securitylinkindia

Glasscock Texas Schools Installs Combination of Wireless and Wired Locks Managed by 3xLOGIC infinias Access Control

3xLOGIC, Inc., a leading provider of integrated, intelligent security solutions, recently announced Glasscock Independent School District (TX) has embarked on Phase Three of their ambitious plan to convert to a largely wireless, keyless access environment, supplemented by some hardwired doors as well. VGI Technology, San Angelo, TX, is managing the installation of this on-going project. VGI also provides access control and video surveillance to 40 school districts across Texas. About 18 months ago, Wade Williams, VGI, worked with the district to finalize Phase Two plans for over 70 Allegion wireless locks for the Texas school, managed by an existing 3xLOGIC infinias access control system. Phase Two involved wireless locks for internal classroom doors, Phase One of the project started in late 2018 with 60 exterior doors being fitted with both wireless and wired locks. Scott Bicknell, Superintendent, Glasscock ISD, contacted Williams after touring a nearby school district’s system of more than 100 doors, managed by the infinias system. “We wanted to stop people from entering the school during certain times,” explained Bicknell, “Our focus so far has been more on access control than video surveillance, but we’re looking at video in the future as well.” Phase Three, which is on-going in the fall of this year will see 38 more wireless locks added to the mix, in order to secure all academic settings at the school. The pre-K to high school facility serves approximately 300 students. “Phase Three is a nice addition to the system, Phase Two was focused on where students spend most of their time during the day,” said Bicknell, “Now, we’ll add more wireless locks as the budget has become available, and we’ll be about twothirds wireless, supplemented by some hardwired doors – all managed by the infinias system.” Glasscock ISD maintains multiple buildings, comprising two campuses, all connected into one large building. Other facilities include an agriculture shop, cafeteria and concessions, two gyms, and a bus depot. The school building has three outer doors and all visitors must be buzzed in by intercom. In this way, there is no free flow of outside parties into the building or anywhere around the building during the school day. “We didn’t want to fall behind in addressing our security needs,” said Bicknell, “We decided we would proceed from the exterior doors to the interior and now we’re achieving much better peace of mind for the safety and security of our students and staff.” The exterior and interior doors are access card-based, and only staff and teachers are issued cards. Glasscock maintains multiple user groups with different access privileges and times. Multiple staff members have the infinias application on their phones and these staff can manage the system remotely at any time, from anywhere. “The system is really convenient,” commented Bicknell, “Throughout the installation so far, it’s been smooth sailing. The system has been a great improvement. Now we have a system with very little maintenance needed, just batteries in each of the individual locks.”  

Read More

Oklahoma Selects Rekor Systems to Mitigate Uninsured Motorists

Many states face growing problem of uninsured vehicles on the road Rekor Systems, Inc., a Maryland-based company providing real-time roadway intelligence through AI-driven decisions, recently announced that the State of Oklahoma will integrate the Company’s Rekor One™ platform across the state to provide vehicle information associated with uninsured motorists as part of the state’s Uninsured Vehicle Enforcement Diversion Program (UVED Program), which is operated by the Oklahoma District Attorneys Council. Use of the Rekor One platform by Oklahoma’s UVED program furthers the state’s mission to decrease the number of uninsured motorists on the road and keep matters out of the court system. The platform allows for real-time detection of non-compliant vehicles and instant data consolidation into a regularly updating insurance database connected to the state’s enforcement programs. Additionally, Rekor’s AI-driven technology identifies a vehicle’s make, model and color – providing additional validation for confirming vehicle identification. Oklahoma created the UVED program as it ranked number one in the nation for uninsured motorists and after statistics showed that one out of four drivers were operating a vehicle without insurance, despite a legal obligation that motorists must have coverage. Oklahoma is losing millions in potential revenue each year from taxes on insurance premiums, and insured drivers are burdened with the cost of property damage and medical bills, as well as higher premiums, stemming from accidents involving uninsured motorists. “Oklahoma has hundreds of thousands of uninsured motorists on the road right now, which has huge safety and financial implications for the state and its citizens,” said Robert Berman, President and CEO, Rekor, “We are seeing eye-popping statistics in other states regarding an increase in uninsured motor vehicles on the road (as well as expired tags). Rekor One is a single turnkey solution that Rekor can deliver to any state. It provides all the technology they need, with a high level of data security, to identify uninsured vehicles and take effective measures to ensure compliance.” A motorist enters the UVED program by acquiring insurance and paying a $174 enrollment fee, thereby avoiding the possibility of criminal charges, associated penalties, and a permanent mark on his or her driving record. With over 273.6 million registered vehicles on the road in the United States, approximately 33.5 million are being driven without insurance, according to data derived from the Insurance Information Institute’s and Federal Highway Administration’s most current data. Nearly one in eight vehicles in the US are uninsured, which puts insured drivers at greater risk in the event of an accident. In addition to the burden on insured drivers, states are deprived of a significant amount of tax revenue that could be earned on insurance premiums that should be paid by millions of vehicle owners. Rekor will receive a $43 processing fee for each UVED Program enrollment. In addition to deploying technology to identify and process diversion notices issued to uninsured motor vehicle owners on the road, Rekor will also assist Oklahoma drivers by providing a one-stop web portal for uninsured motorists to easily find non-standard and standard insurance for their vehicle. Rekor’s technology supports and ensures adherence to Oklahoma’s privacy regulations. The Rekor One platform only retains data when a vehicle is out of compliance and until the vehicle becomes insured. No additional information is held or shared within the database. “The goal of the UVED Program is to create safer roadways for Oklahoma citizens. Uninsured vehicles create negative consequences for innocent motorists as well as the State,” said Amanda Arnall Couch, Director, Oklahoma UVED Program, “Rekor, a company based entirely in the United States, was the only bidder to offer a secure, complete solution platform within the framework of single-vendor accountability. This partnership will give UVED an outcomes-oriented approach for non-compliant vehicles, reducing the burden on the criminal justice system while assisting Oklahoma citizens in getting insured.” Rekor’s technology will assist the State of Oklahoma in identifying uninsured vehicles on the road, and once identified, the enforcement division will issue a ‘notice to respond,’ encouraging a vehicle owner to get insurance and comply with the law. Uninsured motorists cited on the road by police officers can face stiff penalties, including fines, imprisonment, license plate confiscation and/ or reinstatement fees. “The Oklahoma UVED Program is among the first in the country,” Berman concluded, “With Rekor One’s cost-effective and multidimensional technology, we anticipate that many states will initiate similar programs in the near future. An advantage of the Rekor One platform is that it can also be used to support multiple additional community safety, intelligent roadway and revenue generation activities.”  

Read More

IDIS Ai Box For Covid-19 Supports Safer Working Practices and Re-Opening

IDIS is supporting affordable and straightforward returnto-work steps with its new AI Box (DV-2232) for COVID-19. Powered by the industry’s most accurate IDIS deep learning engine and compatible with IDIS deep learning analytics (IDLA), the AI Box for COVID-19 is a simple addon appliance that’s compatible with existing IDIS network cameras and DirectIP® NVRs, eliminating the need for complex analytics software or edge VA devices. The IDIS AI Box for COVID-19 includes functions for social distancing adherence, people counting and occupancy control, crowd detection, mask detection and dashboard and reporting tools that are critically important for compliance. These practical deep learning-based features support safe working practices which help prevent the spread of coronavirus and other infections. Users can take advantage of four advanced video analytics functions simultaneously across 32-channels and each camera stream, making the cost-effective IDIS AI Box adaptable for all sizes of business. Users also benefit from a perspective view, giving superior analysis compared to top view analytics cameras and ensuring that each camera provides exceptional surveillance for security, safety and data intelligence. IDIS AI Box advanced video analytics enables some of the most important counter-infection measures: People counting & occupancy monitoring: Counts the number of people coming in and out of premises (stores, banks, pharmacies, and busy commercial sites, for example) showing the status of occupancy in real-time. Using cameras positioned at entrances and exits, the IDIS AI Box generates precise AI-assisted alerts to overcrowding, with real-time calculations to underpin occupancy control interventions. For retail customers, dashboards positioned at store entrances use a simple 3-step traffic light system to automate the admissions and flow in and out. In addition, the dashboards show estimated wait times at peak periods and allow retailers to customise the displays with company logos and promotional graphics. Social distancing: Detects distances between individuals and sends an alarm when a defined distance is violated. Users can configure event notifications to issue verbal reminders and select from five spacing sensitivity levels depending on local state, industry, or sector-specific requirements. Crowd detection: Alerts building and store managers to overcrowding in pre-selected zones and triggers event alarms every time bottlenecking or overcrowding occurs. Face mask detection: Detects people wearing a mask or people not wearing a mask, giving users the ability to configure and trigger event alarms and issue verbal reminders accordingly. Reporting: Comprehensive reporting tools are provided for all four of these video analytic functions. They provide data analysis including people counts and occupancy, along with any violations by time, day, and month, for accurate and required record keeping. This data can also be exported to Excel spreadsheets for easy referencing. “The COVID-19 pandemic has tested everyone’s resilience,” said James Min, Managing Director, IDIS Europe, “IDIS has developed credible and practical solutions to help reduce infection risks, with automation that improves operating efficiency and technology that avoids the cost of hiring in additional manpower or redeploying existing staff to higher-risk front-line roles. “Moving forward much of this functionality will also prove particularly valuable for retail, with AI-driven video delivering insights into shoppers’ behaviour, helping to convert browsing into sales and improving the customer experience and for facilities managers to optimize buildings and workspace.”  

Read More

Reduce Road Accidents and Minimize Congestion with Hikvision’s Traffic Violation Detection Solution

Poor driving doesn’t just increase the risk of accident and injury – it also slows down traffic and increases delays for other motorists. To help local authorities overcome these challenges, Hikvision has created its traffic violation detection solution, which detects traffic and parking violations across the road network in real time and supports fast, automated incident responses and ticketing deterrents. According to the World Health Organization (WHO), traffic accidents kill approximately 1.35 million people a year and injure up to 50 million more. A large number of these accidents are preventable, caused by speeding drivers, or distracted drivers who are talking on their phones or texting on the road. As well as causing accidents and near-misses, bad driving practices also increase traffic congestion, which is a major headache for motorists and local authorities. Common driving behaviors that typically impact traffic flow include illegal stopping or parking, incorrect use of priority lanes, illegal u-turns, and unnecessarily sharp braking at traffic lights and junctions. To help make roads safer, and to keep traffic flowing, Hikvision has created a traffic violation detection solution. This focuses on three key areas to ensure that motorists drive as safely as possible, and that any infractions are recorded and notified. As an additional benefit, the Hikvision solution uses smart video to automate traffic and incident management. This not only speeds up response times compared to manual monitoring, but it also helps to save police time and free up forces to focus on major incidents. Detecting speeding and other traffic violations at checkpoints Using Hikvision cameras and velocity radars mounted on checkpoint ‘gantries,’ traffic violations can be detected at key locations on the road network. In particular, the speed of vehicles can be verified – either using a location-based snapshot, or an average speed between two checkpoints (as shown in the images below). Speed check method 1 I nstantaneous speed detection: This uses a speed radar, a video camera, and a supplemental light to detect the speed of the vehicle as it passes the checkpoint. Speed check method 2 A double-checkpoint segmentation system: This calculates the average speed of a vehicle travelling between two checkpoints or ‘gantries.’ In addition to speeding, Hikvision checkpoint cameras use deep learning technology to detect a number of additional traffic violations. For example, the cameras can determine if drivers are wearing their seatbelt. By recognizing license number plates, checkpoint cameras can also support local authorities to detect stolen vehicles, and check that only the right types of vehicles travel on highways and urban streets by recognizing vehicle attributes. Preventing accidents and improving traffic flow at intersections Traffic violations at intersections are not only dangerous for motorists, cyclists and pedestrians, but they can also slow down traffic and cause long delays. To address these challenges, the Hikvision traffic violation detection solution monitors driving behaviour at intersections, helping reduce the risk of accidents and speed up traffic flow. Most traditional intersection monitoring solutions focus on vehicles that run red lights – cross referencing license plate information with traffic light status. Hikvision solution also does this, but it also integrates lane properties to detect and respond to misuse of lanes, illegal u-turns, wrong-way driving, and other incidents that can cause accidents and delays. Improving safety and reducing congestion with illegal parking detection I llegal parking has major consequences for road safety and traffic congestion. It can also be inconvenient or dangerous for cyclists and pedestrians who need to pass badly parked vehicles. The Hikvision traffic violation detection solution addresses these challenges with high-performance illegal parking detection cameras. Employed with Hikvision’s DarkFighter technology, the cameras provide upto 4 megapixel video images, even in very low-light conditions. The cameras can reliably detect vehicles and capture their license plates when they enter into the pre-defined illegal parking zones, including those on highways and urban streets. Hikvision illegal parking detection cameras can also be configured easily to implement rules that allow parking only during certain times of day, or for a limited time period. This makes the cameras suitable for town car parks, parking bays on high streets, airport pick-up bays, and other areas where motorists can only leave their vehicles for a short time. Bringing it all together in a single-pane view To maximize road safety and to help reduce traffic congestion, all elements of the Hikvision solution are integrated into a single, intelligent technology platform using HikCentral VMS. This brings cameras, velocity radars, servers, and control room infrastructure together to provide a real-time view of traffic incidents across the road network and to speed up response times dramatically. With video data streamed into the platform in real time, authorities can view vehicles that violate traffic rules, and play back footage to verify what took place, and review traffic statistics at peak demand times. The HikCentral platform can also be integrated with third-party ‘ticketing’ systems that send automated fines and other penalties to vehicle owners via email, sms, or traditional mail.  

Read More

Gallagher Appoints Regional Manager for North India

Global security manufacturer, Gallagher, has recently appointed Shamsher Singh as the Regional Manager for North India. Singh joined the team lead by Gautham NV to support Gallagher’s growing business opportunities in India – including a significant project currently underway with the Indian Air Force. Singh brings to the role over 11 years of sales and business development experience working with multinational companies. He holds an MBA in Marketing and International Business and an engineering degree in Electronics and Communication. “We’re thrilled to welcome Shamsher to the Gallagher India team,” said Ian Meadows, Sales Manager for India, the Middle East, and Africa, “With the skills and experience Shamsher brings to the table, he will play a key role in our North India growth.” Singh started in the role on 5 October 2020 and will work closely with Gallagher’s network of channel partners to bring the latest security technology to the region. A technology leader in integrated access control, intruder alarms management and perimeter protection, Gallagher’s security solutions are in use within the highest levels of national and local government, military, commercial, industrial, healthcare, transportation, and academic organisations in more than 130 countries.  

Read More

InfoComm India GoVIRTUAL

Held from 18 to 20 November, the 2020 edition of InfoComm India, a fully-online experience hosted on the specially-tailored GoVIRTUAL platform, was attended by 3,410 unique visitors. While a scaled-down version of what would have been a conventional in-person exhibition, InfoComm India GoVIRTUAL was no less exciting, helmed by 92 exhibitors who collectively presented a total of 183 live product demos and 28 webinar sessions. This also marks the first time in organizer InfoCommAsia’s history that it has delivered a fully-digital event. Cutting-edge show walks its talk “ The COVID-19 pandemic has caused major disruption to businesses around the world. InfoComm India was not spared either, and we had to make the difficult decision of cancelling the in-person show earlier this year,” said Richard Tan, Executive Director, InfoCommAsia, “Yet in every crisis lies an opportunity. Knowing full well the value that InfoComm India has brought to technology innovators and industry end-users over the years, we quickly pivoted and committed to delivering a digital event. As a proponent of technology, InfoCommAsia has walked the talk, adopting cutting-edge innovations such as artificial intelligence and live streaming to achieve a first-of-its-kind event.” The unique and ground-breaking GoVIRTUAL platform is a culmination of over five months of intense development. The platform boasts a range of innovative yet easy-to-use features that helps deepen the business experience for both exhibitors and visitors. Designed to be highly intuitive, it allows both exhibitors and visitors to ensure business continuity, wherever they are in the world. The AI-powered algorithm matched exhibitors with relevant visitors, and vice versa. Through the user’s behaviour, interactions and searches performed on the platform, the algorithm learns and continuously refines its accuracy to provide highly-relevant business matches. At one glance, exhibitors can browse the profiles of sales leads they should be reaching out to while visitors can connect with shortlisted technology innovators whose solutions are transforming their industries. Real-time, live product demos allowed brand ambassadors to explain the salient features of their solutions to the viewers. Thanks to integrated video, audio and chat functions, both presenters and audience can engage in real-time conversations. Exhibitors’ virtual showcases mimic actual exploration experience on the show floor, allowing visitors to meet with exhibitors and see their technologies up close and in action. The integrated video, audio and chat functions here let visitors interact with exhibitors, just like visiting an exhibitor’s booth in person. InfoComm India Summit, the show’s learning platform, hosted a series of webinars. Topical sessions include discussions on a post-pandemic future, India’s smart urbanization journey, cybersecurity, digitalization of healthcare and education, and more. Platinum Partner Crestron Electronics (India) shared that the GoVIRTUAL platform has succeeded in functionally replicating the in-person show experience. “Initially when we were planning this event, we were not expecting ourselves to be so busy,” said Farhan Walele, National Product Manager (Sales), “However, from 10am to 6pm, we had to be at the booth, standing from morning to evening, similar to past InfoComm India events. The only difference is we are now doing this in the comfort of our office.” Echoing this sentiment Kirti Shetti, Director – Operations, Kramer Electronics India said, “InfoComm India GoVIRTUAL measured up to what would have been the physical InfoComm India event. It definitely did justice.” The live demos and webinars drew substantial interest from show visitors. In total, 2,148 visitors participated in the live demos while 3,082 delegates watched the webinars over a period of 3 days. GoVIRTUAL to be adopted across future InfoCommAsia shows With the successful roll out, GoVIRTUAL now serves as an effective proof of concept, and InfoCommAsia plans to adopt this powerful platform for all of its upcoming marquee shows in 2021 – InfoComm China slated for July, InfoComm India in September and InfoComm Southeast Asia in October. Each show will be a hybrid of in-person and virtual platforms. Additionally, InfoCommAsia will host regular one-day preview events on GoVIRTUAL leading up to the main hybrid event, with each one focusing on a different vertical and geographic markets and its business end-users. InfoComm India and InfoComm India GoVIRTUAL 2021 The next hybrid InfoComm India will take place 15- 17 September 2021 at the Bombay Exhibition Center, Mumbai.  

Read More

IDEMIA Launches VisionPass in India, an Unrivalled Facial Recognition Access Control Device to Meet the Need of the Hour for a Hygienic, Contactless and Frictionless Experience

VisionPass joins IDEMIA’s MorphoWave™ Compact fingerprint device as the market’s most efficient and hygienic range of contactless biometric devices for access control IDEMIA, the leading global provider of Augmented Identity, is launching its advanced contactless facial recognition access control device VisionPass for the Indian market. Their way of living has been drastically impacted during the last few months, creating completely new requirements for a contactless approach when it comes to accessing public or private spaces. IDEMIA’s contactless devices for access control answer these new requirements by offering a hygienic, contactless and frictionless experience. VisionPass, the ultimate face recognition device for physical access and time & attendance control, extends IDEMIA’s range of contactless devices for access control. Designed as per the needs and requirements of end-users, VisionPass offers a unique experience – being identified on-the-move in less than 1 second thanks to its powerful algorithms. For more user comfort, VisionPass works in all light conditions from complete darkness to bright sunlight, with all face types and with various vertical and horizontal angles to cope with users of different heights (1.20-2.00 meters/ 3ft 11”-6ft 6”). As VisionPass is designed for access control and security, it can also counter spoofing attempts by image, video or 3D masks. Peeyush Jain, Vice President Terminals business, IDEMIA said, “In the last few months, daily lives have been drastically impacted apprising us with new challenges, and with it there has surfaced a need for a contactless approach especially while accessing public or private spaces. Our contactless devices for access control address such new requirements by offering hygienic and frictionless experiences to end users. With VisionPass & MorphoWave solutions at hand, we now have the most powerful contactless biometric terminals available in India for organizations to ensure a ‘zero human contact’ access experience. Secured access through these robust, reliable, and cutting-edge terminals is unparalleled, be it with facial recognition, or a touchless 3D fingerprint scan.” IDEMIA recently won the Security Industry Association (SIA) New Product Showcase Award in the Biometric category for VisionPass facial recognition device. IDEMIA already received a similar Award in 2018 for MorphoWave Compact, a biometric device that can scan and verify four fingerprints in less than a second. This new Award, this time for a facial recognition device, confirms IDEMIA’s ironclad technology in the field of contactless biometrics for security applications. They have all become hyperaware of the criticality of hygiene in these challenging times. With superlative biometric terminals like VisionPass and MorphoWave Compact and their touchless sensor technology in the Indian market, establishments now have the choice to ensure a fully contactless experience for access control everywhere for authorized users, through these robust, reliable, and powerful devices. With VisionPass (facial recognition) and MorphoWave™ Compact (fingerprints), IDEMIA confirms its leadership in contactless biometrics for secure, convenient and hygienic access control. IDEMIA provides a trusted environment enabling citizens and consumers alike to perform their daily critical activities (such as pay, connect and travel), in the physical as well as digital space.  

Read More

Array AG Series SSL VPN Appliances Gets ICSA Labs Certified

Array Networks, the network functions platform company, recently announced that the AG Series SSL VPN Appliances (vxAG on AVX7800) has earned the ICSA Labs SSL-TLS VPN 4.0 certification. The vxAG virtual secure access gateway runs on Array’s Network Functions Platform as well as virtualized servers and industry-standard hypervisors to flexibly enable on-demand, full-featured secure access for users whenever and wherever needed. ICSA Labs that began with the mission to increase awareness of the need for computer security and to provide education about various security products and technologies is today one of most respected security technology testing organizations that offers independent validation of SSL-TLS conformance and efficacy. Enterprises worldwide rely on ICSA Labs to set and apply objective testing and certification criteria for measuring product compliance and performance. While the testing for the SSL-TLS VPN 4.0 certification was performed only on the vxAG (on AVX7800), the certification extends beyond to include the other members of the Array AG series SSL VPN appliances and Array AVX series network functions platform family. ICSA Labs’ clients benefit by working closely with technical analysts, leveraging criteria for product development, accessing research and participating in consortia, all with the objective of contributing to improved products that benefit customers and the security ecosystem ICSA Labs SSL-TLS VPN testing confirms that AG Series SSL VPN appliances properly implement TLS with strong cipher suite support while providing certificate management and validation. Additionally, they include proper authentication and authorization, session control and secure operation in either a Reverse Web Proxy or Layer 3 VPN mode. ICSA Labs, an independent division of Verizon, develops and performs comprehensive, unbiased, third-party security certification testing. ICSA Labs tested the vxAG virtual appliance running on Array Networks’ AVX7800 hardware. vxAG indicates that the virtual appliance runs on other hypervisors. The SSL-TLS certification criteria, version 4.0 is certification criteria for products that implement SSL-TLS for data confidentiality, authentication and integrity assurance for internetwork transactions. ICSA Labs tests SSL-TLS products against a standard yet evolving set of criteria. The SSL-TLS certification criteria is composed of both functional and assurance requirements. The criteria requirements define an industry-accepted standard that all products claiming to have SSL-TLS capabilities must attain. ICSA Labs certification helps enterprises, service providers and government agencies identify and evaluate security solutions with confidence. Array’s scalable secure access gateway centralizes control over access to applications, desktops, files, networks and websites from a broad range of remote and mobile devices providing secure connectivity, end-point and server-side security and application-level AAA policies on a per-user basis. AG series physical and virtual appliances are deployed at the network perimeter or in front of business-critical resources to provide secure remote and mobile access for employees, guests, partners and other communities of interest. Array’s secure access gateways are ideal for consolidating remote and mobile access on a single robust platform to provide end-users with a consistent login experience ensuring consistent access policies and minimize potential attack vectors. Each Array SSL VPN shares a comprehensive secure access feature set, right-sized seat license packs and an option for low-cost business continuity contingency licenses. The AG series SSL VPN appliances are ideal for enterprises that need to support multiple communities of interest as well as service providers that need to provide remote access to globally dispersed data centers.  

Read More

Kidnapping – Handling of Hostage Situation & Role of the Corporate Security

A thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, and one who has mastered the art of strategic and tactical thinking to the core. He has been using this combination to seed new ideas and to lead them to their implementation on-ground. This has been a consistent feature of his career. He has rich experience of approximately 35 years in corporate in diverse domains & from functional managerial level to apex as chairman of a corporate group. His acumen for handling crisis management has prompted him to share his exclusive and niche experiences. He will be discussing the topic in four distinct parts in separate articles; Part 1 – Hostage situation & ways to deal with it, Part 2 – Negotiation skills, Part 3 – How to survive an abduction or hostage situation, and finally in Part 4 – Role of the corporate security. He will take you through realistically at ground zero in visualization and response matrix through series of these four articles. Hostage Hostage can best be defined as a person given to or forcibly and unlawfully held by a person, party or organization etc, as a security or pledge, or for ransom, release, exchange for prisoners or pending the fulfillment of an agreement etc. Activity Pattern During Hostage Situation Before the incident: As with any scenario, planning is crucial. Of course, the circumstances of these incidents can vary so wildly that it’s difficult to prepare in any comprehensive way. Equally, you don’t want to spread fear among your staff by overplaying the likelihood of a hostage attack. However, a few general emergency strategies can be applied. Firstly, ensure that everyone knows where the nearest emergency exits are located and where they should regroup outside. Staff should evacuate immediately upon receiving an alert (ignoring possessions/ work), and should proceed in an orderly fashion out of the building. Secondly, you may like to create a series of code words for use in an emergency situation, which communicate very simply what is happening. In highrisk buildings or locations, the availability of panic buttons could also be an important precaution. Likewise, consider introducing security guards and/ or security screens. Thirdly, it is also worth thinking about incorporating advice on dealing with difficult customers into your staff training in order to prevent any situations from escalating out of control. We also need to understand what the customer has experienced prior to this point. During the incident: Staff will be looking to you for reassurance so you need to remain calm and controlled. Panicking will not help anyone. If you have a senior role, you have a responsibility to lead the team through this experience. But the people in your team could react in many different ways. Some may be angry, some frightened and some calm. Be flexible in your approach, but consistent with your messages. You don’t want rumours to start. It’s also important to keep a close eye on your staff because an initial shock reaction can quickly evolve into frustration. Guard against people who want to be a hero. Look out for anyone who seems angry and make sure they do not disappear out of sight. They might attempt to re-enter the room or building, but that would be an extremely dangerous situation, which must be left to the professionals. If you’re in contact with the hostage-taker (at least before emergency services arrive), stay calm and agree to everything they ask. Only provide them with information that is essential. Attempting to talk them out of it at this stage could inflame the situation. Just as everyone else should try to keep their cool, it is vital that the intruder is kept as calm as possible. It is probable that this is the first time that they have done something of this nature, which means that they’re likely to be stressed too. Their adrenalin will be pumping, but you don’t want them to do anything rash. As HR director, you’ll be expected to gather information, do a head count and keep your staff together in one place. Act as an intermediary between police and employees by sharing information if possible, in order to reassure your team that the situation is under control. Try not to let anyone leave in the early stages. You need to keep the situation contained and controlled. Equally, ensure that no one talks to the media at this point. Any media coverage driven by panic or sensationalism could again be inflammatory. Also remember that dealing directly with hostage takers is a delicate skill and leave it to police specialists. After the incident: Individuals respond to trauma in different ways so assess each person on an individual basis rather than as a group. Try to gauge each individual’s state of mind and how they feel about work. Some will feel that continuing to come into work is the best way forward, while others may want a few days’ leave. However, it’s important that counseling is made available to everyone – not just in the short-term, but in the longterm too. One thing that we know about post-traumatic stress is that it may not become immediately apparent. A stressful experience may bring feelings or memories to light immediately or it may be months later. Around one in three people will develop post-traumatic stress disorder, but nearly everyone will display symptoms of post-traumatic stress for the first month. Such symptoms include depression, feelings of guilt, anxiety, anger and grief. Staff may experience flashbacks/ nightmares, avoidance, numbing and a feeling of being ‘on-guard.’ The issue is that life threatening episodes undermine a belief that life is fair and safe and that someone is secure. It is vital to look out for these symptoms and allow employees time to talk about how they’re feeling. They need to be allowed to ask questions and, most importantly, to get back to their normal life and routine. Although an unlikely occurrence, it is…

Read More

Gajshield Infotech Wins the Best Cloud Security Vendor Award at the Virtual CISO50 and Future Security Awards 2020

Gajshield Infotech, a leading, Mumbai-based data security solutions provider, has won the prestigious award for the Best Cloud Security Vendor at the Virtual CISO50 and Future Security Awards 2020, which was held as an online event on 24th November 2020. Virtual CISO50 and Future Security Awards is an international platform for recognising individuals, businesses, and vendors that have successfully navigated today’s challenges and thrived through digital technologies and delivered unprecedented value through innovative application of security technologies. The awards acclaim the best security minds and projects whose technologies, products or solutions are considered to have significant potential in meeting the needs of the new normal of today’s businesses. The need to have robust and agile data security solutions for all types and sizes of businesses has become the need of the hour because the number of sophisticated cyber-threats and malware attacks has been increasing exponentially, especially during the COVID-19 pandemic. These threats pose significant challenges, all kinds of industries and data leaks are at the centre of digital attacks. For the past 17 years, Gajshield Infotech has been catering to the needs of robust firewalls across the globe, with over 10,000+ firewalls distributed across different geographical regions in India, Europe, United States, the Middle East, Africa, Australia, New Zealand, and South East Asian countries. Their approach of looking beyond traditional security solutions and focusing on ‘data first’ security strategy is a leap forward in the security solution industry that is helping enterprises to secure cloud and SaaS applications by implementing a data security Firewall solution.  

Read More