securitylinkindia

Going Digital: The Benefits of Specifying The Video Surveillance at the CAD Stage

With the rapid technological developments around us, more and more industries embrace digitization. For example, the Internet of Things, automation, virtual and augmented reality, and machine learning take production and business processes to the next step. However, the engineering & construction industry (E&C) – with 13 percent of global GDP the largest in the world – has been notably reluctant to adopt new and digital technology. Disruption of the construction industry But there is a wind of change as building projects get more and more complex. Digital technology is increasingly used to create smart buildings and smart cities. The development is snowballing and already disrupting the E&C industry. New players are introducing digital business models. Change is also driven by the public sector, which sees massive advantages of adopting digital technology, such as 4D and 5D building information modeling (BIM).   BIM, defined as “a digital representation of physical and functional characteristics of a facility,” can be used to manage the information during a construction project. It covers every component of a building and the process from design to operation and maintenance to end-of-life. It improves collaboration across projects as well as efficiency, which reduces time, costs, and errors. The use of BIM models can lower error sources by 60 percent and speed up the communication flow by 50 percent. Small wonder that large organizations and governments are starting to demand the use of BIM, including Finland and the UK. The big German railway company Deutsche Bahn has introduced the use of 5D BIM solutions. Getting the right software 5D BIM brings together design (3D), time management (4D), and budget (5D). With the addition of 6D and 7D, environmental and sustainability, and life-cycle management aspects are also included. To reap the benefits of BIM, you need software that can handle the information about a building or structure. One leading software is Autodesk® Revit®, which is used by architects, structural engineers, MEP (mechanical, electrical, and plumbing) engineers as well as designers and contractors. Configuration tutorial: Axis plugin for Autodesk® Revit® – How to select cameras One of the benefits of Revit is the possibility of analyzing and simulating systems and constructions and creating 3D visualization models. The building blocks of these models are BIM objects, which are digital descriptions of products and materials and can cover practically everything you could imagine. And it is here that Axis enters the picture. Plugin for superior video surveillance The Axis camera family plugin for Revit is a goldmine for anyone who wants to add cameras or other surveillance products when planning entire IP video surveillance systems directly in a building plan. You can download it for free from axis.com, and start downloading cameras and other Axis BIM objects from your preferred BIM library. Explaining why Axis has made these BIM objects available, Mikael Flygh, globally responsible for the Axis Architects & Engineers program, says: “It’s about innovation and understanding our partners. The objective is to simplify and help them be more efficient. Our plugin and the BIM objects let them see how the video surveillance will work, already at the drawing stage.” Experience the final solution Flygh continues: “The 3D animations let you see how the cameras fit into the general architecture. Not only will it create better safety and security solutions; you – and the end-customer – can also experience the final product, which is important.” All Axis cameras are available as realistic 3D BIM objects. Using the selector tool embedded in the plugin, you can quickly choose a suitable camera. Downloaded to your building plan, you get valuable information about the cameras, such as focal range and resolution. You can adjust focal length, pan-tilt-zoom, and other settings. You can experience a 3D view, as seen through the camera lens. It is also easy to change and get the right mounting. When you are satisfied with the camera placement, it is easy to verify the entire solution’s camera coverage. Continuous improvements Axis plugin for AutoDesk® Revit® has been around for some years, but “During the last 12 months, we’ve committed to updating it, listening to and acting on customer feedback,” says Flygh. The improvements will continue, and Axis will add new products to the BIM libraries, and new features upon their release. For example, the plan is to introduce multi-sensor cameras during the third quarter of 2020. It involves the entire value chain, reducing errors and misunderstandings, improving efficiency and communication. “We will continue to invest in this because we believe in digitization,” Flygh says. “It involves the entire value chain, reducing errors and misunderstandings, improving efficiency and communication, but above all, it’s about the end-customer experience.” Covering various needs Axis offers several tools that will help you during the planning and design phase. One example is a plugin for Trimble® Sketchup® that provides 3D CAD models that let you find the right camera and visualize its coverage.  

Read More

Protecting Identity in the Age of Privacy

With great advances in video and access control technology – including mobile capabilities, cloud efficiencies, analytics and biometrics – security providers are aiming to create the most secure and seamless credentials, all during a time when privacy concerns seem to be dictating public opinion and impacting security. The increase in use of these technologies brings with it a growth in the volume of data. This article looks at the following areas of focus in privacy considerations: Definitions of privacy. Legalities of privacy and compliance (in the U.S.). Education on privacy. Definitions and ethical use of facial recognition. The biometric debate. Can we have both security and convenience? Definitions of privacy The description for privacy in Merriam-Webster’s dictionary is – “freedom from unauthorized intrusion.” From a legal point of view, privacy is defined as a person’s right to control access to his or her personal information. In today’s data-driven world, privacy issues are raised in the context of government collection or distribution of personal information, as well as corporate use of personally identifiable information (PII). PII is any data that could potentially be used to identify a particular person. Examples include a full name, social security number, driver’s license number, bank account number, passport number and email address. Photo or video data also comes into play, as well as biometric data. Legalities of privacy Milestone Systems is a global video management software company based out of Copenhagen, Denmark, that has had a focus since 2017 on the General Data Protection Regulations (GDPR) that went into force in Europe in May 2018. They define the individual’s critical privacy matters to be protected as ‘sensitive personal data’ such as your racial/ ethnic origin, genetic and biometric info, health and financial data, religious, political and sexual preferences. GDPR has a focus on these key principles: Lawfulness. Fairness and transparency. Legitimate purpose’ limitations on the gathering, use, sharing and storage of sensitive personal data, and its minimization. Milestone has investigated every facet of business from products to business practices, to ensure compliance and provide guidance to employees, partners and customers. In the U.S., three states led the way in 2019 enacting biometric privacy laws – Illinois, Texas and Washington. The California Consumer Privacy Act (CCPA) took effect in January 2020. Then multiple states proposed similar legislation to protect consumers. Arizona, Florida, and Massachusetts introduced legislation addressing biometric privacy, on the heels of a decision for the Illinois Biometric Information Privacy Act. The best way for security dealers, integrators and consultants to learn each state’s biometric laws and work within their parameters is to keep informed. To stay abreast of the changing state-privacy landscape, the IAPP Westin Research Center compiled a list of proposed comprehensive privacy bills from across the country. The updated version of this tool, including a new state law tracker map, exists on the IAPP Resource Center, here. It is advised to take a multi-path approach to stay informed from the many points of view: Join local chapters of SIA and ASIS to network with other professionals specific to your region. Partner with the manufacturers and developers of the technologies you are interested in; they will know how their solutions fit state and local legislation. Get involved with local law enforcement groups, attend relevant presentations on new local and state ordinances. Follow and support organizations like the IAPP which is the world’s largest and most comprehensive global information privacy community. Be vigilant for compliance Ensuring compliance with GDPR and similar data privacy laws requires high organizational maturity with careful planning and preparation of video surveillance and other security systems, including the policies and procedures regulating how the technology is used. To help system integrators and end users design, implement and operate video surveillance systems that are compliant with such privacy regulations, Milestone provides a holistic set of tools, including privacy guides, best practices and training resources to build privacy awareness. If you go to the Milestone website and search for GDPR, you’ll find 1,450 references. There’s a lot of useful information available. Education on privacy and cybersecurity The entire market needs to be educated on what’s being done with people’s sensitive information. Milestone carries out GDPR webinars that are mandatory for staff – as we have also done with cybersecurity training (both internally and externally for our partners) which is related when trying to preserve data privacy, access or sharing. Regarding cybersecurity hackers and our partners’ work with IT systems, current knowledge and best practices help to keep people’s sensitive information safe. Double authentication is becoming standard for managing access to company systems and websites. Data encryption is also key to the lockdown of information and its history of creation, access, user logs etc. Regular software updates with the newest version releases are also best practice to ensure against cyber trouble. At Milestone, we have a comprehensive system hardening guide online. It details the top five most effective cybersecurity strategies to focus on when combating cyberattacks: Isolate the device network from other networks. Educate employees about security threats. Use Active Directory for user and computer management. Enable encryption at every stage necessary. Separate the VMS server and client networks from the company’s business network. Ethics of facial recognition Advanced facial recognition technology has benefited Americans in countless under-publicized ways, helping to do many critical things, for example: find missing children, fight human trafficking, secure borders from drug trade, identify dangerous criminals, bring sexual predators to justice and thwart identity thieves. There is a difference between facial detection vs. facial recognition. Facial detection is a broader term and means that a system is able to identify that there is a human face present in an image or video. Facial recognition can confirm identity and thereby be used to control access to sensitive areas. Authentication/ verification helps verify a person is who they claim to be. The system checks a submitted photo against an existing template to verify that it is the same person – one-to-one (1:1) matching. This configuration is applicable to banking,…

Read More

Award-Winning Idis Camera Keeps Watch Over Guatemala’s Mountain of Fire

I DIS video technology is proving itself in one of the toughest and most dramatic applications: 24/7 monitoring of volcanic activity at Guatemala’s Volcan de Fuego. This volcano, one of the world’s most active and dangerous, is now watched day and night in order to give early warning of impending eruptions. Continual live footage can be viewed online by emergency agencies, scientists and residents, all captured by IDIS’ award winning 8MP 31x IR PTZ camera. Even from over nine miles away, the 8-megapixel model is delivering ultra-high definition, full day, and night surveillance of the active caldera, showing sudden gas and ash eruptions as often as every 15 to 20 minutes. In June 2018 nearly 200 people were killed on Volcan de Fuego during a series of explosions and pyroclastic flows which left little evacuation time. This was the volcano’s most powerful eruption since 1974 and its deadliest since 1929 but was far from an isolated incident. More than 60 major eruptions have been recorded over the last five centuries – and with 54,000 people living on the fertile farmlands within10km of the crater, the risk remains high. Consequently, ultra-high definition, continual video monitoring – alongside data from sensors including seismology and gas detectors – now aims to protect vulnerable communities living around the volcano by giving early warning. The H.265 IR DC-S3883HRX camera,which features an 8MP, auto focus, and 31x optical zoom lens, IR performance up to 200m, and a highly sensitive auto-return positioning sensor, was installed by IDIS, its partner EPCOM and Guatemalan telecommunications specialist Crelosa.Like all IDIS cameras, the model – which has won two prestigious design awards – benefits from true, one-click plug-and-play set up, making it ideal for hassle-free installation at height, in challenging environments, and in locations where engineers are exposed to increased risk. The IDIS PTZ also features true wide dynamic range (WDR), allowing it to cope easily in changing lighting conditions; electronic image stabilisation (EIS) ensures steady coverage of scenes at a distance, so images from the volcano remain crisp and sharp; and H.265 and intelligent codec requires minimum bandwidth even for 4K live monitoring. The camera also remains stable despite the region’s variable weather conditions, including strong sun, and when temperatures fall sharply at night. The water droplet wiper proves essential during the rainy season. Smart failover and IDIS’ Ultimate Warranty gives Crelosa and the Volcan de Fuego monitoring agencies peace of mind that the camera will continue to deliver outstanding video in one of the world’s most dramatic settings. “We are honoured that IDIS technology has been chosen for such an important application,” says Joon Jun, President of Global Business at IDIS, “Our camera is not only allowing volcanologists and scientists to learn more about this most active volcano, it will also potentially help to save lives.”  

Read More

Mastercard Selects Rekor Systems to Enable Touchless Economy

Rekor Systems, Inc, (REKR) a Maryland-based company providing real-time roadway intelligence through AI-driven decisions, recently announced that Mastercard is integrating the Company’s subscription based Edge proprietary vehicle recognition technology into its AI Powered Drive Through Platform. Mastercard’s AI Powered Drive Through platform, provided in partnership with Rekor, can help major quick service restaurant brands transform their drive through or drive in interactions through vehicle recognition, voice ordering, and artificial intelligence. “This is a significant milestone for our Company as we continue to actively pursue the commercial segment of our business. Teaming with Mastercard and their quick service restaurant partners not only helps usher in the future of frictionless vehicle recognition solution, but it signals the value of our technology to enable low touch, high engagement experiences for retailers and the end consumer,” said Robert A. Berman, President and CEO, Rekor. Mastercard’s platform leverages aggregated spending patterns and store level data to customize the ordering experience. Consumers can opt-in to receive personalized and dynamic menu offers based on historical purchasing trends either based on the specific restaurant’s location or the individual consumer. The solution also reduces friction within the ordering process by removing the need to wait for an employee to take an order, enabling staff to focus on order throughput. “As retailers and consumers navigate through one of the most disruptive periods in modern history, it’s clear that traditional business operations will need to evolve quickly,” said Stephane Wyper, Senior Vice President, Retail Innovation, Mastercard. “Technologies like Rekor’s give us the ability to help our retail partners meet the challenges posed by this new normal and provide their customers with a more digitally enabled, touchless, and secure retail experience.” Mastercard’s AI powered drive through platform using Rekor’s vehicle recognition technology will begin on-location pilots at White Castle locations in October 2020 and will also be rolling out with other quick service restaurants later in the year.  

Read More

Barco’s Next Generation RGB Laser Rear-Projection Video Walls Enable a Smaller Ecological Footprint in Control Rooms

Barco, a world leader in professional visualization, introduces its new generation RGB laser rear-projection video walls and reinforces its commitment to the mission-critical control room market. The newest generation offering strengthens the value proposition of rear-projection technology as the reliable, sustainable and long-lifetime visualization solution, and will be available for both new installations and to upgrade the installed base As a broad visualization solution supplier, Barco offers rear-projection, LCD and LED indoor video walls, allowing one to optimize the visualization outcome – depending on the specific application and customer needs. For mission-critical control rooms, rear-projection remains a key visualization technology especially for mid- to large-size control rooms, that work with dashboards and Supervisory Control and Data Acquisition (SCADA) content typically within the utilities and rail transportation markets. The Barco RGB Laser ODL series, with its unique value proposition, was introduced in 2016 and has been the flagship solution ever since, winning multiple industry awards. With the introduction of this newest generation laser engine, the ODL series now gets a major update which further establishes the RGB Laser series as the premium solution in the market. This will strengthen and safeguard the unique value proposition of rear-projection cubes by further extending the lifetime, protecting long-term serviceability commitments up to 10 years, and offering a sustainable solution considering the environment and ergonomics. Solutions for any environment The high-brightness RGB Laser engine allows control rooms to operate in the optimal conditions for the end users. The unique Sense X calibration system automatically and continuously adjusts brightness and color over the complete wall during the entire lifetime, making sure the displayed images reduce eye fatigue in 24/7 applications. Additionally, no heat is radiated out of the screens, which further optimizes the ergonomics for the operators and simplifies the room temperature control systems. The next-generation laser engine introduces new laser banks, improving the light source lifetime in different operational modes. The guaranteed 10 years of maintainability secures the system for the future, which is instrumental for mission-critical control rooms. The accompanying WallConnect software has further evolved, improving the user experience during setup, configuration, operation and maintenance. Along with the ODL-series’ motorized 7-axis alignment, this makes the installation process smoother and simpler. The system is also futureproof and ready for remote management and monitoring, optimizing the availability and lifetime within the mission critical environments. A wide portfolio of laser engines The new engine will be available within the full RGB Laser portfolio, covering 70” to 80” sizes and supporting both FHD and SXGA+ resolutions. Multiple screen options are available to deliver the optimum result depending on the application, control room environment and budget. Furthermore, existing customers can upgrade their installed base of lamp & LED cubes, which means a complete technology refresh can be accomplished while keeping the mechanical structure and screens. This not only lowers the cost and timeframe of the refurbishment, but also reduces waste and can often be accomplished without any operational interruption. Being able to upgrade video walls (running already for more than 10 years) with the latest projection technology at a reduced cost, for another 10 years of service, is a key advantage of rear projection. Reducing the environmental footprint The ODL series also received the ‘Barco Eco Product label A’ as it further reduces the environmental footprint. Barco’s stringent ecoscoring scores energy efficiency, material usage, packaging/ logistics and end-of-life processes in line with the ISO14021 standard. “By introducing the next-generation RGB Laser ODL series, Barco is again breaking the bar in the rear-projection cube market,” says Jay Badvel, Product Manager at Barco. “With this new engine, we go far beyond excelling at the technical level. We further enhance the lifetime, secure the reliability and lower the environmental footprint. The upgrade capability, reusing a large part of the infrastructure, in combination with the modularity, repairability and refurbishment options, further contributes to a true circular economy. The next generation RGB Laser ODL series are available for shipments starting August 2020.  

Read More

Idis Video Technology Cuts Crime and Improves Neighbourhood Environment for London Residents

An upgrade of video technology at a south London residential estate has proved so effective that the system has been immediately scaled-up. The IDIS video solution, implemented by Hall & Kay Security Engineering at the Meridian South Development in Hither Green, is less obtrusive than the system it replaced, yet it immediately delivered better results, with a number of incidents tackled – to the surprise of the culprits. Although the mixed development, comprising 440 owner-occupied and rented properties, is a safe and pleasant neighbourhood for most of the time, to maintain this high standard of living managers needed to tackle a growing problem with petty crime and anti-social behaviour. Issues were being reported with increasing frequency, including rubbish being dumped by shortterm tenants vacating their apartments, theft from mailboxes, vandalism, and car crime. Rubbish removal alone was costing the management company more than £12,000 annually. Hall & Kay were asked to solve this problem by implementing an advanced, end-to-end video solution from IDIS, Korea’s largest in-country manufacturer. The H&K team began by replacing the ten column-mounted PTZ cameras with IDIS cameras. IDIS technicians visited the site with the H&K engineers and conducted a bandwidth test on the existing cabling – demonstrating that, by using the existing coax with IDIS ethernet converters, up to four IDIS fixed bullet cameras could be cost-effectively mounted on each existing column. Additionally, wireless access points were installed where cameras couldn’t be cabled directly to the estate control room. This approach eliminated blind-spots and guaranteed that events would not be missed when the system was unmanned. To provide wider coverage, a further six columns were added, and additional IDIS cameras were mounted in the underground car parking areas.   The system now delivers full HD images in all lighting conditions, with built-in IR ensuring nighttime image capture at distances up to 30m. All footage is stored for 30 days. The security officers and maintenance staff who manage the estate are also taking advantage of the easy-to-use analytics functions that come with the totally cost-free IDIS Center video management software (VMS). These tools include motion detection which can be utilised out of hours to ensure that scenes are only recorded when movement occurs, thus minimising bandwidth usage and storage requirements. This feature, along with IDIS MapVue navigation, also makes it easy to quickly review footage to find incidents of interest. The 57 IDIS full HD IR cameras, and the three NVRs with 12TB storage each, benefit from true plug-and-play set up with DirectIP®. When the South Meridian management team saw the quality of images now being captured, they asked if the system could be extended. With IDIS’s flexible approach this was quick and easy to do. Within 24 hours of cameras being installed, departing tenants were recorded illegally dumping rubbish. Shortly after this, a contractor working at the site reported that tools had been stolen – in both cases, high definition evidence of the crime was captured and passed to the police. In fact, thanks to the design of the system, and the easy-to-use VMS controls, security staff were able to retrieve footage of the incident itself, along with a full video trail of the thief moving across the estate before and afterwards. Word has now spread about how effective the new system is, and residents are delighted that there are now no blind-spots. “The support we had from IDIS was second to none and the technology works exactly as promised,” says Wayne Wharton, Security Sales Manager, H&K Security, “We are now looking at many more IDIS projects with the same customer and others.” “We are delighted that IDIS technology is making such a positive difference to the quality of life of residents at Meridian South,” says James Min, Managing Director, IDIS Europe.  

Read More

India to Soon Get a Cybersecurity Policy

  The Indian prime minister, Narendra Modi, in his recent Independence Day speech announced that India will get a new, ‘robust’ cyber security policy soon. The Internet Crime Report for 2019, released by the USA’s Internet Crime Complaint Centre of the Federal Bureau of Investigation, has revealed that India stands third in the world among top 20 countries that are victims of internet crimes. Given this status and the PM’s announcement, it is vital to understand the outlook of the industry leaders on what kind of cyber security policy the industry is looking forward to in the country   Adaptation of digitisation is taking place at a faster pace, be it in businesses or in other walks of life. It is expected that we will be soon transiting wholly to newer technologies like cloud computing, artificial intelligence, Internet-of-Things, and 5G spectrum, which will naturally expand our dependency on digitisation multifold. However, in the absence of stringent cyber security infrastructure, cyber threats can be disastrous for our entire social fabric. There has been a recent surge in cyberattacks on Indian digitalscape that are only increasing in scope and sophistication, targeting sensitive personal and business data and critical information infrastructure, with impact on national economy and security. Cyberwarfare is relentless in trying to erode the security fortification of several sectors in the country. This is certainly a wakeup call for India to have stronger policies in place. India being the country with proven digital capabilities hub of the world contributing around 75 percent of global digital talent, it is pivotal for India that we come up with sturdy policies. The Prime Minister’s assurance on bringing in a National Cyber Security Strategy is very much welcomed. This move will emphasize the adoption of data protection measures and stronger policies that shall protect the privacy and interests of customers, businesses and the general public of the country. Formulation and adoption of policies might still take time, but this is a clarion call to the Indian internet users to pay attention to the threats, on creating robust ‘firewalls,’ and conducting regular cyber security and data protection audits. The world is moving towards a more sophisticated path in terms of digitization and so are the cyber threats. India has a huge part of the tech-savvy population. From social media to online transactions we have our footprints everywhere. In such a scenario, it is imperative to have a strong resilient cyber security policy and we are glad that the government is thinking in these terms. Covid-19 has shown the importance of having a strong cyber security measure, while organizations have done their best in trying to secure their employees, users and vendors from cyber attacks, the government too should safeguard the sensitive data it holds that, if breached, would lead to a colossal damage. Threat actors have time and again targeted government agencies, banks and other organizations for data which is in huge demand in the dark web. To overcome and take control of the situation, a strong policy is of dire need. The government must first regulate the many ‘institutions’ that teach ethical hacking without taking responsibility for what their trainees intend to do with that knowledge as there is no legal check point. The PM’s announcement has a long term perspective aligned to it. We look forward to a policy that incorporates security as a core and mandatory aspect permeating the various facets of cyber interaction. We envisage a top down flow where actions and interventions have to take place by Governments at a framework and policy level, businesses at a security level and community at a behavioural level. The various crime fighting bureaus and agencies need to be empowered so that they can speed up their response times without red tape miring them down. With a large percentage of work, interaction and engagement moving online, cyberspace is going to become the next hunting ground for unethical practices and felonies. Most systems have now seen an inundation of usage (from simple broadband to video chat to educational software and a host of others) with no extra security precautions taken. Zoom session hacking was a recent case in point. In fact the outcome of COVID has opened up a huge potential target base for cyber criminals. Companies now need to incorporate and mandate best practices at an enterprise, department and employee level. An apt policy would take into consideration all touch points and introduce transformational interventions across them. Make in India companies need to be actively involved in galvanising the new policies ensuring the implementation is cost effective, secure and beneficial to the nation at large. We strongly believe that the eminent experts will define the policy that not only covers the current scenario but is also preventive in nature. We look forward to any policy that ensures the safety and security of businesses, users and the public at large. Cyber Security has never been more important than what it is today. Even before COVID the business environments coupled with the Digital India initiatives have mandated that the cybersecurity policy framework of the government needed to be significantly ramped up – both from catching up with the rest of the world as well as being relevant given the evolving environment. With COVID and the new norms of working from home – it is becoming even more urgent. The policy that we are looking forward to should cover the entire spectrum of challenges – be it in terms of data or in terms of identity. The new policy that we are looking for should include guidelines and compliances for organisations and government departments so that the citizens of the country can freely participate in this digitization of the country which is now going to be a way of life going forward. While compliances and regulations are required, what is more important is a mechanism to effectively make the compliances matter – in that, get the implementations of the compliances to happen. India has been notorious about…

Read More

Array Networks Joins the ‘Make in India’ Initiative by Manufacturing their Products Locally

Array Networks India Pvt. Ltd, a subsidiary of Array Networks Inc., a Network Functions Platform Company, recently announced their undertaking into the production of hardware and software products reinforcing its commitment to the ‘Make in India’ initiative. Array had broached about the company’s plan to go beyond application delivery and launch its security product this year and the plan is now a reality, where the Company will be focusing on producing Networking & Security products. “Array’s operation in India is one of the top contributors to the company’s overall global growth. The large percentage of this impressive growth has come from the Government, BFSI, aviation, entertainment and education verticals. With the Government as our key customer, we believe that the customers’ confidence will increase with our commitment towards the Make in India initiative. As the government is now focused on digitization and cyber security, the network and security products produced in India will receive a major boost,” said Shibu Paul, Vice President – International Sales at Array Networks. The product manufacturing unit has been set up in Bengaluru and is expected to generate employment in India. As the hardware products being produced are for Networking and Security, it will benefit the PSUs, state and central government agencies, and the defense sector. In the coming years, Array Networks will continue to design cutting-edge solutions for Enterprise and Government customers and join the government’s Make in India bandwagon. India is a Key Market for Array Networks I ndia is one of the fastest-growing regions for Array Networks and has good growth momentum. Array has considered India to be one of the key focus markets and growth engines. With the country’s excellent talent pool for software development, R&D and support, the company is providing a huge opportunity for the local workforce through this initiative. Array has the advantage of being the first mover in this product segment that will aid in creating and delivering value to all stakeholders.  

Read More

EZVIZ Smart Home Cameras and Alarms A Perfect Fit for Smart Living Solutions

EZVIZ has introduced its latest range of secure and smart home cameras, which is Wi-Fi enabled, offers 2 way communication, has an alert system, and where no installation is required. EZVIZ makes use of technologies such as smart hardware and internet cloud services to create an intelligent work and life for users. The secured environment enables people to enjoy the relaxed, comfortable and pleasurable life of technology in a safe, convenient and green living environment created by smart technology. EZVIZ provides intelligent products and services for residences, offices, shops, schools, hotels and other places of residence. They can be also used for patient monitoring at the hospitals. The next-generation of indoor and outdoor smart surveillance cameras and intruder alarm systems, the EZVIZ range will transform households with smart life experience by making it easier for individuals to connect to everything happening in their life – all while ensuring their home is safe.   The smart products have all been created to provide peace of mind for users, while making them as easy as possible to use. The entire range is ideal for use in a number of settings such as in children’s rooms to keep an eye on pets, and by families with elderly relatives. However, the solutions also provide the perfect security for business premises. Each high-quality camera comes with a huge list of features such as crystal clear 720P-1080P imagery, IFTTT-compatible, cloud services and SD card storage options. The smart home alarm kit is the first smart home alarm system. Adding another level of security and connectivity for users, it links flawlessly between existing indoor and outdoor Wi-Fi cameras, smart locks, garage doors, and light bulbs. Once a sensor or detector is triggered, a linked EZVIZ camera will commence recording and send users a notification that they can click to see what triggered the alarm. The wireless range (866Mhz) is up to 100m from detectors to main alarm hub. EZVIZ alarm kit consists of alarm hub, a remote control, PIR motion detector (pet immune detector) and open-close detector (for windows or doors). All products are IFTTT compatible, and can work seamlessly with Amazon’s Alexa and Google Assistant. Working with just one app, the hi-tech products offer the ideal solution for numerous applications around the home. All EZVIZ customers need to do is simply say, “Alexa, show me the camera in the living room,” and the feed from an internet-connected camera will send the video to the Amazon Echo. EZVIZ cameras deliver the best value and user experience to customers by merging video and voice control in the smart home. The Alexa integration offers yet another level of value to EZVIZ customers. EZVIZ smart home security cameras are available online and through the distribution channels. Its latest models include, C6CN, alarm starter kit, C1C, C3A, C3W colour night vision cameras. EZVIZ smart home cameras come with smart features like Wi-Fi connectivity, two way communications, motion detection alerts on mobile, motion tracking and easy installation. The latest EZVIZ cameras can be operated in 100% wireless mode and they come with an inbuilt battery. The C3W cameras are weatherproof cameras, it can be used for outdoor installations. C3W colour night vision camera enables users to see the vibrant colour images even in darkness. EZVIZ products are available pan India through the authorized distributors and e-commerce channels. The best-inclass EZVIZ products have cost effective pricing.  

Read More

Research Demonstrates Enterprises Must Adapt to Address Telework Security Challenges Long-term

Fortinet®, a leading global provider of broad, integrated, and automated cybersecurity solutions, recently unveiled the 2020 Remote Workforce Cybersecurity Report. The report investigates the cybersecurity challenges that organizations faced as a result of the dramatic shift to telework early this year and the planned investments to secure remote work in 2020 and beyond. This report is based on a survey conducted in June 2020. Participants are employed in 17 different countries, representing nearly all industries and the public sector. Highlights of the report follow: The sudden shift to telework was challenging for most organizations As the COVID-19 pandemic spread rapidly in the first half of 2020, many organizations were required to shift to telework practically overnight as teams around the globe were asked to stay home. Nearly two-thirds of the firms surveyed had to rapidly transition over half of their workforce to telework. In addition, most respondents said the rapid change presented a challenge to their organization, with 83% citing it as moderately, very or extremely challenging. Only 3% were not at all challenged. In addition, the evolving remote work environment, increased reliance on personal device usage, and overall influx of workers outside the corporate network opened an opportunity for unprecedented cyber threat activity. From opportunistic phishers to scheming nation-state actors, cyber adversaries found multiple ways to exploit the global pandemic for their benefit at enormous scale as evidenced by a recent FortiGuard LabsGlobal Threat Landscape Report. Threats included phishing and business email compromise schemes, nation-state backed campaigns, and ransomware attacks. In fact, 60% of organizations revealed an increase in cybersecurity breach attempts during the transition to remote work, while 34% reported actual breaches in their networks. With a spike in employees remotely connecting to the corporate network, an increase in breach attempts and overall cyberattacks, organizations cited the most challenging aspects of this transition as ensuring secure connections, business continuity, and access to business-critical applications. At the time of the survey enterprises had already invested in key technologies as a result of the pandemic. Nearly half of organizations invested further in VPN and cloud security, while nearly 40% invested further in skilled IT professionals or network access control (NAC). There is still room for improvement: Almost all enterprises will invest more in secure telework Given the number of attempted breaches and overall waves of cyberthreats targeting remote workers, organizations need to carefully consider what technologies and approaches are needed to secure telework moving forward. Defense strategies need to be adjusted to fully account for the extension of the network perimeter into the home. As of June this year, a long-term shift to telework is anticipated, with nearly 30% of organizations expecting more than half of their employees to continue working remotely full time after the pandemic. Almost all organizations expect to invest more to secure telework long-term, with nearly 60% of enterprises spending more than $250,000 in secure telework investments in the next 24 months. Moving forward, the majority of enterprises surveyed intend to make unplanned upgrades to their existing systems to secure telework. Many also plan to add new technologies not previously in place.   Only 40% of organizations had a business continuity plan in place prior to the pandemic. Yet, as a result of the pandemic and the rapid shift to remote work, 32% invested further in this area. While organizations have made improvements in securing their remote workforces since the beginning of the pandemic, survey data reveals several areas that could be considered opportunities for improving secure remote connectivity. These areas include: Multi-factor Authentication (MFA): The survey revealed that 65% of organizations had VPN solutions in place pre-pandemic, but only 37% of organizations had multi-factor authentication (MFA). While VPNs play an important role in ensuring secure connectivity, they are simply one part of securing access. Therefore, if not already in place, it is recommended that organizations consider integrating MFA into their remote security plans. Endpoint Security and Network Access Control (NAC): 76% and 72% of organizations plan to either upgrade or adopt NAC or endpoint detection and response (EDR) solutions respectively. As employees work remotely, organizations face challenges to control the influx of non-trusted devices on their networks to enable remote work, creating new security challenges overnight. By adopting NAC solutions, IT teams get increased visibility and control over the users and devices on their network. EDR solutions deliver advanced, real-time threat protection for endpoints both pre- and post-infection. Software-defined Wide-area Networking (SD-WAN) for the Home: 64% of organizations plan to either upgrade or adopt SD-WAN, but specifically for the home office. The critical advantage of extending secure SDWAN functionality to individual teleworkers, especially super users, is that they can enjoy on-demand remote access as well as dynamically scalable performance regardless of their local network availability. Secure Access Service Edge (SASE): 17% of organizations made investments in SASE prior to the pandemic, and 16% invested in SASE as a result of the pandemic. Still, 58% plan to invest in SASE to some degree going forward. Although SASE is an emerging enterprise strategy, it is increasingly seen as an opportunity to combine network and security functions with WAN capabilities to support the dynamic, secure access needs of today’s organizations. Skilled Security Professionals: At the start of the pandemic, only 55% of organizations had enough skilled IT workers in place to support the shift to remote work. And while 73% of organizations stated their intention to invest further in skilled IT workers in the next 24 months, the historical lack of skilled IT security professionals could present a challenge.  

Read More