securitylinkindia

Videonetics Announces Technology Integration with RBH Access

Videonetics, world’s leading AI & DL powered Unified Video Computing Platform™ development company, has recently announced technology integration with RBH Access, a leading manufacturer of access control and security management systems. Built on the powerful integration framework between Videonetics Intelligent Video Management Software (VMS) and RBH ‘AxiomX’ Alarm Management Suite, the users are empowered to gain end-to-end control over the physical access points through one centralized interface. The ‘truly’ seamless integration allows visual verification of the person, captures events as they happen and the ability to respond immediately, from the user-friendly GUI of Intelligent VMS. Coupling greater visibility, improved security, forensics at reduced TCO At the time of incident, the operators will be notified with an alert and they can leverage full power of both RBH AxiomX and Videonetics IVMS to quickly lock/ unlock doors, control cameras, retrieve live video and much more. Henceforth, they are equipped to make decisions, after conducting investigations of specific access points using video evidence, analyse patterns and generate reports. The user can manage access rights with live videos and real-time notifications using Intelligent VMS desktop, web, and mobile clients. Best suited for all sizes of installations with scalability, the integrated solution simplifies security operations and enhances safety measures of the businesses. Moreover, customers will also benefit with reducing total cost of ownership due to only upgrading the surveillance system, rather than adding multiple hardware components. Videonetics Unified Video Computing Platform™ helps users make sense of surveillance, by providing them with an end-to-end solution for a wide range of applications. The platform is powered by Videonetics artificial intelligence and deep learning engine, which is trained on humongous data sets, making their solutions incredibly robust and smart. All products and solutions are integrated yet modular, ONVIF compliant, OS and hardware agnostic, scalable and interoperable. Videonetics has been ranked #1 video management software provider in India, and among the top 5 in Asia (IHS/ Informa Tech Research). They remain driven by innovation, and committed to making the world a safer, smarter, happier place. RBH is a Canada based manufacturers of integrated security systems with in-house R&D for hardware and software. With 25 years of experience RBH systems are deployed in almost all type of customers ranging from Defence headquarters, SEA port, Airports, Metro, Universities, manufacturing units globally. RBH have some largest deployment of integrated access control globally to its credit. RBH have a comprehensive alarm management suit and their solutions are industrial grade with best of industry certifications. RBH solutions are available under make in India program for Indian customers.  

Read More

SnylloGO: On-Demand Service STARTUP

Hiring security personnel and facility management workers is always at the top of mind for scores of organizations and individuals, and SnylloGO – an on Demand Service Startup is causing a huge wave and is making the hiring process a total cinch. The beta version of this new app SnylloGO has recently been launched in Delhi-NCR during the current pandemic situation. SnylloGO – seemingly a new disruption in the security industry allows an organization to hire licensed security guards, facility workers and other blue collar personnel who are available for work with the touch of a finger. The app knows the users’ locations, and so when they launch it, a list of immediately available security guards in their area populate. Each user has the option to request for the availability of security guards with times, dates and locations in order to help secure their business. In turn, licensed security guards can register and immediately start accepting work. There are strict rules in place for security contractors using the app. Payment from organizations to security contractors is all done directly through the app via online payment gateways. In the event a security contractor doesn’t show up for a shift, they are automatically terminated from the app, and an instant refund is provided back to the organization or individual. This is how the app is a win-win for businesses, security contractors and other blue collar service providers and takers who are looking for steady work in their area. The App directly connects licensed security guards with the clients looking for private security services. This technology will create new freelance work opportunities for guards, and will eliminate the need for dispatch centres. Sabgun Thapar, the Founder of Snyllo said, “Technology is totally amazing and it has allowed us to develop a new app that will help organizations and individuals run their operations smoothly and more securely. The app will help organizations employ licensed security contractors all around the country to work as per their convenience and earn additional income.” “This app provisions – you can easily work on a 40-hour work week without any problem whatsoever. But if you don’t want to work a 40-hour work week, you may select the days e.g., Monday, Friday, Saturday, Sunday, or whatsoever,” added Sabgun, “It’s really ground breaking in relation to its flexibility, how people as well as clients interact with it.” “The security guard industry has remained stale for so many years – nothing really much has changed,” said Sabgun, “SnylloGO is now a big disruption & revolution simply because it will dramatically alter how organizations hire security guards during these testing times of pandemic where everyone is keen to cut cost and reduce capex, and it will also offer licensed security guards the freedom and flexibility to work when they want.”  

Read More

iValue and SecurityAdvisor Technologies Join Hands to Strengthen Last Mile Security

iValue InfoSolutions, India’s premium technology aggregator, announced recently of their collaboration with SecurityAdvisor Technologies. A partnership focusing on providing security solutions, reporting of security outcomes, and targeting personalized, contextual, real time security awareness coaching to end users. iValue manages and optimizes digital assets and provides security checkups, vulnerability assessment and threat intel services to protect digital assets. The partnership of these two companies is not only meant to enhance the security features of their customer base, but also to aid in creating security awareness for the most at risk end-users and closing the human gateway for threat actors to go after sensitive data. “People, process and technology have been the core and consistent pillars of cyber security since its inception back in late 1980s. While huge investments have been made on the technology front, followed by process improvisation from time to time, focus and investment on people has not been in-line with the threat associated with them. Inline with the quote, ‘Amateurs hack systems and professionals hack people,’ iValue is delighted to partner ‘SecurityAdvisor,’ to introduce versatile, comprehensive and scalable platform to evaluate, access, train and continuously measure readiness of people in the enterprises to effectively fight and win against potential cyber threats and attacks,” said Harsh Marwah, Chief Growth Officer at iValue InfoSolutions. For more than a decade now, iValue InfoSolutions has been focusing on diverse aspects of security. iValue’s broad range of services also includes security audits and forensic assessments, and security infrastructure assessment, architecture, design and engineering. This multidisciplinary approach across verticals with technical expertise across 100+ brands in DNA area for design, sizing, POC, deployment, integration and optimization allows iValue to not just understand the security needs of the organization, but also help them in finding the right solution helping them adapt to the changing cyber milieu. Sai Venkataraman, Co-Founder & CEO at SecurityAdvisor said, “SecurityAdvisor focuses on detecting teachable moments for specific users and provides personalized security awareness education for each user, department and organization. Just as importantly we deliver measurable results like a 30-50% reduction in malware or a 90% drop in users clicking on phishing emails.” SecuityAdvisor Technologies believes that developing an effective group or cultural cybersecurity model, organizations must leverage an individual cybersecurity behavior model. Knowing hackers leverage human cognitive biases to get users to make cybersecurity errors such as clicking on fraudulent links or falling victim to malicious emails, it’s imperative that end-users learn to combat these biases. Various factors influence the cybersecurity behavior of an individual employee, but when fortified, the collective cybersecurity behavior of all employees can build an organization’s cybersecurity culture. Jagannathan K, Head – Services Business at iValue InfoSolutions said, “People are the soft and easy target for hackers, and they have become the primary threat vector. They can be first line of defence and reduce security incident provided they are given customized, personalized, engaging, easy to consume training at the right time. This will change the behaviour of people and help organizations build a cyber immune culture. We have partnered with SecurityAdvisor, which has vast training catalogue, integration with security and IT tools and AI based behavioural management platform to enable organizations to build cyber immune culture with a measurable outcome. I am excited about the partnership and the benefits it can bring to the partners and customers.” By analyzing a sea of data from various verticals, SecuityAdvisor offers four solutions/ services that help in protecting the organizations and its employees from cyber threats. Employee risk assessment: SecurityAdvisor has a proprietary analytics engine that leverages the data organizations already have. With the data collected by the existing security products they identify and visualize the top 5 human risks and recommend tailored security awareness programs for the organization and its employees. Phishing simulation: SecurityAdvisor has a novel phishing simulation solution that allows organizations to simulate and attack end users. Contextual coaching for employees: Every organization has 5% of users who account for over 90% of the security risk. SecurityAdvisor identifies the high risk users and targets them with personalized messages. It has a proprietary and patented AI engine that identifies unique teachable moments for each employee and delivers bite-sized tips for each of these moments. Security outcomes reporting and visualization: SecurityAdvisor provides the customers with a complete understanding of their organization’s security posture, through result driven reports that focus on real world outcomes, not a fake phishing click rate. The analytics based approach focuses on leading real-world outcomes that impact organizations the most.  

Read More

New Fortinet Survey Points to Optimism on 5G Promise while Highlighting Role of Security

Fortinet, a leading global provider of broad, integrated and automated cybersecurity solutions, recently announced that a commissioned survey conducted by TelecomTV in association with HardenStance and ETSI found broad-based optimism for 5G revenue opportunities among Telecom sector respondents, but only if the new 5G services were both more secure and better tailored to key enterprise use cases. 5G has the potential to boost consumer and enterprise market bringing a series of benefits such as high speeds, lower latency and more bandwidth. The fifth generation of mobile standards also pave the way to enhance domains such as healthcare, transport with autonomous vehicles or smart cities offering new usages and improving daily lives. On the other hand, 5G increases considerably the number of connected devices which provide a new profitable field for cyber adversaries. Considering this, mobile network operators and enterprises must have a strong cybersecurity strategy that can protect their entire infrastructure, from the mobile core to the edge. A prominent business opportunity Overall, almost 90% of respondents anticipate growth in average revenue per user (ARPU) from their investments. This growth is expected to be split evenly between public and private 5G networks, but since at least half of all private networks are likely to be built and managed by the operators, such companies could potentially capture as much as 75% of the overall 5G business. Critical to achieving these gains however, according to 64% of respondents, will be the augmentation of existing security – as much in terms of architecture as in operations – as well as the tailoring of solutions to specific business use cases which are either critical or very important for nearly three quarters of respondents – especially within the key vertical markets of transport, logistics, automation, manufacturing and healthcare. The overarching implication of this is that the old business model of providing undifferentiated mobile connectivity services will no longer suffice. To succeed, most will need to create shared-responsibility partnerships with other providers as well as with their enterprise customers. The need to partner with other ecosystem providers – even those recognized as competitors – was clear among the survey’s respondents with 44% seeing cloud providers as partners, or at least mainly partners, and only 11% viewing them as pure competitors. These findings map well to the existing division of responsibility between cloud providers and their enterprise customers, where the maintenance and security of the infrastructure falls to the provider, while the enterprise is left to secure its own data and applications. The importance of a strong security value proposition Fortunately, cybersecurity is a top of mind consideration. More than 80% of survey respondents consider that the inherent security features of 5G 3rd generation partnership project (3GPP)’s specifications as nothing more than a baseline for the 5G market; and 62% of all respondents asserted that some, or most, 5G use cases will require additional security features. In addition, providing a value proposition that extends beyond connectivity – as 61% of respondents consider unlikely business growth in ARPU if they confine themselves mainly or entirely to the connectivity layer of the 5G value chain – and adequately addresses the increased security requirements of 5G and the use cases it will deliver, was regarded as either critical, or very important by almost 90% of respondents. Rajesh Maurya, Regional Vice President, India & SAARC at Fortinet said, “From an infrastructure perspective, the migration of today’s mobile networks to 5G – especially standalone (SA) implementations – creates new security imperatives that extend well beyond inherent 5G capabilities as defined by 3GPP. The virtualized, distributed and dynamic nature of the 5G core combined with massive increases in scalability, the growing utilization of multi-access edge computing (MEC), and overall critical use cases, requires strong security for the underlying infrastructure and the business use cases. This is where Fortinet’s proven success at delivering 4G and 5G carrier-grade user and control planes visibility and protection, scalability and price-performance demonstrates a clear advantage to those looking to capitalize on these new 5G opportunities.” From Fortinet’s standpoint, the advent of 5G and the expansion of the cyber threat landscape will impel mobile networks and enterprises to adopt a holistic security approach to cope with this evolving environment. Methodology The TelecomTV survey for Fortinet asked telecom sector respondents around the world for their perspective on the evolution of the 5G market in enterprise services as well as the security requirements and security business models needed to support those enterprise services. Among the respondents, more than one third comes from the network operator/ service provider community, including major global tier one mobile network operators and a further quarter from the hardware/software systems vendor sector.  

Read More

Micro Focus Announces Industry-First CISO Resource to Accelerate Enterprise Resilience During Unprecedented Global Challenges

Micro Focus recently launched CyberResilient.com, a new digital resource designed to support CISOs and board members as they navigate the shifting demands of the digital economy, and attempt to continue to drive business growth during times of uncertainty. In the face of unprecedented global challenges and the rise of cybercrime, organizations are seizing the opportunity to transform into a resilient enterprise designed to have the agility, structure, and growth-centric focus to not only weather adverse conditions but also drive sustained business performance. Knowing how to successfully adapt to an evolving business and threat landscape can be a challenge and as such, CyberResilient. com provides leaders with a trusted resource to help them build their roadmap to cyber resilience, and ultimately business resilience. Like any journey, understanding where a person is, and where he wants to be allows him to understand the steps to take to deliver on his end goal and the gaps to fill as he moves forward. CyberResilient.com provides the ‘360º cyber resilience assessment tool’ as a means by which CISOs and cybersecurity leaders can holistically assess their current status and identify strategy gaps so that they can take the necessary actions to protect their business, detect the changing risk surface, and evolve their competencies in line with changing threats. Each of the core pillars of cyber resilience (protect, detect and evolve) is covered as part of the assessment and are considered critical elements in enabling teams to continually and intelligently deliver an intended outcome in the face of a potential threat a reality. “Internal and external adversity are always the forces that impact business continuity and performance, and those organizations that have the frameworks in place to assess, pivot and adapt will be in a better position to successfully navigate those challenges,” said John Delk, Senior Vice President and General Manager, Security, Micro Focus, “The launch of this trusted new resource and ‘360º assessment tool’ provides security leaders and senior stakeholders with knowledge and means to not only better understand financial, operational, and information risk, but how to evaluate and elevate their posture in a manner that ultimately drives business growth, profitability and sustained organizational modernization.” Underpinning the core pillars of cyber resilience is the ability of the organization to strategize, communicate, plan, implement and integrate technologies designed to allow an organization to ‘pivot at scale,’ secure the business value chain and enable resilient operational excellence and digital transformation. To do this, it is critical that organizations use a business outcome centric approach leveraging artificial intelligence (AI), machine learning (ML) and automation to streamline and reduce the cost of becoming more resilient. The proper implementation of AI and ML technologies at each stage of protect, detect and evolve is a foundational element and is essential for a resilient organization to follow guidelines to maximize effectiveness in their deployment. Visitors to CyberResilient.com can expect to discover resources and strategic knowledge to better equip their businesses for the new security landscape. Micro Focus delivers enterprise software to empower our 40,000 customers worldwide to digitally transform. With a broad portfolio, underpinned by a robust analytics ecosystem, the company enables customers to address the four core pillars of digital transformation: Enterprise DevOps, Hybrid IT Management, Predictive Analytics and Security, Risk & Governance. By design, these tools bridge the gap between existing and emerging technologies so customers can run and transform at the same time.  

Read More

6 Trends to Boost Video Technology Adoption in the Coming Year

The global video surveillance market size is expected to grow to USD 74.6 billion by 2025, at a CAGR of 10.4%, according to a Markets & Markets report. The ever-increasing requirement of safety, coupled with a boom in smart cities, has led to a rise of the security market in the country. Notwithstanding the current pandemic, here are six trends to boost video technology adoption in the coming year. 1. Need for smarter, safer cities   By 2030, India is expected to have 155 tier-I cities, 104 tier-II cities and 331 tier-III and IV cities, as per Anarock Research. This burgeoning urban sprawl is expected to further raise the demand for video technology solutions as one of the measures to ensure public safety. In February 2019, the government of India teamed up with state governments for a pilot safe city project to be run in eight metropolitan cities in India – Delhi, Mumbai, Bengaluru, Chennai, Kolkata, Hyderabad, Lucknow and Ahmedabad at a total cost of Rs.2919.55 crore. With funding from the central government’s Nirbhaya fund, there will be a high emphasis on women’s safety in this project. Cameras will be installed in public places, intersections, buses, and other critical areas. A centralized control room will be set-up in each city, security vehicles will be equipped with dashboards for live streaming, GPS tracking and other advanced features will be implemented. While the zeal to use advanced video technology to ensure public safety is appreciable, the government must ensure that it is balanced with citizens’ right to privacy. There is a need for more transparency on how the visual data collected by these cameras will be used, and the opinions of digital rights groups and experts must be considered before implementation. 2. Demand for industry-specific solutions will increase   The demand for customized video technology solutions is growing across industry verticals including financial services, retail, healthcare and manufacturing. The availability of IP-based cameras and open platform VMS has enabled a lot of new functionalities which are being exploited for industry-specific uses across sectors. Retail outlets, for instance, use video technology for stock verification, crowd management, trend analysis, PoS integration and personalized service to customers. In the financial services sector, video analytics is being used to identify suspicious activity in ATMs and get real-time alerts about the same to reduce the incidence of theft. In the healthcare sector where theft of expensive surgical equipment and drugs remains a concern today, video technology is seen to be increasingly employed to tackle the problem. Likewise, in manufacturing, where fully automated plants are replacing manual activity, motion detection functionality in IP cameras immediately identifies any stoppage of crucial machines like conveyors, thus eliminating loss of time in problem identification. Going forward, the ability to customize solutions for industry verticals will be key differentiator for video technology solution vendors and will benefit end users looking for better functionality from their video solutions. 3. Open platform software adoption will soar   Thanks to the growing awareness of its capabilities and declining prices, the adoption of IP-based surveillance systems is expected to increase manifold in the coming years. IP cameras can leverage IoT and AI technologies to provide additional capabilities beyond mere security. They can enhance operational efficiency, aid in real-time responses and provide valuable business intelligence, which could prove instrumental in enhancing customer experience and in boosting the overall profitability. An important principle underpinning all these capabilities is the interconnectivity of systems, which is enabled by an open platform VMS. As IP cameras go mainstream, and users can look to take advantage of technologies such as IoT, AI and smart devices. Open platforms that support multiple technologies and avoid vendor lock-in will be in high demand. Open platform video management software (VMS) promises flexibility, choice and possibilities that future proof your solutions. We expect end-users to opt for resellers or solution providers who can support them with a flexible and customizable platform and communicate the right value and benefits of the open VMS. 4. Cybersecurity   As video cameras become more connected to diverse systems because of increased IoT adoption, cybersecurity concerns are likely to increase. Hackers gaining access to cameras to record videos, selling camera access to third parties, or even using cameras to spy on shops or steal credit card information could become a common occurrence. Customers will need to be aware of and seek out sophisticated security protocols in video solutions such as high-level encryption of web and mobile user access, authentication and authorization of third-party applications, physical separation of camera and client networks, and vulnerability scoring systems. Customers must increasingly evaluate video management solution vendors on these criteria to ensure that their advanced, feature-rich video solutions are secure and stable. 5. Demand for Cloud-based video surveillance solutions will increase   Cloud-based video solutions are gaining in popularity due to their efficiency, flexibility, cost-effectiveness, and security. Small and medium-sized businesses are mainly enthusiastic about Video-as-a-Service (VSaaS). VSaaS enables hosting of hardware and software of security operations in the cloud so that users can access their IP cameras and IoT devices and check video footage or alarm linkage from anywhere. With no on-site server installation and system configuration required, it is often more convenient than traditional video solutions. Cloud also enables metered use so users can distribute costs over a contract term and pay only for the services that are used. Popular cloud services providers like Amazon offer flexible and scalable VSaaS solutions with elastic compute, storage and networking capabilities. VMS solutions that integrate well with AWS VSaaS will witness increasing traction. 6. Smart search will become increasingly popular in video solutions   Smart Search is an advanced feature based on motion detection that helps users review videos in sizable numbers or huge file sizes. Users can search for a specific activity based on pre-described smart search settings. Combined with metadata search and indexing, this feature can make searching and reviewing relevant video content much faster. With smart search, organizations can improve the speed and…

Read More

Safety & Security at Hotels/ Stays An Imperative

A hotel stay is more than just a place to catch a few winks. It connotes uppermost safety and security followed by comfort to most, as well as luxury to a few. Big brands advertise their stays basis star ratings, which primarily denote amenities and luxuries. When it comes to star rated properties, safety and security is taken for granted by the travelers/ customers, but should it be so? And can it be so for all the other hotels? More so, how will safety be ensured in times of COVID-19? Terrorists attacks at hotels in Sri Lanka, recent fires reported at different hotels in India and now safety issues with regard to COVID-19 infection highlight the spectrum of security and safety issues that need to be catered for by hotels. Big gatherings/ conferences/ functions have always posed multitude of challenges as regard to safety and security for most hotels, and COVID-19 further adds to these challenges, requiring special preparations on part of the hotels to ensure security and safety. Screening of staff as well as ensuring their safety is another area, which if not looked into, can pose a threat to the safety and security aspects of a hotel and its customers. Most of the safety requirements related to fire and building code are very clearly articulated by various rules, laws, guidelines of relevant municipalities/ countries, however, to what extent they are being met and ensured tends to remain a question mark, and as such are never promulgated for the information of travelers. In the pre COVID-19 era, travel for business and vacations showed an increasing trend with the user penetration expected to hit 16.2% by 2023 from 15.4% in 2020 and the revenue from the hotels segment expected to show an annual growth rate (CAGR 2020-2023) of 4.1%, resulting in a market volume of US$ 432,095 million by 2023 (Travel & Tourism report 2019 – Statista Mobility market outlook – pre COVID-19). At the same time, as per an article published in ‘NY Times’ in 2018, there was approximately a 20% increase in crimes in city’s hotels and motels over the previous three years. Today the industry is reeling under the effect of COVID-19 with the industry coming to a complete standstill – leading to closures, layoffs etc., as is evident from news reports such as Hyatt Hotels is reported to have closed some of its properties and furloughed staff to cut costs and a net loss of $103 million (https://www.hotelmanagement.net/human-resources/hyatt-plans-temporary-closuresfurloughs-due-to-covid-19), in the first quarter of this year. French hospitality group Accor is reported to be closing more than 3,000 of the group’s 5,000 hotels and making more than 200,000 staff temporarily redundant during the outbreak (https://www. thejakartapost.com/travel/2020/04/03/accor-saysclosing-two-thirds-of-hotels-over-coronavirus. html), and other such reports. The effect of COVID-19 is more likely to introduce different ways of operating and being able to ensure safety and security is definitely going to help kick-start the industry and keep it going in times to come. COVID-19 is very likely to define a new normal for the industry. The safety and security readiness of hotels thus needs to find an expression, which should easily be convertible into a decision. The world as such does not have a standard established for safety and security ratings, which if established will help in the aforementioned decision making. A study conducted by Tyra W. Hillard, JD Seyhmus Baloglu, PhD in 2008 on ‘Safety and Security as Part of the Hotel Servicescape for Meeting Planners’ (https://www.researchgate.net/publication/233203682_Safety_and_Security_as_Part_of_ the_Hotel_Servicescape_for_Meeting_Planners) concluded that ‘visible safety features’ along with ‘documentation and staff training’ had a significant and positive impact on actual hotel selection and meeting planners willingness to pay more for a hotel with a safety and security certification. Having a safety and security rating displayed clearly is the need of the hour to encourage travelers to venture out of the safety of their homes. Most of the starred hotel chains, world over, have incorporated procedures to ensure safety and security and are incorporating measures to conform to the guidelines issued by WHO and governments in respect of measures to safeguard against COVID-19. They ensure the same by conduct of surprise checks/ audits undertaken through inhouse efforts as well as through conduct of third-party safety and security audits. The economically viable options like Oyo, Zolostays, FabHotels etc., also need to ensure the safety and security to remain viable. The star ratings elude to a competent safety and security establishment even though it is not specifically depicted by any rating, nor it is corroborated by any form of external certification; the other hotels/ stays in the market do not have any recourse to claim their safety and security status. Hence, there is an emergent need to have a safety and security rating/ certification by an external agency to help the travelers decide on a place to stay and understand the associated risks. The online travel agents (OTAs) like MakeMyTrip, Expedia, Cleartrip, Yatra, Trip Advisor, Booking.com etc. could help in assisting the customers make an informed decision by displaying the safety and security ratings. Needless to say, even the starred hotels could do with safety and security rating/ certification to further ensure the trust of the travelers/ customers. The challenge off course is to have a standardised format for safety and security, which cuts across different size and types of hotels, so as to enable availability of a common point or level rating system. There is a lot of work which has happened in this field. One such pioneering firm is Sky Touch Global, Australia, which has standardised the safety and security requirements and aligned them with existing threats/ risks inclusive of risks associated with COVID-19, and at the same time ensuring compliance with mandatory requirements. The designed system clearly communicates the safety and security levels of a hotel which enables decision making for the traveler. It also acts as a marketing tool for the hotels, both starred and non-starred, whilst ensuring safety and security for the traveler, considering various safety and security scenarios that exist…

Read More