securitylinkindia

PSARA 2005 : Critical Review and Analysis

Economists often talk about the institutional constraints which hinder the growth and development of a country, and one important example of such a constraint is the legal system in India. In 1998, a commission for the review of administrative laws in India was set up to examine all the central acts, and sets of rules, regulations and administrative instructions issued under different central acts. It was reported that there were 2500 central laws in force besides a large number of overlapping rules, regulations and instructions, and some of them could not even be traced out from the records. Further the legislatures of the states have also the power to enact laws as per concurrent list III (Seventh schedule) of the constitution whereby the states also issued state rules where central acts with model rules may be available already.  Labor laws Under article 246 of the Indian constitution, the subject of labor has been placed in the Concurrent List – except the labor and safety in mines, oilfields, and industrial disputes concerning union employees which were made the part of the Union list. Consequently, the enactment of labor laws by states has resulted in various loopholes such as inter-state variations in labor laws and their enforcement, the reports and returns under various labor laws are not uniform and standardized in all the states, and compliances are difficult as enforcement action varies from state to state. Moreover, in the case of a decision of discharge and/ or dismissal of a workman by the employer, it is the labor court which is to be satisfied with reasons, and if the labor court is not satisfied it may set aside the order of such discharge or dismissal. Similarly, a labor court may also set aside orders of reinstatements. Such blanket powers granted to the labor courts restrict the authority and freedom of employers, and that hinders the development of any industry. Private security industry Private security agencies were earlier required to comply with the statutory responsibilities under the labor laws and the rules prescribed thereunder, and other allied enactments like the Employees Provident Fund Act 1952, the Employees State Insurance Act 1948, the Equal remuneration Act 1976, the Minimum Wages Act 1948, the Workman Compensation Act 1923, the Payment of Gratuity Act 1972, the Interstate Migrant Workman Act 1979, and the Shops & Establishment Act 1958. Private Security Agencies (Regulation) Act (PSARA) was enacted in 2005 to oversee and regulate a large number of unregulated security groups and senas operating in the country. In the ‘Introduction’ to the Private Security Agencies (Regulation) Act 2005 it was laid that the growing tendency to hire private security guards had led to proliferation of private security agencies and there was a growing concern about the manner of functioning of these agencies, many of which were conducting their operations without any due care to even the verification of the an tecedents of the personnel employed as private security guards and supervisors. The union government was considering regulating the functioning of these private security agencies so that they are run within the legal parameters and are accountable to a regulatory mechanism. The private security agency regulation bill was passed by both the houses of parliament and received the assent of the President on 23 June 2005. This Act came into the statute book as ‘The Private Security Agencies (Regulation) Act 2005.’ Law and order – A state subject The seventh schedule of Article 246 of the Constitution has listed law and order/ police under the State List. Item 1 and 2 of the state list have often come in the way of any further mandate to be given to the center under Article 355, and any additional provision or amendment in the seventh schedule of Article 246, (State List), cannot be made without affecting the basic constitutional structure. Being a state subject, different state governments took their own time to frame state rules under PSARA. About twenty six states and UTs adopted PSARA and issued their rules at the end of 2010, and the remaining dispensed it by 2016. Analysis Any good law should be regulatory in nature. Though the acronym ‘PSARA’ connotes to ‘Private Security Agencies Regulation Act,’ but a number of provisions by way of restrictions and restrains inscribed in the Act are strangulatory in nature, and they are therefore not conducive for the growth and development of the sector. This can also lead to the legal wrangling and battles in the courts of law. In PSARA, some sections of the Act are not only restrictive but also vague and not properly worded. Their interpretations can vary and could create hurdles in the compliance of various provisions. Section 6(2) Section 6(2) of the Act lays down the eligibility criteria for procuring license for guarding services. The Section mentions that a person shall not be considered eligible for license for his firm, if the same is not registered in India; or is having the proprietor or a majority stakeholder or a director who is not a citizen of India. Intention of the provision is to allow licenses only to the companies and proprietors who are citizens of India; however, in the absence of any clear and direct limitation clause, there is a scope that the company could be run by someone from abroad by having stakeholders/ shareholders as Indian citizens. Section 7(4) Section 7(4) stipulates the need of making enquiries and verifications in writing for getting no objection certificate from the concerned authority for the purpose of registration and grant of license. The renewal of license under PSARA by the competent controlling authority is a painful, torturous and lengthy process. There are prolonged delays in view of the mind set of lower police functionaries. Further there is absence of proper dialogue or positive interaction between controlling authorities and the private security entrepreneurs which makes the process of verification and registration cumbersome and lengthy. Section 13 Section 13 defines the rank of controlling authority as the rank of…

Read More

Allegion & Identiv Announced Integration of Schlage® LE, NDE, AD-400 Wireless Locks

Allegion, a leading provider of security products and solutions, announced Identiv’s Hirsch Velocity Software and Mx controller now integrate with Schlage® wireless electronic locks for a highly scalable access control offering. The integration supports Schlage LE™ wireless mortise locks, Schlage NDE™; wireless cylindrical locks and AD-400™ wireless locks. “Allegion continuously looks for ways to improve security, efficiency and convenience for end users and integrators, which is why we’re excited to work with Identiv,” said Robert Lydic, Vice President of PACS/ OEM business at Allegion, “Schlage wireless locks are ideal for facilities that want an affordable way to upgrade traditionally mechanical doors to electronic credentials. When paired with Velocity Software, users can bring a reliable, seamless experience deeper into their buildings.” The award-winning, multi-door Hirsch Mx Controllers provide a wide range of features for enterprise-scale solutions. Hirsch Velocity Software is an integrated platform that manages access control and security operations, from single high-security rooms to multi-building, multi-location campuses, with the most stringent security compliance. When combined with the strength and flexibility of Schlage wireless locks, these offer an advanced access control solution that can be tailored to fit facilities of all sizes. These solutions are agile by design, enabling users to start small and grow as security needs evolve. “When flexibility and scalability are requirements, Velocity combined with Schlage’s wireless locking platforms is the perfect solution,” said Sam Tuthill, Identiv Senior Product Manager, “Velocity’s new integration with these Schlage wireless locks expands the capabilities of our software while incorporating the power of Hirsch Mx controllers.” This solution is ideal for customers looking to introduce or expand electronic access control in commercial real estate, K-12 and higher education campuses, assisted living buildings, medical offices and multifamily properties. Wireless electronic access control solutions allow users to secure more doors without the need to run wiring, enabling quick and easy installations with minimal interruptions. The Schlage LE wireless mortise lock, Schlage NDE wireless cylindrical lock and AD-400 wireless lock were designed to bring electronic access control beyond traditional perimeter and high-security openings. These locks are adaptable. The Schlage AD Series has a modular design that enables the reader or communication module to be changed as needed. The Schlage LE and NDE allow end users to upgrade from the ENGAGE web and mobile applications to a fully integrated system through a physical access control provider. The lock, credential reader, door position sensor and request-to-exit switch are combined in one unit to simplify installation and reduce costs.  

Read More

Dahua Wins Govies Award for Outstanding Security Product

Dahua Technology, a world-leading video-centric smart IoT solution and service provider, has been awarded a ‘Govie’ by Security Today, an integrated product and technology magazine for the North American security market. The award honors outstanding government security products in a variety of categories, including video surveillance cameras. “Each year we have the opportunity to view the latest and greatest products that will impact the government security sector, and this year’s contest is no different,” said Ralph C. Jensen, Editor in Chief of GovSec and Security Today magazines and the website SecurityToday.com, “The solutions that have been entered represent great technology and innovations. I applaud all our entries and appreciate their tireless efforts to secure the government sector.” An independent panel of judges from the security industry selected the winners in the 2019 Govies categories. The entries were evaluated for features, innovation, quality, design, market opportunity, and technical advances, among other characteristics. Dahua Technology’s Multi-flex™, a flexible, 4x2MP, multi-sensor camera, took home the Gold Award in the IP video surveillance cameras category. The Multi-flex boasts innovative flexibility, allowing users to position each sensor module independently around the camera’s internal track for 180-, 270-, or 360-degree fields of view. The camera’s integrated IR illuminators move along with the sensors for night time illumination. One of the Multi-flex’s notable benefits is that it can be easily configured to minimize blind spots and improve situational awareness. “The high-performing Multi-flex makes video surveillance more adaptable, easier to use, and more cost-efficient for a variety of vertical markets,” commented Jennifer Hackenburg, Senior Product Marketing Manager at Dahua Technology, “We are honored to be recognized for our contribution, which represents Dahua Technology’s continued innovation and commitment to quality.”  

Read More

Hikvision Announces Full-Year 2018 and First Quarter 2019 Financial Results

Hikvision, the world’s leading provider of innovative security products and solutions, has announced its fullyear 2018 financial results. The annual report shows a total operating income of RMB49.84 billion, corresponding to year-over-year growth of 18.93%. Net profits attributable to shareholders of the company amounted to RMB11.35 billion, corresponding to year-over-year growth of 20.64%. In 2018, the total operating income in domestic market was RMB35.65 billion, with year-over-year growth of 20.18%; while overseas operating income amounted to RMB14.19 billion, with year-over-year growth of 15.90%. The overall results were satisfactory given the complex market environment and slowdown in the domestic, Chinese economy. During 2018, Hikvision continued expanding the number of domestic provincial level business centres and opened five new overseas subsidiaries and multiple new branch offices. With confidence in the potential for future growth, the company maintained a high level of R&D investment and now employs more than 16,000 R&D engineers. The total workforce grew 31% to a total of more than 34,000 employees. The company also succeeded in launching new technologies, products and solutions. Among them, the Hikvision AI open platform was further consolidated to accelerate the deployment of intelligent applications; new-generation DarkFighterX series intelligent cameras were introduced to provide more clarity in dark places; and face recognition terminals that help improve building operations, workforce management and safety operations, to name a few. In 2018, Hikvision continued its investment in new busi ness areas. The EZVIZ Smart Home business demonstrated healthy growth and maintained profitability, while HikRobotics started to achieve profitability. Further investments were made in other new businesses such as Hikvision Automotive Electronics and Hikvision Intelligent Storage. Hikvision also announced its first quarter financial resultsdemonstrating a total operating income of RMB9.94 billion, corresponding to year-over-year growth of 6.17%. Net profits attributable to shareholders of the company was RMB1.54 billion, reflecting a year-over-year decrease of 15.41%. However, with recent increases in business opportunities in the domestic market and stable growth in overseas markets, the company do have a positive view on the second quarter of 2019. Hikvision is a world leading provider of security products and solutions. Featuring an extensive and highly skilled R&D workforce, Hikvision manufactures a full suite of comprehensive products and solutions for a broad range of vertical markets. In addition to the security industry, Hikvision extends its reach to smart home tech, industrial automation, and automotive electronics industries to achieve its long-term vision. Hikvision products also provide powerful business intelligence for end users, which can enable more efficient operations and greater commercial success. Committed to the utmost quality and safety of its products, Hikvision encourages partners to take advantage of the many cybersecurity resources Hikvision offers, including the Hikvision Cybersecurity Center.  

Read More

VIVOTEK Showcases Deep Learning Based People Detection Solution

VIVOTEK, a global leading IP surveillance provider, will showcase its latest comprehensive surveillance solutions at IFSEC 2019, during 18-20 June 2018 at ExCel London. They will present deep learning smart VCA, cybersecurity management solution, and a brand new license plate recognition camera. As one of the founding members of the Open Security & Safety Alliance (OSSA), VIVOTEK, in its shared pursuit of a common standardized platform, will also reveal an innovative Android-based AI camera at its booth. Deep Learning Based People Detection In the era of artificial intelligence, VIVOTEK aspires to bring more valuable analysis of human behavior to its solutions. Based on its self-developed deep learning based people detection technology, VIVOTEK has improved security with proactive detection and now focuses this technology on commercial opportunities. With accurate people detection technology, only the activities of persons will trigger an event. It thus significantly reduces false alarms as well as enhances operational efficiency by making use of data insight reports. Wide coverage 180-degree solution and cybersecurity protection VIVOTEK will demonstrate a series of 180-degree solutions offering panoramic supreme views for different applications. The 180-degree solution considerably reduces the total number of cameras required, and ultimately saves both cost and time spent on installation. In addition, VIVOTEK will introduce the latest end-to-end cybersecurity management solution and display how it responds to a live cyber attack targeted on network cameras at its booth. New license plate recognition solution As the demand for license plate recognition (LPR) rises, VIVOTEK continues to develop more advanced solutions to meet user requests. In IFSEC 2019, VIVOTEK will reveal the latest H.265 bullet license plate recognition camera, the IB9387-LPR. Featuring edge-computing technology, the brand new IB9387-LPR is embedded with license plate recognition software capability and is able to identify license plates on a black list or white list. It allows users to receive real-time recognition without delay and effectively reduces loading of the backend server. All of these features are making this camera an ideal product for parking access control and ‘stop & go’ toll applications. New Android-based AI camera for OSSA VIVOTEK is one of the five founding members of OSSA, the alliance aiming to create a common standardized platform for security and safety solutions. To support its mission, VIVOTEK has dedicated itself to developing its very first camera prototype on the Android platform to be displayed at IFSEC 2019.  

Read More

Avigilon Expands Subscription Cloud Service Platform into Australia & New Zealand

Avigilon Blue™, the company’s Video Security as a Service Platform, is now available in Australia and New Zealand. Powered by Microsoft Azure, Avigilon Blue is a subscription-managed video security platform featuring self-learning video analytics technology that detects the presence and movement of people and vehicles. When a potentially critical event is detected, the Avigilon Blue platform generates a notification to help business owners effectively self-monitor their security operations, while also offering the flexibility for users to contract a professional monitoring provider to efficiently verify and respond to events that may need further investigation. The Avigilon Blue platform enables video monitoring providers and integrators to remotely manage and service more customer sites with fewer resources. End-users benefit from easy web and mobile-enabled secure access as well as system upgrades that are pushed directly from the cloud, which help ensure systems remain secure and up to date. The platform’s architecture saves on bandwidth while making sure important video verification clips are archived in the cloud and accessible from anywhere. “The Avigilon Blue platform is designed to bring Avigilon analytics to virtually any security camera and help our customers simplify monitoring and event verification,” said James Henderson, Avigilon’s President, “We are excited to expand our cloud platform in Australia and New Zealand, bringing added value to our partners and their customers in the region.”  

Read More

CISO Benchmark Study: Anticipating the Unknowns

See no evil, block no evil Imagine if one could see deep into the future, and way back into the past – both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of the survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications and new data. The unknown is what keeps CISOs up at night. This report sheds light on what actions are reaping results in strengthening organizational cyber health. For example, when asked, only 35% confirm that it is easy to determine the scope of a compromise, contain it and remediate from exploits. It suggests that visibility into the unknown clearly is a key challenge. It means 65% of CISOs in the survey have room to improve. 46% said that they have tools in place that enable them to review and provide feedback regarding the capabilities of their security practices. While the good fight is far from over, it’s also far from being all bad news. At least some respondents in the survey seem to be feeling good about their jobs. When asked about cyber fatigue, only 30% of respondents claimed to suffer from cyber fatigue this year. While almost a third seems like a high number to be tapping the mat and raising the white flag, the drop from last year’s figure of 46% is moving in the right direction and this is worth the fight. State of the CISO For some time now, threat hunters have talked about knowing the unknowns. It’s time to expand that to the entire spectrum of cybersecurity – to users, apps, data and clouds. You can’t protect what you can’t see. You generally want to support the business, and not mire it down in bureaucracy. If you’re going to be a bit more open, how are you mitigating control? This is going to be different for everyone. CISOs must deal with that balance of organizational culture while combatting the most critical threats. Sometimes blocking everything and locking everything down doesn’t fit the culture of the enterprise. That might be right for a bank but not for a university. The CISO faces several challenges managing cyber-risk – whatever their organizational model: Breaches create adverse impacts to financial profitability, brand reputation, customer data security, customer satisfaction, and continuity of business. Losses can be substantial and non-recoverable, creating a higher risk score for the organization on insurability. Over the years, vendor point solutions looked promising; however, each generates their own set of alerts. Many point solutions competing on alerts makes it difficult to identify those threats posing the highest risk to the organization, and becomes a resource drain. IT is usually siloed across the organization, making inte gration of securing the network, the cloud, and employee endpoints highly complex. Aggressive tactics to hire security IT personnel are required, as the specialized pool of candidates cannot sustain the magnitude of the problem across global organizations. The talent shortage is, however, out of control and not solvable by trying to fill all jobs. New threats such as Emotet, Olympic Destroyer and others appear daily, even hourly, and are employing more stealth and sophisticated methods. Threat response as a category has to evolve and there is a need for tools to consolidate information and centralize remediation of infections and other incidents. Additional technologies and processes for the CISO to consider are: AI and ML, and used right are essential to triage the volume of work. The cost of a breach is falling – but don’t get too excited yet. There is head room to realize obvious benefits in process improvement e.g., training. There is more confidence in cloud-delivered security and in securing the cloud. 2019 findings The findings from the Benchmark Study revealed several areas that are critical to strengthening organization’s security posture. Set up for success? What does it mean to be a CISO day-by-day? What is their charter? The present survey revealed multiple areas that together determine a organization’s cyber health including being practical about risk, setting criteria for budgeting, collaborating across divisions, educating staff, conducting drills, knowing how to track outcomes to inform investments, and being strategic on vendor and solution implementation. Know your risk Risk management is hardly table stakes. Understanding the risks of cyberattacks and the compliance landscape that encompasses security breaches is paramount to understanding how to defend and prepare for the worst. When asked who were very knowledgeable about risk and compliance, only 80% of respondents were very knowledgeable. That leaves 20% of security professionals who could possibly use some of the discussed trainings. How to spend budget Almost half, or 47% are determining how to control security spending based on organizational security outcome objectives. Measuring outcomes against investments is the best data-driven approach. What’s more, 98% strongly or somewhat agree that their executive team has established clear metrics for assessing the effectiveness of their security program. 49% of respondents have metrics that are utilized by multiple areas of their companies to understand the risk- based decisions and improve processes to measure the security effectiveness throughout the organization. Back to the budget, and aside from outcome based measurement, there are some less healthy options. Controlling security spending on previous years’ budgets (46%) and percent of revenue respectively (42%) were both popular choices,…

Read More

LEGIC Orbit

LEGIC Orbit is the latest generation of a high-level key and authorization management solution that secures customer applications such as mobile ID and messaging from infrastructure components to back-end systems. It is the perfect choice for a secure creation, secure storage and secure distribution of cryptographic application keys. It can be used, wherever data integrity matters. In the need of a secure, convenient, instant and worldwide distribution of application keys, configuration data and much more, user-specific application keys can be generated, thanks to LEGIC Orbit, which are never visible to anybody, and can easily be distributed over the air. Secure key storage and flexible distribution Cryptographic keys are the central element for secure ID solutions and IoT projects and must be well protected. With LEGIC Orbit, the randomly generated application keys are always stored securely and are available at any time. LEGIC Orbit enables the distribution of cryptographic keys over the air to all the readers, so that they are ready for mobile ID and messaging applications. The LEGIC reader ICs contain a secure element to store the application keys. This is end-to-end security at its best. Full system control The new key and authorization management solution allows full control over all applications in a mobile environment. The users can just define the required security level of the system and use as many different keys as necessary, and then freely assign the right to configure readers to any trusted person on site. They benefit from a state-of-the-art security mechanism provided by LEGIC. This saves them valuable time to concentrate on their application design. How to use LEGIC Orbit To profit from the outstanding LEGIC Orbit advantages, the user only needs a LEGIC Connect account and compatible LEGIC reader ICs. LEGIC Orbit is already supported by these components.  

Read More

Vicon New V840D HD Micro Dome Camera

Vicon introduces the V840D Micro Dome series, its micro-sized cost-effective solution for unobstructive surveillance applications. Designed for security installations that require a small form factor vandal dome, it is available in 2MP and 4MP resolution with a 2.8mm fixed lens. These cameras, designed for indoor/ outdoor use, can be surface mounted on a wall or ceiling and provide 3-axis adjustment – a variety of mounting accessories are available for almost any mounting solution. The camera includes IR illuminators for stronger low light performance. These new micro dome cameras do it all to deliver a superior experience when a fixed lens solution is right for the application. Designed to be discreet and feature-rich, these small cameras deliver high performance now and will future-proof the system for real RoI over time. For applications with strong backlighting or reflections, wide dynamic range technology is available. In challenging low-light applications, this series offers best-inclass light sensitivity that captures details in very low-light.  

Read More

QNAP QTS 4.4.1 Beta

QNAP® has recently released the QTS 4.4.1 Beta. With a focus on high-efficiency backup and innovative hybrid cloud storage, QTS 4.4.1 includes HBS 3 with QuDedup technology, which de-duplicates backup data at the source and increases backup and recovery efficiency; Cache Mount enabling local caching for connected cloud storage for users to enjoy a near-LAN access speed to their cloud data. QNAP also released QuMagie – the AI-based photo organization application which provides users with the ultimate photo management and sharing solution. QNAP NAS will also support fibre channel SAN for easily adding to existing SAN environment as a budget-friendly storage and backup solution. “QTS 4.4.1 integrates Linux Kernel 4.14 LTS and supports next-generation hardware platforms for QNAP NAS to leverage the latest technologies. Following the trend of hybrid cloud solution deployment, QTS 4.4.1 optimizes backup efficiency and features innovative applications tailored for hybrid cloud environments, allowing business and home users to enjoy flexible storage allocation, convenient management and perfect backup and recovery solution. QNAP strives to integrate innovative technologies to provide the best NAS experience to our users,” Said Ken Cheah, Product Manager of QNAP.  

Read More