securitylinkindia

APS Man Ramanjit Singh Oberoi Hits Boston Marathon Track

Fifty nine (59) years old Ramanjit Singh Oberoi, Head – Credit Control, AP Securitas Group has once again defied his age and upheld that age is just a number. He has participated in the Boston Marathon on 15 April 2019 with around 30000 runners, and finished the 26 mile (42 Kms) run in three hours and forty minutes. He believes that everything is achievable, if one pursues one’s passion single mindedly. “I discovered running rather late in life when almost people are slowing down. But I saw how it made me feel – I feel free and doubly alive. When I am on the road, in the hills, I start singing. It’s the most enjoyable part of my life, I will not give it up,” said Mr. Oberoi. “An Individual’s pursuit of excellence needs to be encouraged and supported. We at APS are deeply involved in Raman’s journey of marathons. We find more and more members of the APS family taking part in shorter runs. It is not uncommon to see people talking of building stamina and adopting a healthier life style. His strenuous hard work also inspires us to imbibe this indomitable spirit in our work place and become a better professional and service Provider “ – Anil Puri CMD, APS Group Now at the age of 59, he has an enviable track record of huge successes in various marathons. His unbounded energy and enthusiasm found inspiration in the APS environment and he ran his first half-marathon at the age of 55. He has participated in 23 half-marathons and 3 full-marathons before qualifying for the Boston Marathon 2019 (USA). Raman reflects and embodies the indomitable spirit of a ‘Security Man.’ Anil Puri, CMD – AP Securitas, celebrated the achievement, and felicitated Raman at a grand party thrown in his honour.  

Read More

Hikvision Hosted the Second AI Cloud Summit in Hangzhou

Hikvision, the world’s leading supplier of innovative security products and solutions, successfully hosted the second ‘Shaping Intelligence’ AI Cloud Summit at Hangzhou Whitehorse Lake International Exhibition Centre during 29-30 March 2019. Under the theme of ‘Data Enrichment with AI,’ the summit served as a platform for AI cloud ecosystem partners to exchange knowledge on leading-edge AI and big data technologies and applications. It comprised a main forum and four sub-forums on the topics of finance, commerce, public services and smart governance for cities. Over 3,000 participants took part in the event including Hikvision customers, industry leaders, academic experts and partners. “We believe that, as a fusion platform, the AI Cloud will be able to support our customers in their quest to unleash the full potential of AI and IoT. Ubiquitous intelligence will be the new normal of the AI era; intelligent applications and their data generation will be the engine” – Yangzhong Hu CEO, Hikvision Vision of the future: Fusion of Intelligent IoT and Information Networks One of the most important topics discussed at the conference was how Hikvision’s AI Cloud platform can support the integration of IoT and information network data in order to drive the future development of new, intelligent applications. Ideas discussed included the development of a computing architecture that unites cloud and edge computing, plus a data architecture that can enable the integration of intelligent IoT and information network data. Providing fully open platforms for mutual development The Hikvision AI Cloud was developed to solve real-world challenges across different vertical markets, and to create continuous value to end users. The cutting-edge architecture is designed to enable collaboration between partners across edge computing, industry applications, service platforms, standard systems, and much more. As an example of this, Hikvision demonstrated how the launch of its AI algorithm training system has enabled partners to train algorithms easily for specific customer application needs and deployment. Using a digitised event exhibition area of 6,000 square metres, Hikvision and its ecosystem partners demonstrated versatile AI solutions including smart retail, smart campus, smart financial service, smart construction, smart agriculture and so on. In addition, intelligent transportation system (ITS) was showcased including intelligent buses, intelligent road networks, intelligent airports and intelligent railway systems – all designed to boost passenger safety and enhance the travel experience. AI applications to empower industrial users At the four sub-forums held on the second day, end users from different markets exchanged thoughts and shared use cases of collaborating with Hikvision AI deployment. At the commercial forum, partners from retail, energy, property management and logistics explored how AI can increase business insight and transform how businesses operate. At the smart governance for cities forum, traffic authorities from different parts of China shared successful AI applications, including how e-police solutions help identify traffic violations and reduce the number of human injuries and fatalities. By merging video information with other systems and algorithms, traffic big data can be visualised on city maps to further guide traffic and improve urban commuting. At the finance forum, banks including China Construction Bank and the Industrial and Commercial Bank of China overviewed their digitised transformation with AI in banking security and management, showcasing how AI-powered big data was a key enabler in this process. The public services forum focused on how AI technology can support the improvement of public services management. Among other sessions, Hikvision partners introduced AI applications for distance learning, smart classrooms, campus safety and enhanced learning environments.  

Read More

Development of Cyber-Sustainable Video Surveillance Systems

Cybersecurity is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions, however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cyber security. Introduction Customers are currently overwhelmed by the perpetual advertisement of products related to cyber security. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cybersecurity. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist. In general it is possible to universally define safety requirements for installation in special environments such as a drilling rig, a marine vessel or along a railway. For soft ware, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Furthermore, a device’s firmware and video m a n a g e m e n t software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever changing conditions. Other aspects of security such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements such as gases or dusts, and deducting the product requirements. During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. The result of the lack of certainty that characterizes software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap by pursuing certifications and stamps, or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Orientation between different cyber-security certification options Several certification options are currently available on the market, and these can be placed in two main groups – System certification and Product certification. As the name suggests, system certification addresses cyber-security at a system level. This group includes ISO27001, NIST SP 800-53 and ISA/ IEC62443-3. In these frameworks, risks related to information management are evaluated across every aspect of the organization – information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organization willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/ IEC 15408, also known as ‘common criteria.’ It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec’s strategy for cyber-secure video surveillance systems Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products i.e., developing safe products for all possible tasks – mechanical, electrical, electromagnetic and software – according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalogue. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Every night,…

Read More

SECONA Shield Awards 2019

The fifth edition of the SECONA Shield Awards, powered by Secutech India, was held at a glittering function on 26 April 2019, at Bombay Exhibition Centre, Mumbai during Secutech India – one of India’s largest exhibitions on security, safety & fire. The Shield Awards are one of the ‘first’ of its kinds which have recognized the contributions of many ‘superstars’ of Indian security & safety sector – they are women and men, working day and night to provide products, services, and even ideas that can make the communities truly safe. Like every year, SECONA Shield Awards 2019 was focused on recognizing the contributions of individuals, organizations and teams, who inculcated innovation and excellence in their offerings. There were over one hundred finalists in various award categories. Winners were highly joyful and expressing their sense of achievement. They mentioned the recognition as a special honour in front of the industry peers. The award ceremony was held in the backdrop of the heinous terrorist attacks at Pulwama and Sri Lanka, and hence on behest of Prasad Patil, Chairman, SECONA, a one-minute silence was observed for the martyrs of Pulwama and the victims of Christchurch and Colombo. He also thanked the Indian armed forces for their selfless contributions towards protecting Indian citizens and assets. This year there was a special awardee – little P. Srihitha, just 9 year old, who recently donated her entire birthday savings to Chennai police for the installation of CCTV cameras. This must have been the first such instance in the whole world; and hence SECONA decided to honour Srihitha and her family, who came all the way from Chennai, for their outstanding thoughtfulness and generosity. Srihitha certainly stole the show with her poise and charm. Mr. Patil mentioned that the scale of awards is becoming bigger every year that keep individuals and organisations eagerly looking forward to it. In that sense, SECONA Shield awards are indeed the most awaited and the most coveted awards in the Indian security and safety industry. During the event, SECONA relaunched the Religious Premises Security Guide (2019). The booklet was unveiled by Mr. Patil along with Manish Gandhi (Exhibition Director, Secutech India); Sudhir Deshpande (Co-director, SECONA & MIPL); Col. Samrendra Kumar – Retd. (Co-Founder and MD, Mitkat) and Ashish Dhakan (MD & CEO, Prama Hikvision). Mr. Patil appealed to the audience to help their respective places of faith in terms of installation of various security technologies. India is exposed to uniquely diverse risks, which require customized and localized solutions to mitigate them. There is a need to encourage local research and innovation in technology, and that is one of the key objectives of SECONA and the Shield Awards. Efforts to design or Make in India, or at least adapt technologies to the context of Indian risks often find resonance in the shortlisting of finalists and the final selection of the winners, which is what was noticed in the several awards for OEMs, projects and integrators. Eight educational institutions from all over India were shortlisted as finalists for the prestigious ‘Safe Educational Institute of the Year award.’ The award was shared by three institutions – in the higher education category, the Sanjeevani Group of Institutes, Kopargaon; and in schools category, the Orchid School and the Pawar Public School, Bhandup, Mumbai. This year, SECONA introduced the popular choice award in two categories through an online poll – the Security Professional of the Year and the Sales Professional of the Year in Security/ Safety which were respectively won by Sanjeev Mishra, Reliance, and Shantanu Krishna, Pinkerton. The Amit Popat Award for the Entrepreneur of the Year in Safety/ Security was presented to Roshan Bohra, ESSL for his sterling achievements in the field of biometrics and access control. ESSL is now the leading player in that domain in India and spreading its wings rapidly in the international market. This year, the Lifetime Achievement Award was conferred on Manohar Bidaye, the Founder and Chairman of ZICOM. Mr. Bidaye has been one of the earliest entrants and a true change maker in the Indian security industry. He mentioned that he is happy to see the growth of the security technology sector, and is satisfied that as an early pioneer Zicom has had an important role to play.  

Read More

Bradley Business Center Deploys 3xLOGIC infinias Cloud Access Control

The Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias Cloud access control system throughout the redevelopment project. HTML Global, an IT managed services provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals, and boasts a wide array of features and amenities. At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC managed doors and those for a tenant company, Compass Health Center. The two organizations manage their own access separately but use some of the same network and PoE switches. BBC managed doors are mainly those controlling common areas and shared amenities – parking, fitness facility, rooftop terrace, and others. They also includes data rooms and other sensitive areas within the office space. Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global, “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services, and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses – that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers. We can add one door or hundreds of doors upon request,” said Hunt, “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” BBC controls access by zone and/ or amenity for each credential holder. Administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Hunt said, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck – that’s very cost-effective.”  

Read More

Tasmanian Distillery Knocks Out Counterfeiters with HID’s IoT Platform

Tasmania’s Old Kempton Distillery (OKD) has deployed HID Internet of Things (IoT) enablement platform, HID Trusted Tag® Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against grey market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. “Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery, “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC, “HID Trusted Tag services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” How it works The distillery’s solution incorporates HID Trusted Tag services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. An HID cryptographically secure near field communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. “HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global, “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” The power of HID Trusted Tag services HID Trusted Tag services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11, and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.  

Read More

Genetec Helps Small and Midsized Bank Branches Unify Security

Genetec Inc. has recently announced the immediate availability of a new unified solutions bundle for financial institutions, an all-in-one offering, specifically tailored to help banks with small and mid-sized branches and automated teller machines (ATMs) manage security, make more informed decisions, and collaborate to close incident cases more quickly. The unified solutions bundle combines several easy-to-install, enterprise-class Genetec products, at an affordable price for financial institutions. “Traditionally, financial institutions with small or midsized branch locations and ATMs worked with multiple physical security technology and analytics suppliers to combine solutions that were not designed to work together. This created inefficiency and introduced cybersecurity vulnerabilities, challenging maintenance, and operational situations which increased costs. Our unified solutions bundle solves that problem by bringing security, operations and business intelligence together into one single interface, reducing operator overload and improving efficiency. With Genetec Security Center at the core of this bundle, banking customers can be confident knowing that their solutions are deployed following cybersecurity best practices,” explained Rob Borsch, Commercial & Practice Lead at Genetec. With this new bundle, and the Genetec Security Center unified platform at its core, financial institutions will be able to make the most of their existing security infrastructure to develop strategies to attract and retain customers, reduce fraud losses, and close cases quickly. By using embedded analytics tools to analyze the vast amounts of data and video already being collected, they can make better-informed decisions about staffing and how to manage the flow of people. This can help them become more competitive and have a significant positive impact on their customers’ journey. A unified system can also improve overall branch security by giving personnel all the information they need including alarms and associated video footage, on mobile devices or at their central operations center so they are ready to respond quickly. In an emergency, an IP-based physical security system that includes a map-based interface showing a location’s cameras, doors, and other devices, can make all the difference. The Genetec unified bundle features a Streamvault™ turnkey appliance, pre-loaded with the Genetec Security Center unified platform, and other software including: Omnicast™: An IP-based video management system that goes beyond simple monitoring. Combined with video analytics, it helps secure and better understand banking environment with real-time access to surveillance video from any computer or smart phone. Synergis™: IPbased access control to manage the movement of people throughout buildings, while securing doors and restricted areas in bank branches and administrative offices. AutoVu™: An automatic license plate recognition solution that facilitates vehicle identification. This can assist your marketing and operations team to link specific vehicles to customer or employee profiles in the database, or identify unknown vehicles in your parking area. Camera Integrity Monitor module that alerts customers when a camera is either moved (pointed in a different direction), covered, or tampered with. Retail Sense™ advanced consumer intelligence to empower banks by using existing security data to deliver insights and help transform customers’ in-branch experience. These new insights enable one to make informed, real-time decisions, that increase consumer engagement and profitability by analyzing the data your system already gathers. A free 90-day license of the Genetec Clearance™ digital evidence management system to speed up investigations by securely collecting, managing, and sharing digital evidence from various sources with others. Optional add-ons include: ATM transaction integration (to correlate ATM activity with video footage), Intrusion alarm panel integration plug-in (efficiently respond to intrusion breeches), Sipelia™ intercom hardware & licenses (SIP-based communications between operators and intercom devices), Federation connection license (Connect different sites together), Extended 5 -year warranty, Analog encoder card(s) for 8, 16, 24 or 32 channels.  

Read More

Axis Bolsters Africa’s First Fully Automated Drill Fleet

Mission Kumba, Anglo American’s iron ore business in South Africa, cemented its position as an early adopter of new technologies when it implemented automated drilling on the Kolomela Mine. This project was the first fully automated drill fleet in Africa which aimed to increase utilisation, improve safety and performance, boost reliability and productivity, and save costs. The remote command of mining equipment relies on line of sight through remote drill monitoring to honour the guidelines of the Mine Health and Safety Act, specifically guidelines towards trackless mobile machinery (TMM). As the preferred supplier to Kumba Iron Ore, Sedna Industrial IT Solutions (Sedna), were asked to provide visual monitoring to support this. “The project’s conceptual phase required creative thinking that led to custom-built products. Sedna provided basic specifications, with minor on site changes to products once introduced and thoroughly tested. Furthermore, their Axis partnership meant we had superior technology and hardware to support the project requirements. Their combined commitment and technical ability is phenomenal and contributed to the overall success of the project” – Pieterjan le Roux Technologist Engineering at Kolomela Mine, Kumba Iron Ore Solution As an Axis development partner, Sedna naturally collaborated with the market leader in video surveillance. The team has worked together on several mining applications in the past, and Sedna relies on the exceptional durability and performance of the Axis products. AXIS P3905-RE network cameras were installed on the drills in order to replace the onboard visibility during the ab sence of an operator, and the Geo-Cam was used with AXIS Q6115-E as the base platform for drill and bench monitoring, from a distance providing a 360 coverage of the entire working area of the drill. AXIS Q8722-E were used as the base for the thermal Geo-Cam for drill and bench monitoring in poor light or high dust conditions. Result The custom-built, world-class mining application reinforces the project through real-time visual monitoring for automated process optimization and early problem detecting. As a result, the Kolomea Mine is benefited from increased efficiency, improved safety, minimized downtime and lowered operating costs. Remote drill visual monitoring Automated drilling presents many benefits as it promises to increase efficiency and reliability, while improving safety, minimising downtime and lowering operating costs. It is best suited for remote and inaccessible locations, and allows for more accurate pressure control and more rapid response to drilling anomalies. Combined with visual monitoring through high definition cameras, a single person can operate multiple drills from a control room on a 24/7 basis. Axis development partner, Sedna Industrial IT Solutions (Sedna), specialising in mining-based systems was approached by Kolomela Mine Project to provide visual monitoring support. Peter Dormehl, Director of Sedna Industrial IT Solutions, has partnered with Kolomela over the years on technical mining solutions, and therefore understood the requirements and client preferences. Dormehl commented, “In making our recommendations to Kumba’s team, we put Axis forward as the IP camera partner of choice. Sedna has worked with Axis for almost a decade and we are confident in their product support. We know their hardware can survive demanding environments, as we’ve deployed their cameras in mining operations worldwide.” Superior technology and hardware A few years ago, Sedna built a Geo-Cam for monitoring operations within environments such as opencast mines, where there is no cabling infrastructure. The robust, mobile device is solar powered and locates positional information or tracks a moving object with GPS. The camera communicates via industrial wireless LAN and can be controlled (Pan, Tilt, Zoom) remotely, allowing for monitoring from remote operations. “Part of our comprehensive solution to Kolomela was to install 7 Geo-Cams, which were used with AXIS Q6115-E network cameras as the base platform for drill and bench monitoring, while AXIS Q8722-E was used as the base for the six thermal Geo-Cams for drill and bench monitoring in poor light or high dust conditions. In addition, we installed outdoor-ready AXIS P3905-RE on the drills, as they are ideal for onboard surveillance. This is recorded and managed on a Milestone platform with the Geo-Cam software,” explained Dormehl. Automatic success “ The drill project deployment was rolled out over eight months by a strong, competent team of experts who helped contribute towards ensuring that our automated drilling delivers against an ambitious growth strategy,” concluded Sipho Mathonsi, Manager Engineering at Kolomela mine.  

Read More

Vanderbilt Hospital Security

When we think about ourselves or a loved one becoming injured or ill and needing professional care, we’d like to envision a hospital or healthcare facility as a place that is welcoming, comforting and safe. In times that we’re most vulnerable, we should be able to feel confident that the room we’re in is located within a secure and organized environment. But the reality is that hospitals face a variety of challenges when it comes to streamlining security and mitigating risks, just as other types of large, complex campuses do. With so much ground to cover and people constantly entering and exiting the building, directors of security at hospitals tend to grapple with various concerns such as: Visitor management. At the core of any hospital is the goal of creating an open environment that encourages healing and patient support. But this often means hundreds of ingress/ egress points, varying levels of access and the possible exposure of patient data. Cybersecurity. The aforementioned personal data that hospitals obtain on a daily basis is unfortunately subject to breaches and cyber attacks, especially as the connected network continues to grow and become more complex. These facilities must also adhere to specific privacy laws and regulations, adding another layer to the mix of requirements. Variance. There are often many tasks and processes being performed in a hospital at one time – from controlling contagious diseases to restricting sensitive areas to rushing critical patients around, there’s no doubt that the element of uncertainty can lead to chaos. Access control in hospital security To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, security directors must look to implementing integrated and innovative security solutions; and one of the most important components of any system that’s deployed is access control technology. Utilizing an access control solution enables hospital security officials to break down the facility’s overwhelming size into controllable, role-based zones that come together within one common platform. Access control encompasses not only main entrance doors, but also internal entrances and exits based on location and access level – meaning all methods for going in, out or throughout the facility can be actively monitored. Most importantly, hospitals demand a security system that can withstand the large volumes of traffic generated each day without disrupting critical functions. A traditional key-based system will struggle to keep up with this level of activity, but taking advantage of a more advanced solution, such as Vanderbilt ACT, can provide numerous benefits. Lockdown functionality In the event of an attempted unauthorized entry or emergency incident, it is paramount for hospital security officials to be able to control access quickly and efficiently. Access control systems allow these organizations to ensure security with the push of a button, as well as remotely and instantly obtain real-time monitoring, user management and administration. Flexibility With the many moving parts hospitals must manage, scalability and flexibility are key to maintaining a secure facility. An access control solution can help security officials constantly adjust access rights based on numerous characteristics such as areas of practice and likely working hours. Former employees can also immediately be removed from the system, eliminating the possibility of a threat. Restriction Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and an access control system can make this process easy. Sensitive materials such as narcotics or sterile environments, can be given added protection, and medical files or controlled substances can be protected with electronic access-controlled cabinet locks to create an audit trail in the case of a breach. Convergence While access control is a crucial centerpiece of a hospital’s security system, the ability to integrate additional components and products can create the strongest solution that facilitates complete protection. Incorporating video surveillance, for example, increases situational awareness and allows security administrators to evaluate a situation before it may become a threat such as a door being forced open. Vanderbilt’s ACT Enterprise 2.8 The latest version of Vanderbilt’s ACT Enterprise access control software is an ideal solution to provide the aforementioned benefits to hospitals and healthcare facilities. ACT Enterprise has been designed with ease of installation and usage as primary goals, with scalability and simplicity key characteristics for enhanced efficiency and effectiveness. One of its newest features, the rules mapping engine, enables the advanced configuration of triggers, which can be actioned on events such as input and output change and card swipe outcomes across the access control system. In a hospital, an example of this functionality could include a card reader for doctor badges on the emergency room suite, which would send an alert to the ER team for immediate assistance. ACT Enterprise 2.8 also facilitates simplified integration with Vanderbilt’s SPC intrusion system, which enables hospital security personnel to view high-quality graphical maps on a single screen that shows all access and alarm points from both systems. This type of wireless integration solution makes system expansion flexible, without the disruption of maintenance teams closing corridors or priority areas of a hospital to run cabling or other installation equipment. Access control is key As hospitals aim to balance contending with security challenges and establishing a place that provides a comfortable recovery and visitation options, adopting an integrated access control solution must be top-of-mind. Learn more about how the flexibility of Vanderbilt ACT allows healthcare facilities to easily manage public areas and permit access to restricted areas while preventing unauthorized access.  

Read More

Digital Infrastructure Vs Cyber Threats

It is indeed not only a current fact but also an unavoidable need that no country or economy can survive and progress without having a resilient and robust digital infrastructure as a backbone to support its ecommerce, health, education, agriculture, manufacturing and all service sectors. However more a country has the exposure to digitalisation, more commensurate risk is manifested by virtue of a spurt in probability of cyber and hacking attacks as vulnerabilities or point of intrusion (PoI) multiplies. It is also reported in a study carried out by Huawei that artificial intelligence (AI) could almost double the value of global digital economy to $23 trillion by 2025 from $12.9 trillion in 2017. However, the worldwide scarcity of AI talent is a challenge and threat to this growth. So, a strong cyber security defence for digital infrastructure is a top priority for each country. Latest updates & serious incidents One of the reports in the Washington Post stated that Chinese government hackers have stolen highly-sensitive ‘top secret category’ files on underwater warfare. The files include the data that pertains to a supersonic anti-ship missile meant for the use on US submarines. Though the Chinese Embassy in the US has denied any such incident, it is reported that hackers targeted a contractor who works for the Naval Undersea Warfare Centre, a military entity based in Newport, Rhode Island. As reported, it was related to the project called ‘Sea Dragon.’ So, it is one of the most serious incidents of hacking so far as it has a potential that could bring two countries at loggerheads against each other with serious consequences. One can look at this incident as to what kind of pursuits/ measures shall be taken forward in times to come. People all over the world and now even in India are chugging data like never before. In just last three years, the use of data in India has increased fifteen times. It stood at 4GB per capita on 31 December 2017 which within a year rose to 5.5GB per capita by December 2018. Data has become cheaper and faster. India provides data globally at the cheapest rate and its expansion is fastest. Cyber threats have also increased in the same proportion as hackers do spend energy and resources to remain ahead to the counterparts who design improved defence processes and technologies to counter. About 500 million Indians were online in 2017 and the rate is growing exponentially. The Indian annual growth rate is about four times of the global average which is just 3%, even though India is still considerably underpenetrated compared to China and USA. Half of these online Indians usually make use of social media platforms while about 40% use e-mail and search. It is expected that e-commerce business in India shall become nearly $130-140 billion by the end of 2020. Indian digital economy itself is expected to be about $1 trillion by 2024, and hence, this volume of business shall also be at risk caused by cybercrimes and hacking attacks. In a sensational case, CBI booked unknown officials of the National Stock Exchange (NSE), Securities Exchange Board of India (SEBI), the promoter of a stock-trading company OPG Securities, and an economist and former consultant in the finance ministry for manipulating NSE software to get prior access to the markets after opening, ahead of other brokers by some seconds, to make gains in trade. It is just to make out how serious such incidents could be as it offers serious challenges to a market place globally that deals in trillions of dollars every day. The researchers have discovered a way to crash a person’s desktop or laptop simply by playing a sound through the device’s speakers. Such techniques could disrupt surveillance systems and sabotage medical devices. It has been published by a US and a Chinese university with details of their findings in a paper titled ‘Blue Note: How International Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.’ This discovery is the latest in a long line of methods available to attackers to crash devices remotely, which include symbols and messages sent by a text message or other messaging apps. There is a new crypto-jacking cyber warfare where the injected malware infiltrates target’s systems and converts computers into zombies. In doing so the primary intention of hackers is not to steal information but to mine crypto currencies. It was used against nearly 2000 computers of Aditya Birla Group. One of the symptoms noticed during the attack was of slowing down of the machines. The digital currency that was mined in this attack was Monero. This currency is virtually untraceable and believed to be more anonymous than Bitcoin, the best known crypto currency which experienced huge volatility amid regulatory crackdowns and strong interest from wealthy investors who chose to diversify beyond conventional securities and central bank-backed dominant fiat currencies like dollar and euro. A team of Dutch security researchers recently unveiled some new findings regarding ‘Rowhammer,’ an unintended side effect in DRAM chips that can be used to tamper with an entire computer which could be an effective way to hijack any smart phone. Though Google says that it is still a theoretical concept and not yet used in any attack but it is for sure that the smart phone manufacturers have to use a permanent fix for the same while incorporating them in designs. It is also a fact that the first native blockchain mobile phone by the HTC has been unveiled as HTC-Exodus. The Android powered Exodus device features a universal wallet and hardware support for all major crypto currencies like Bitcoin and Ethereum, and decentralized apps. So, one more new challenge is on the horizon. Though GDPR has been put in place by EU and Justice Krishna’s report on data protection in India is out but there is a lot that needs to be taken care of, and such laws are to be constantly improved and updated keeping pace with…

Read More