securitylinkindia

HID Global Helps Put ID Cards and Documents into the Hands of Millions Throughout Africa

It is essential that governments be able to issue identification credentials so citizens can exercise their civic rights and duties, access programs and services, and travel freely to and from other countries. HID Global® has enabled numerous African countries to issue millions of these credentials as the company helps to propel a variety of initiatives across the continent aimed at providing ‘identity for all.’ “Secure issuance is a key part of our identity portfolio that is helping nations in Africa and other emerging economies close a big gap between citizens who have a legal way to identify themselves and those who don’t,” said Craig Sandness, Vice President & Managing Director – Secure Issuance with HID Global, “Our successes in Africa range from Angola’s voter ID card program to deployments in multiple countries that enable governments to issue national IDs, driver’s licenses, health cards, work permits and refugee identification credentials. We are also actively involved in designing programs for civil servants to securely access government buildings and government assets such as PCs or server rooms.” For many countries, an e-Passport is the building block of democracy and cornerstone of citizenship as their first step to launching an identification program. HID Global’s secure issuance offering spans all aspects of creating and managing these and other credentials and issuing them wherever citizens are located. Notable deployments in Africa include: Resident, healthcare and other national IDs: Eight African countries have either deployed or are developing one or more of these ID card programs using HID Global printers. Several are also in the early stages of deploying systems for issuing government employee ID cards for use by members of their military and police forces. Voter IDs: Angola used HID® FARGO® DTC5500LMX printers to roll out a voter ID program in over 200 municipalities and cities across the country. Over 650 systems were deployed in Angola to issue over 8 million cards in less than 8 months. ePassports: Several countries in Africa are using HID Global’s ID personalization systems for ePassports that provide successful identification and an easier travel experience for citizens. Driver’s licenses: HID Global’s decentralized driver’s license issuance solution is being used by several African governments. Noticeably, one country is using these solutions to speed program deployment for over 25 million citizens. The company is also supplying pre-printed smart cards that include various overt and covert security features. The cards are then personalized locally with photo, variables data, custom holographic laminate and owner biometrics using FARGO HDP5000 printers. Refugee identification: HID Global is working with international organizations to help connect African refugees with vital resources in multiple countries. HID FARGO HDP8500 and HDP5000 printers are being deployed at refugee camps to issue the necessary credentials for accessing food, water, shelter, financial aid, and educational and other services. Student IDs: The West African Examinations Council (WAEC) is using HID FARGO Direct-to-Card ID card printers/ encoders to improve the efficiency, accuracy and integrity of its educational testing program for more than 2 million students annually. The latest additions to HID Global’s portfolio address the challenges African nations face in issuing credentials to remote locations while also serving high-volume needs of large metropolitan areas. The company’s HID® FARGO® ConnectÔ solution enables ID cards to be issued from anywhere and any device via a web interface in a trusted environment, changing the paradigm for governments whose citizens live in distant, hard-to-reach locations with limited infrastructure. For governments that need to meet the needs of large metropolitan populations, the new HID FARGO HDP6600 printer offers the world’s fastest retransfer throughput for ID card personalization.  

Read More

Avigilon AI Technology Selected to Protect Independent Express Cargo

Avigilon was selected to help protect the security of Independent Express Cargo Ltd. in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC™ software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search™ and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras – including the H4 Pro, the H4 Multisensor and the H4A Bullet with self-learning video analytics – were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, Director of Independent Express Cargo, “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority – our customers.” “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, Chief Executive Officer of Usee.ie, “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”  

Read More

360 Vision Technology Helps Felixstowe Coastwatch Save Lives

The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organisation with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organisation established in 1994 to restore a visual watch along UK shores after many small Coastguard stations had been closed. “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” said Ian, “That would have been a prohibitively costly exercise for a charity-based organisation. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station. “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast. “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organised by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” said Ian, “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explained. Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch,’ a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” said Ian, “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any colour and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch is currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.  

Read More

Gemalto Identity Management System Empowers the World’s Citizens with Secure and Unique Identities

Users retain full control over their private and personal data Gemalto, a Thales company, is launching its Identity Management System (IDMS) that can help governments address the challenges posed by a world in which over one billion people have no official ID. Using the latest biometric capture and identity verification techniques, Gemalto’s solutions enable public authorities to empower citizens with a fully secured and trusted foundational identity. This system supports people identification and authentication so they can securely access online and offline services such as education or healthcare, and proves their right to participate in elections, apply for a passport or open a bank account. Users retain full control over their personal data, choosing how and when it is shared with service providers. UN targets universal provision of ID by 2030 The staggering number of citizens rendered invisible to public agencies by the absence of an official ID includes one out of three children worldwide. Most international financial institutions are supporting digital ID schemes in many countries over the next ten years. These initiatives are also backed by the UN, which has itself set the target of everyone on the planet having a legal identity by 2030. Mobile, biometric-based registration can reach remote and isolated areas Gemalto’s IDMS provides authorities with a fully integrated, end-to-end solution which can adapt to existing identity schemes and orchestrate its interactions. The process starts with registration of a person and capture of their biometrics, with easy to use mobile technology ensuring coverage can reach even the most remote regions. Registration is followed by entry onto a central database or civil registry and the creation of a unique individual identifier. Reaping the benefits of foundational ID This Foundational Identity can provide the basis for issuance of digital and physical ID credentials, and subsequent registration with numerous different public bodies and services. All these processes can be verified beyond doubt using the individual’s biometrics and unique identifier. Gemalto’s approach also offers citizens outstanding protection, and assurance that their data will not be used for commercial gain. Promoting inclusion, fighting fraud For governments, a universal ID program facilitates accurate planning of public services, and comprehensive social inclusion strategies. Robust protection against the threat of fraud is also provided as part of the digital ID platform to further boost efficiency, convenience and adoption of eServices. The foundational identity also eliminates the need for individual bodies such as those responsible for health and welfare, to continually repeat enrollment procedures. “A unique legal ID is a basic human right that can unlock access to many more – including education, welfare and participation in the democratic process,” said Frédéric Trojani, Senior Vice President Identity and Biometric Solutions for Thales, “Our identity management system leverages unrivalled experience in delivering digital identity solutions that empower citizens, defend their personal data, and ensure unhindered access to the rights and services.”  

Read More

Safe and Smart: The Differences and Similarities in IoT and Security Deployments in Global Cities

From the power of AI-enabled solutions to increased mobility through smart devices, the idea of the connected world is being shaped by the increased demand for and adoption of transformative technologies. These networked devices and platforms are having a significant impact on our daily lives, changing how we interact with each other, how we do business and how we communicate. Furthermore, these solutions are converging – allowing people and businesses to think about interacting with once separate entities in new and exciting ways. Most discussion around the connected world is centered on smart and safe city projects. These initiatives are emerging in cities around the world as a more reliable, efficient and cost-effective way to ensure safe, secure, intelligent and sustainable urban environments. According to a Black & Veatch Smart Cities and Utilities Report, an estimated 20 safe city pilot programs were underway in the United States in 2018, in addition to the other initiatives in place in Dubai, Singapore, London, Mumbai and many others. Building intelligence Both safe and smart cities rely on information collated from an array of sensors and databases combined with video data and analytics including facial recognition, behavioral analysis, license plate recognition and other intelligence. Effectively collecting, analyzing, storing and acting on all of this information in real time is critical to achieve the goals of both safe and smart cities. When you think about a smart city, I’m sure you imagine smart parking systems, streetlights and transportation systems. It is the emergence of these intelligent digital technologies that are critical in the effort to improve the quality of life of residents and make everyday services run smoothly. When you think of a safe city, I’m sure video surveillance cameras come to mind and some of those highly advanced scenarios with analytics that you’ve seen on CSI-type shows. In typical smart city projects, public safety takes a back seat – but it shouldn’t. The very foundation of a smart city is safety. A safe city means reduced crime and safer conditions for visitors, which is more attractive for local businesses. A strong public safety stance also helps improve response to potential incidents, stopping unwelcome behavior before it escalates further. But these functions – safe, smart or both – rely on data. The question then begs, what do we do with all this data being collected? The future of the intelligent city While most major cities rely on video, security and IoT platforms to better protect and optimize their communities, these solutions are often decentralized, disconnected, outdated, prone to failures and costly to maintain. Additionally, increased requirements for real-time analytics to improve situational awareness grow as data capture efforts increase. As collected data expands, traditional IT infrastructures often fall short of fulfilling the demands of safe and smart city initiatives. In addition to effectively monitoring, storing, securing, processing and mobilizing data from hundreds to thousands of cameras and sensors spread across a city at all times, a city’s IT infrastructure solution must integrate seamlessly with existing and new IoT technologies. Additionally, it must support the multi-use case demands of safe and smart city initiatives, as well as big data and analytics applications of video-based metadata, crowd management, sanitation, public transportation and traffic monitoring. An agile, software defined infrastructure solution with the right combination of performance, resilience and scalability can ensure all the elements of a city’s safety and security environment work together to protect citizens from crime and terrorism and mitigate risk associated with natural disasters and other threats. Additionally, it can support and facilitate communication between law enforcement agencies, fire and EMS departments, and public health and social service organizations. Intelligent hyper-converged infrastructure (HCI) allows for the consolidation of video management, IoT data collection, video and data analytics and storage, access control and other related safe and smart city applications onto a single, simple-to-deploy, easy-to-manage industry-standard appliance. Intelligent HCI eliminates the complexity of separate physical servers and storage and provides a more seamless way to scale the infrastructure as camera or sensor counts grow and analytics demands increase. Where smart and safe cities stand From my perspective, smart cities and safe cities are one and the same and that’s how it should be. As IoT technologies continue to converge, it will be easier for safe and smart devices to ‘talk’ to each other and build more intelligent, secure environments. This interconnectivity will be vital in not only creating convenient cities, but also ensuring those cities are safe for our people. Brandon Reich  Vice President of IoT and Security for Pivot3  

Read More

The Network Gets Smarter, Simpler and More Secure with Artificial Intelligence and Machine Learning

Cisco has recently announced software innovations designed to make managing and securing networks easier. As today’s businesses increasingly invest in digital technologies, IT teams are struggling under the amplified workload. To alleviate this burden and allow IT to focus on delivering innovation, Cisco is introducing new artificial intelligence and machine learning capabilities to allow IT teams to function at machine speed and scale through personalized network insights. As part of its broadened capabilities offering, Cisco is also unveiling innovations to more effectively manage users and applications across the entire enterprise network – from campus networks and wide-area networks, to data centers and the IoT edge. IT teams currently face a daunting challenge. According to 451 Research, nearly two-thirds of organizations report that their IT teams are facing increased workloads; but increased IT headcount is in the cards for only about one-third of companies in the coming year. At the same time, it has never been more imperative for IT to deliver great digital experiences in this hyper-competitive landscape. Bridging the gap between the needs of a business and the resources available requires innovative network automation and analytics tools, powered by data and underpinned by artificial intelligence and machine learning. Cisco, as a leader in networking and security, collects one of the most well-informed, context-rich telemetry data sets in the IT industry. Now, Cisco is leveraging new software capabilities designed to utilize deidentified and aggregated data, which when combined with Cisco’s 35 years of institutional knowledge building the world’s networks, results in more intelligent solutions that allow IT teams to operate more effectively. These new capabilities will grant IT teams: More visibility: No two networks are the same. Environments are always changing. Cisco continuously collects relevant data from local networks and correlates it against the aggregate deidentified data set to create highly individualized network baselines. These baselines constantly learn and adapt as the number of devices, users and applications evolves, and as environments change. Greater insights: Network complexity has grown beyond the human scale of processing. Cisco uses machine learning to correlate the immense amount of data coming from the network against the individualized network baselines to uncover the issues that will have the greatest impact on the network. This improves issue relevancy, alerting IT of the issues that matter most. It also discovers trends and patterns, so IT can pre-emptively identify issues before they become a problem. Guided actions: Cisco uses machine reasoning algorithms and automated workflows to perform the logical troubleshooting steps that an engineer would execute to resolve a problem. This helps IT detect issues and vulnerabilities, analyze the root cause and execute corrective actions faster than ever. “As the pace of change and diversity of the environment continues to rapidly evolve, Cisco is committed to continually simplifying our solutions,” said Scott Harrell, Senior Vice President and General Manager of Cisco’s Enterprise Networking Business, “Artificial intelligence and machine learning can enable businesses to efficiently discern which issues to prioritize, becoming more nimble and proactive. This will have a profound effect on network operations and the IT teams that run them. At Cisco, we’re future proofing our networks and the workforce through automation and intelligence.” Reducing complexity with the multidomain network To help customers simplify the unprecedented complexity of modern IT, Cisco is building an architecture that spans every domain of the intent-based network – campus, branch, WAN, IoT, data center and cloud. Cisco has created solutions optimized to meet the unique needs of each of these networking domains. Today, Cisco is introducing new integrations, so users have a secure, consistent experience no matter where, when or how they connect. The new integrations allow for end-to-end: Network segmentation: The integration of Cisco SD-Access with Cisco SD-WAN and Cisco Application Centric Infrastructure (ACI) makes it easier for IT teams to consistently authorize, onboard and segment users and devices across campus, branch, data center and cloud networks, even when users and applications change. Because of this segmentation, IT is able to safeguard against unauthorized access to sensitive data and critical applications. Application experience: Cisco now automatically conveys application requirements between the data center and the WAN, allowing the network to select the best path and prioritize traffic even if applications move or change. This allows IT teams to dynamically elevate application performance across the enterprise and branch. Pervasive security: As an industry leader in cybersecurity, Cisco is leveraging its security innovations across all domains. By extending the ability to detect threats in encrypted traffic across public clouds, and by protecting the campus, branch and WAN against threats, Cisco is providing the end-to-end security customers need. Cisco’s ecosystem drives innovation As the network becomes increasingly programmable, Cisco’s ecosystem of partners and developers has been crucial to drive innovation. To help organizations keep up with the relentless pace of change, Cisco DevNet, the company’s developer program, has introduced community-backed efforts to make adopting networking technology easy and accessible. This includes machine learning and artificial intelligence developer resources, which include use cases and resources to get started with new applications; the Cisco DevNet Automation Exchange, which contains a curated repository of code for all levels of network automation use cases; and the Cisco DNA Center Platform, which helps networking professionals and software developers alike to build new applications and integrations  

Read More

NIST Updates SP 800-171 to Help Defend Sensitive Information from Cyberattack

An update to one of the National Institute of Standards and Technology’s (NIST) information security documents offers strategies to help protect sensitive information that is stored in computers supporting critical government programs and high-value assets. The document, entitled ‘Draft NIST Special Publication (SP) 800-171 Revision 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations,’ now has a new draft companion publication, NIST SP 800-171B, that offers additional recommendations for handling controlled unclassified information (CUI) in situations where that information runs a higher than usual risk of exposure. CUI includes a wide variety of information types, from individuals’ names or social security numbers to critical defense information. When CUI is part of a critical program or a high value asset – such as a weapons system – it can become a significant target for high-end, sophisticated adversaries. In recent years, these programs and assets have been subjected to an ongoing barrage of serious cyberattacks, prompting the Department of Defense to request additional guidance from NIST. “We need to provide safeguards and countermeasures that can stand up to these attacks,” said NIST’s Ron Ross, one of the publication’s authors, “We are requesting comments on this initial public draft, which we hope will help organizations protect CUI against our most advanced and persistent adversaries.” NIST is accepting comments on both SP 800-171 Rev. 2, which received minor editorial updates, and SP 800- 171B until July 19, 2019. In the future, NIST plans to issue final versions of both publications. In addition, a previously available companion document, NIST SP 800-171A, will be updated with new assessment procedures for the enhanced security requirements. The original version of SP 800-171 appeared in 2015 and provided 110 recommended requirements to ensure the confidentiality of CUI residing on the computers of contractors and other organizations that interact with the government. The guidance in SP 800-171 supports more consistent and robust security implementations across the federal government’s supply chain. Over 60,000 unique business entities that serve as defense contractors are required to implement NIST SP 800-171 to protect CUI in their systems and networks. To address CUI in non-federal systems and organizations that support critical programs or that form part of a high value asset, NIST has created SP 800- 171B, which offers 32 recommended enhanced security requirements. This new companion publication does not alter the original guidance in the 2015 version, but simply provide additional tools to help deal with what are considered ‘advanced persistent threats’ – those adversaries which possess the expertise and resources to play the long game of cyber warfare. They often attempt to establish long-term footholds within a target’s infrastructure to steal information or undermine critical aspects of its mission, sometimes years after the initial breach. “When this happens, you need additional safeguards and countermeasures to confuse, deceive, mislead and impede the adversary,” Ross said, “The strategies in SP 800-171B can help you take away the adversary’s tactical advantage and protect and preserve your organization’s high value assets and critical programs, even after the adversary has penetrated your system.” “The game is not lost after that initial penetration or breach,” he said, “It’s just beginning.” The requirements in SP 800-171B are largely drawn from two other draft publications, NIST SP 800-160 Vol. 2 and NIST SP 800-53 Rev. 5, both of which NIST is developing to help engineer security into information systems. Ross cautioned that only a small fraction of organizations would need to employ the new requirements. “It’s important to recognize that these requirements will only be levied upon a small percentage of programs and assets,” he said, “Determining what those are is up to individual federal departments and agencies.” Recognizing that many contractors do not have the in-house resources to implement the requirements fully, the revised draft indicates how an organization might use appropriate third-party contractors to perform specific tasks such as evaluating an organization’s resiliency to cyberattack or providing a security operations center capability. Ross also said that the requirements could be applied on a voluntary basis far beyond the world of government contracting, including in critical infrastructure systems. “Everyone has high value assets, from small businesses to Fortune 500 companies,” he said, “These enhanced defenses are great tools for anyone to use. We do our jobs primarily for the federal government, but everyone gets to take advantage of NIST’s cybersecurity guidance.”  

Read More

Dallmeier HEMISPHERE Integrates with AnyVision Facial Recognition for Security and Business

German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier HEMISPHERE. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to forensic evaluations, the use of facial recognition technologies is becoming increasingly important for customers of video technology solutions. The integration of AnyVision’s technology will enable Dallmeier customers to utilize facial recognition data within various modules of the Dallmeier HEMISPHERE software platform. In this way, security and business processes can be optimised e.g., through blacklist/ whitelist procedures, marketing optimization through VIP-customer recognition, forensic evaluations in law enforcement procedures or the automation of access controls in office or manufacturing environments. This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data within various solution suites. Specifically, AnyVision’s facial recognition solution will be integrated into the Dallmeier HEMISPHERE SeMSy® video and security management suite, as well as in other solution suites of the HEMISPHERE platform such as the situational awareness/ incident management or data and security information management. “In today’s increasingly complex world, customers need solutions that can integrate powerful components from leading manufacturers within a single platform strategy. Partnerships like this with AnyVision ensure that our customers always have the optimal combination of leading technologies at their disposal,” said Dieter Dallmeier, Founder & CEO, Dallmeier, “Dallmeier’s solutions in sectors such as safe city, stadiums, airports, logistics, casinos and also in the processing industry cover more and more topics that go far beyond classic video security technology. This makes it all the more important to work together with the right partners for complementary technologies which, when combined, offer decisive added value.” Plug-and-play for easy integration The partnership is also part of AnyVision’s mission to make its innovative AI-powered technology available to more businesses and environments across the globe. Unlike other software solutions in the market, AnyVision’s software is plug-and-play for new and existing systems, and able to overcome challenges such as occlusions, different angles of view, and poor lighting conditions. AnyVision currently develops technology for security and surveillance, mobile authentication, access control, and real-world analytics. Boris Gokhman, Vice President of Strategic Partnerships at AnyVision commented, “Facial, body and object recognition have real-world benefits right now. Collaborating with best-of breed technology partners to help more organizations – working across diverse sectors – harness new capabilities and achieve those benefits is hugely important to us. We are delighted to be working with Dallmeier on this and look forward to expanding this partnership in the future.”  

Read More

Tenda Targets Surveillance Industry

Networking cameras are becoming more and more popular by each passing day. The need of the hour is to ensure that high-quality network equipment is employed. Choice of right network switches that meet the high definition video surveillance data switching becomes very crucial. An appropriate network switch can not only provide reliable data transmission but also can reduce the resources waste. People are turning to Ethernet switches with Power-over-Ethernet (PoE) technology, reaping big benefits for their IP surveillance networks. Looking at the need of the hour and targeting the surveillance industry, Tenda launched two powerful switches namely TEF1105P-4-38W and TEG1109P8-102W. The TEF1105P-4 (38W) is a 5-port 10/ 100 Mbps desktop switch with 4-port PoE & 1 uplink port, whereas the TEG1109P-8 (102W) is a 9-port gigabit desktop switch with 8-port PoE and 1-gigabit uplink port. Both these switches specialize in handling high megapixel data traffic very efficiently. The TEG110  9P-8 (102W) It is a gigabit unmanaged lightning protection PoE switch developed specifically for building Gigabit WLAN and HD camera monitoring network. The switch is equipped with 9 port 10/ 100/ 1000 Mbps Base-T Ethernet RJ45 ports with 6KV lightning proof. Every single port supports MDI/ MDIX and wired speed. PoE ports support IEEE802.3at/ af standard while detecting and recognizing the IEEE802.3at/ af standard power device automatically. Through conventional Cat 5e/ Cat6 twisted-pair cable, power can be transmitted along with data for AP, IP camera, and IP phone. With features like PoE dynamic power, flexible extend network without being limited by the power line layout, plug and play, and easier configuration. The TEG1109P8-(102W) helps SMB, hotels, shopping malls and schools to build a highly secure and reliable network of wireless coverage and HD monitoring. The TEF1105P-4 (38W) It is a budget-friendly PoE switch that offers 5 port 10/ 100 Mbps Base-TX RJ45 ports. The ports and embedded power can provide lightning protection of up to 6kV. It also provides PSE short-circuiting protection, PoE overloading, power over temperature, over voltage and surges current protection. Ports 1-4 comply with the IEEE802.3af power supply standards. The entire switch offers a maximum PoE power output of 35W, whereas each port offers a maximum PoE power output of 15W. The ports can be used to supply power to and exchange data with APs and IP cameras. With the extend mode enabled, the transmission distance of both power and data will extend up to 250m (10Mbps) – this function can replace the extender and parts of the fiber. It will extend the distance of the whole system and save the cost of the project. Commenting on the launch John Dong, Director – Tenda India said, “Our PoE switches are super capable of handling real high definition data (pictures & videos) traffic. Tenda India is at the service of the surveillance industry.” Tenda technology is the recognized leading supplier of networking devices and equipment. Tenda has committed to delivering easy-to-install and affordable networking solutions, offering innovative, cutting-edge products to ease people’s intelligent life.  

Read More

NEC Partners with C-DAC

NEC Technologies India (NECTI) has partnered with the Centre for Development of Advanced Computing (C-DAC) to deploy its industry-leading automated fingerprint identification system (AFIS) for the Kerala State Police in India. The new AFIS will be used by the Kerala State Police to match unknown fingerprints against a central database of known fingerprints for criminal investigation. More than 600 police/ enforcement facilities across the state, including police stations and the district police headquarters, will have access to the system for verification and new registration of fingerprints. This new system will help state police accelerate investigations more efficiently by providing a faster and more accurate fingerprint verification. The new system is able to enhance the quality of fragmented fingerprints captured at crime scenes and makes it possible to match the prints against the central database. NEC’s AFIS boasts the world’s No. 1 authentication accuracy and is a core technology of the company’s portfolio of leading biometric solutions – ‘Bio-IDiom.’ Takayuki Inaba, Managing Director, NECTI said, “NEC has always been at the forefront of public safety. As a world leader in biometrics technologies, we are delighted to be working with C-DAC and the Kerala state police to implement a new fingerprint recognition infrastructure, and are committed to building safer and smarter cities in India.”  

Read More