outdoor, forensic and traffic). For each profile, the camera automatically optimizes exposure time, white balance, aperture, sharpness, contrast and noise to suit specific scene requirements. Signed firmware and secure boot guarantees that the firmware hasn’t been altered and ensures only authorized firmware is installed, and if needed, secure boot guarantees that the camera is completely free of malware after a factory default. Key features include: HDTV 1080p with 32x optical zoom. Forensic WDR and Lightfinder 2.0. Signed firmware and secure boot. Focus recall and EIS. Zipstream with support for H.264 and H.265. To ensure flexible installation, this camera comes with two-way audio and four I/O ports. Furthermore, Axis Zipstream technology with support for H.264 and H.265 significantly lowers bandwidth and storage requirements.  

Read More

Exacq C-Series Takes the Guesswork Out of Live Video Monitoring

Johnson Controls introduces the new exacqVision C-Series, taking the guesswork out of sourcing a system for a live video monitoring station. Built to achieve the kind of performance that the video security industry demands and guaranteed to achieve specific decode and display frame rates, the new C-Series monitoring station is the best way to experience exacqVision VMS. Tailor-made to meet the needs of video surveillance market, the C-Series supports 16-32 video streams at full HD and ensures smooth playback during live monitoring or search. The C-Series offers three options – Standard, Pro and Pro Plus – each with a unique processor and RAM capacity, designed by the same team who built the exacqVision client software. Available with a Windows 10 or Ubuntu 18.04 operating system, these video monitoring stations are designed by Exacq to deliver optimal performance and are easy to install. VESA-mountable, the C-Series systems can easily be placed on the back of a display monitor, wall, or other environment with space constraints. For exacqVision NVR customers, the C-Series brings an automatic advantage of consistency to the hardware ecosystem currently in place, streamlining installation, setup, and the customer support experience – all from one vendor – and ships with a 3-year warranty.  

Read More

Johnson Controls Tyco Cloud for Secure and Simple Security

Johnson Controls has announced Tyco Cloud, a new cloudbased security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organizations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet.   Tyco Cloud allows users to protect lives, assets and facilities through management of access control, video surveillance and other security operations using secure cloud services and connected devices such as cloud cameras and controllers. Cloud solutions from Tyco run on an open and modern microservices architecture to ensure fast, scalable and secure services. “Our customers worldwide are embracing and accelerating digital transformation to make their businesses more intelligent, agile and cost effective,” said Martin Renkis, General Manager of Cloud Solutions, Global Security Products at Johnson Controls, “Tyco Cloud empowers this digital transformation with on-demand security management that enables organizations to securely and cost-effectively customize their video surveillance and access control solutions based on site-specific and enterprise-wide requirements.” For video surveillance, organizations can enable Tyco Cloud with any Illustra Cloud camera or leverage existing camera systems using Tyco Cloud gateways, which will automatically locate existing cameras from dozens of different manufacturers on a network and enable secure cloud management of those cameras. Tyco Cloud enables video storage in camera, in gateway, in low latency cloud, in high latency cloud or a hybrid combination to support unlimited flexibility and cost effectiveness. The intuitive interface allows users to customize multiple recording parameters such as which cameras to record and for how long, video resolution, as well as create unique upload schedules to minimize bandwidth consumption. The service also offers Cold Cloud video storage for cost effective high latency online archiving. The new Hyper View feature enables users to search through 24 hours of recorded video from up to 100 cameras within 60 seconds. Tyco Cloud surveillance also supports powerful analytics such as heat mapping, object detection and crowd formation to name a few. For access control, the new ioSmart solutions from Tyco Cloud empower smartphone based mobile credentials and smart key managed access control for companies to securely allow personnel to conveniently access facilities using their smartphones without the security risk of lost, stolen, or cloning of legacy card technologies. Tyco Cloud ioSmart was cloud first designed to deliver convenience, cost savings and advanced security for access control. The Tyco Cloud Enterprise Manager portal provides users with a comprehensive view of their entire security solution through a single interface. It provides real-time status and management of every connected device on a clickable global map. This simple dashboard also enables tracking and management of users, bandwidth utilization, cloud storage and device firmware. Additionally, Tyco Cloud secures all data from any device to the cloud and to the end user. Every connected device as well as the cloud platform are supported by the Johnson Controls cyber solutions product security program, which delivers enhanced safeguards against cyber attacks, including additional controls for proper password management and end to end encrypted communications.  

Read More

Fire Accidents & Role of First Responder

  Fire safety assumes huge significance equally for a corporate and/ or a small enterprise. It begets proportionate impact on the businesses, and any lapse therein brings overwhelming bearing on the safety of personnel (loss of life), property, and data etc., and ultimately on the business of both entities. Majority of researches hitherto on the fire incidents that occurred across all business domains affirm that the ‘first responder’ plays the key role in diverting and mitigating the impact of a fire incident – whether the person is a security guard or an employee, or anyone else for that matter. His/ her prompt and correct reaction to the detection of fire may save many precious lives, and assets worth billions, while an erratic and/ or panic ridden reaction may cause loss of similar metrics. The compliance of building parameters as defined in the NBC 2005 in terms of the installation of fire detection and suppression systems within the building and in a premise also plays an equal role. There is a large number of fire incidents where the AP Securitas security guards have taken prompt and courageous actions to save lives and properties. They brought us laurels and appreciations from across the clients. We discuss one of the cases here: Profile of premise The branch office of one of our corporate clients is housed on the 4th and 5th floor of a five story building, called Bhanot House in Yusuf Sarai, New Delhi. While the branch manager and his staff operate from 4th floor, the advisors and others function from 5th. The aforesaid corporate client got the fire panel installed on both floors for fire detection and subsequent alarm. Their office working hours are from 09.30AM to 06.30PM, and the employees strength is approximately 150 including advisors/ agents. They observe every Wednesday as the ‘lights out day.’ Two security guards are on duty at a time in the day – one at each floor. There is no security guard at night after office closes in the evening. The building security at night is assigned to another security provider. Incident profile At about 06.30pm on the fateful day of 17 July 2019, when most of the employees had left and it was time to close the office, the branch manager instructed Uday Singh, who was the security guard deployed at 4th floor, to take a round of 5th floor and switch off all lights, and ensure that all employees had left. Mr. Angad who had left earlier that day due to some urgency at his home was the usual security guard at the 5th floor. While Uday Singh was climbing the staircase, he heard a hooter alarm. He rushed upstairs to the fifth floor where he found the training room was full of smoke up to the ceiling. There was a short circuit in the LED light mounted on the ceiling. The smoke had already spread through ceiling to the adjacent Server Room. He took prompt response, switched off the mains immediately and shouted loudly – FIRE! FIRE! FIRE! – to inform the branch manager. He dialed 101 to inform Delhi Fire Services of the fire in the premise, picked up the fire extinguisher installed on the 5th floor and entered the training room where the fire was in full blaze by then. Notwithstanding the risk to his own life, he used the fire extinguisher and doused the fire. Further, he proceeded to the Server Room which was locked by a glass door, broke the glass door and extinguished the fire using a second fire extinguisher. This is how he was able to save vital data stored in the server, and loss of other assets of not only premises of our client but of the entire building. The branch manager and the admin are the eye witness of this act of our brave security guard. This is just one incident which has been illustrated here but there are several others. For instance, two similar incidents took place in a premise of Sujan Vihar, Sector 43, Gurugram where the AP Securitas security guards saved the flat from fire in 2017. The fire broke out there when the owners of the flats had gone to their offices. Later, the concerned security guard was awarded cash prize by the RWA. In another similar incident in 2018, our security guard Buddha Prakash showed his dutifulness and saved the head office of another client from devastation due to fire located at Rattan Square building near Burlington Chowk, Lucknow. Lessons learnt Following vital lessons can be drawn out of these incidents: Adequate focus and weightage to fire safety in all types of training. Need to check premises on a daily basis just before the offices are closed. The importance of fire detection and suppression system in giving the early warning of the incident. Significance of multiple tasks needed to be done in a short span of time on detection of fire by the first responder. Selection of the right fire extinguishers for the type of fire identified. The training and confidence level of the first responder i.e., the security guard hold key to the success of the operation at the grass root level. The degree of ownership displayed and risk appetite demonstrated to depend upon the motivation and inspiration drawn from his trainer. The established system of reward and recognition in the company to enhance the level of motivation to security guards. Conclusion The score of high profile fire accidents during this year in Delhi-NCR and elsewhere in India has drawn the attention of the concerned authorities that resulted in the tightening of rules and regulations. However, the continuous pressure needs to be kept to ensure compliance. We in the APS Group take pride to state that our clientele has benefitted at large and ensured their premises are safe and secure through the dedicated team efforts of APS training team by ensuring regular fire safety inspections, fire safety audits, conceptualizing of building evacuation plans, ERT training, and…

Read More

Enterprise IT World & InfoSec Conducting the Third Chapter of 4 City CISO Security Symposium

The Delhi chapter of the Enterprise IT World and Infosec Foundation’s Security Symposium and Awards 2019 has been successfully concluded. The event is a series of 4 city CISO events aimed at initiating discussions on the security questions among the security leaders in the metro cities – Bengaluru, Kolkata, Delhi, and Mumbai. The theme for this year’s Security Symposium is ‘Zero Trust Security: Capitalizing on the Adoption Wave.’ At a time when cybersecurity breaches have become a contributor to the economic crisis in India, a platform like this allows the stakeholders to come together and discuss ways to control and mitigate the economic impact of cybercrime. The series of events saw a huge turnout wherein the security leaders came in and participated in panel discussions on topics like ‘Protecting Your Company and Your Customers from Cyber Attacks,’ and ‘Why a Zero-Trust Approach Can Make the Cloud More Secure.’ The Delhi chapter, Security Symposium, held at Hotel Le-Meridian on 9th August, was inaugurated by Lt. Gen Rajesh Pant (Retd.), Chief of National Cyber Coordination Centre; Dr. Pawan Duggal, Advocate, Supreme Court; Ms Orly Naomi Goldschmidt Gartner, First Secretary (Public Diplomacy), Israel Embassy; Sanjay Mohapatra, Group Editor, Enterprise IT World; and Sushobhan Mukherjee, Chairman, InfoSec Foundation and CEO – Prime Infoserv. In his inaugural address, Lt Gen Rajesh Pant (Retd.) said, “Cybercrime is taking away 2.5 percent of the GDP. In a tight microeconomic situation, the impact of cybercrime on the nation is very serious, this makes cybersecurity so crucial.” Emphasising the government’s stake on the issue, Pant said that the centre is working on a new strategy for cybersecurity that will be released early next year and will take into account the newly emerging technological threats with regards to 5G, IoT, and the likes. This new cyber security strategy is expected to set norms and standards that would help the enterprises to navigate towards a secure digital transformation. Dr. Pawan Duggal elaborated on the legal aspects of cybersecurity as prevalent in countries across the world and highlighted the areas where India’s own legal framework is lacking with respect to a comprehensive cybersecurity strategy. In addition to the keynote sessions and discussions, the leading CIOs and CISOs in the enterprise market were recognized with the Cyber Sentinel Awards 2019.  

Read More

Al-Khodari Opts for Matrix Time-Attendance Solution

Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste-water treatment, oil-gas and pipelines. It has 25 construction sites across the Middle East. Managing time-attendance, shifts, overtime and leave of 20,000 employees at different locations was a challenging process for them, and they wanted a centralized time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Challenges Al-Khodari is engaged in widespread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leave and overtime of 20,000 employees at different locations is a very time consuming and tedious task. Previously, the customer was using hand geometry solution, which was very time-consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading to loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralized time-attendance and access control solution which could be managed and controlled from the head office. Solution After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. Optical fingerprint-based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office where attendance data of all locations is collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Results The time required for salary calculation reduced by 30%. Productivity increased by 20%. Control of all sites through a live monitoring window. Error-free time-attendance and overtime data. Database management of all employees. Centralized report generation.  

Read More

Secureye Launches 4G Wi-Fi Outdoor Camera

Secureye, one of the leading security and surveillance solutions providers in both commercial and residential space, has recently launched 4G Wi-Fi outdoor camera with advanced tech integrations for the common users. The model SIP-2HDG-W40 is equipped with the latest path breaking technologies to keep the homes safe and secure. It is equipped with motion detection alarm, APP remote monitoring, intelligent Wi-Fi configurations, 24/7 monitoring capabilities and huge storage space; thus, making it the go to product for any consumer looking to ensure their safety. The home security space has evolved so much over the years that every bit of tech integration upgrades the whole ecosystem by many notches. Manish Agarwal, Director, Secureye said, “Home security is a prime concern for everyone. The product offerings from Secureye are built keeping in mind the tech innovations in the industry so that we can outdo the products available in the market. Our offerings are not just good but are always ahead of its peers. We hope that the cost-effective home solutions will keep everyone smiling without the threat of an untoward incident.” The video surveillance market which is growing at 10.5% CAGR is already over Rs.5000 crore in India. Fueled by the infra growth in both commercial and residential space the market is going to see lots of tractions in the demand for surveillance equipment.  

Read More

Future Ready U

Forces Network, a professional network of the military veterans in the corporate, has conducted a full day seminar on the theme ‘Future Ready U’ at Pride Plaza, Aerocity, New Delhi on 25 August 2019. “Today’s world is changing at a rapid pace. It offers continuous challenges as well as opportunities. However, to grab the opportunities, it calls for agility, informed decision making and taking massive action. Now if you consider the transitioning of military veterans embarking on a second career it seems that they would have to do a fair amount of heavy lifting to thrive in such a world. It was with this as the backdrop, the theme of the seminar was chosen. It aimed to inform and educate the seminar participants about the upcoming future trends and also how to prepare for them” – Col Iqbal Singh (Retd) Founder of Forces Network The seminar had an impressive lineup of marquee speakers. Prabhjeet Singh, Director, Operations and Head of Cities, Uber India & South Asia spoke on the future of mobility in a riveting talk. Randeep Sekhon, CTO, Airtel – an ex-IAF officer spoke about the apparent permanence of telecom industry in the future lives. He further emphasized upon the importance of learning new skills like computational thinking, new media literacy, trans-disciplinary abilities, design mindset, social intelligence, agility, and learning and unlearning ability. Vinay Gupta, Head of Data Analytics, SGSL made an extremely engaging presentation on data science whereby it was completely demystified for a layman to understand it. He also covered the path to building one’s skills as a data scientist. In the last segment of the seminar, there was an interesting discussion about whether in the era of digitalization, cloudification and virtualization would remain the jobs of physical security officers, or the chief info security officer (CISO) would take over these roles. The seminar was attended by convincingly a large number of participants – closed to 250 – who expressed a great deal of satisfaction over the content and conduct of the seminar. Strikingly, the participants came from across the length and breadth of the country such as Shillong, J&K, Cochin, Hyderabad and Binaguri etc. The seminar ended with an hour-long mentoring session where selected industry experts mentored the mentees in small groups of 4-6 people on a round table. They encouraged the mentees to ask questions – all that they wanted to ask and didn’t know where and whom to ask. The mentees found this session extremely enlightening. The Forces Network is more than 11 years old and it has more than 4900 members spread across the globe. Forces Network is focused on helping military personnel transition smoothly in to a corporate career and in building the network of the military veterans in the corporate.  

Read More

IBM Study Shows Data Breach Costs on the Rise

Breaches Pose Growing Risk for Small Businesses, Costing up to 5% of Annual Revenue IBM Security has recently announced the results of its annual study examining the financial impact of data breaches on organizations. According to the report, the cost of a data breach has risen 12% over the past 5 years comparison of the average global cost of a data breach from the 2014 Cost of as Data Breach Report to the 2019 report, which now costs $3.92 million on average. These rising expenses are representative of the multi-year financial impact of breaches, increased regulation and the complex process of resolving criminal attacks. The financial consequences of a data breach can be particularly acute for small and midsize businesses. In the study, companies with less than 500 employees suffered losses of more than $2.5 million on average – a potentially crippling amount for small businesses, which typically earn $50 million or less in annual revenue. For the first time this year, the report also examined the longtail financial impact of a data breach, finding that the effects of a data breach are felt for years. While an average of 67% of data breach costs were realized within the first year after a breach, 22% accrued in the second year and another 11% accumulated more than two years after a breach. The longtail costs were higher in the second and third years for organizations in highly-regulated environments such as healthcare, financial services, energy and pharmaceuticals. “Cybercrime represents big money for cybercriminals, and unfortunately that equates to significant losses for businesses,” said Wendi Whitmore, Global Lead for IBM X-Force Incident Response and Intelligence Services, “With organizations facing the loss or theft of over 11.7 billion records in the past 3 years alone, companies need to be aware of the full financial impact that a data breach can have on their bottom line – and focus on how they can reduce these costs.” Some of the top findings from this year’s report include: Malicious breaches – Most common, most expensive: Over 50% of data breaches in the study resulted from malicious cyberattacks and cost companies $1 million more on average than those originating from accidental causes. ‘Mega breaches’ lead to mega losses: While less common, breaches of more than 1 million records cost companies a projected $42 million in losses; and those of 50 million records are projected to cost companies $388 million. Mega breach cost calculations are based on an analysis of 14 companies, applying a Monte-Carlo analytic approach to simulate results of greater statistical significance. Practice makes perfect: Companies with an incident response team that also extensively tested their incident response plan experienced $1.23 million less in data breach costs on average than those that had neither measure in place. U.S. breaches cost double: The average cost of a breach in the U.S. is $8.19 million, more than double the worldwide average. Healthcare breaches cost the most: For the 9th year in a row, healthcare organizations had the highest cost of a breach – nearly $6.5 million on average (over 60% more than other industries in the study). Malicious breaches pose a growing threat; accidental breaches still common The study found that data breaches which originated from a malicious cyberattack were not only the most common root cause of a breach, but also the most expensive. Malicious data breaches cost companies in the study $4.45 million on average – over $1 million more than those originating from accidental causes such as system glitch and human error. These breaches are a growing threat, as the percentage of malicious or criminal attacks as the root cause of data breaches in the report crept up from 42% to 51% over the past six years of the study (a 21% increase). That said, inadvertent breaches from human error and system glitches were still the cause for nearly half (49%) of the data breaches in the report, costing companies $3.50 and $3.24 million respectively. These breaches from human and machine error represent an opportunity for improvement, which can be addressed through security awareness training for staff, technology investments, and testing services to identify accidental breaches early on. One particular area of concern is the misconfiguration of cloud servers, which contributed to the exposure of 990 million records in 2018, representing 43% of all lost records for the year according to the IBM X-Force Threat Intelligence Index 2019. Breach response remains biggest cost saver For the past 14 years, the Ponemon Institute has examined factors that increase or reduce the cost of a breach and has found that the speed and efficiency at which a company responds to a breach has a significant impact on the overall cost. This year’s report found that the average lifecycle of a breach was 279 days with companies taking 206 days to first identify a breach after it occurs and an additional 73 days to contain the breach. However, companies in the study who were able to detect and contain a breach in less than 200 days spent $1.2 million less on the total cost of a breach. A focus on incident response can help reduce the time it takes companies to respond, and the study found that these measures also had a direct correlation with overall costs. Having an incident response team in place and extensive testing of incident response plans were two of the top three greatest cost saving factors examined in the study. Companies that had both of these measures in place had $1.23 million less total costs for a data breach on average than those that had neither measure in place ($3.51 million vs. $4.74 million). Additional factors impacting the cost of a breach for companies in the study included: Number of compromised records: Data breaches cost companies around $150 per record that was lost or stolen. Companies that fully deployed security automation technologies experienced around half the cost of a breach ($2.65 million average) compared to those that did not have these technologies deployed…

Read More