securitylinkindia

Trends & Predictions 2020

Rakesh Kharwal MD, Cyberbit – India Cybersecurity, for businesses, often comes as something that holds little value. However, the global economy is expected to shed $6 trillion on an annual basis by 2021 due to wide-ranging cyberattacks and cybercrimes – as also pointed out in a report by Cybersecurity Ventures. To give a picture, this figure is more than double of what India’s GDP is at present, and $1 trillion more than what it aims to become by 2025. This must surely ring a bell. Cybersecurity’s value goes beyond mere economic losses, as it also has a far-reaching impact on its image and involves legal implications. So, let us have a look at what are going to be the major cybersecurity predictions for 2020 and what approach must businesses adopt. The Cybersecurity skill gap continues to widen drastically The global shortage for cybersecurity professionals has reached 4 million according to ISC Research, and more than 1 million of this shortage is in India alone. This will continue to be the top challenge for security leaders as organizations will face difficulty in finding quality cybersecurity professionals. Also, many studies suggest that most security professionals experience their first real-life malware attack on the job and learn about such incidents by going through what they call ‘Baptism by Fire.’ So, the remediation of an ongoing attack is usually haywire since the cybersecurity team is not able to manage such incidents effectively. Therefore, SOC analysts and incidence response teams need to be trained pre-emptively using simulation by mirroring real attacks. Otherwise, they will be unable to handle the impending threats. SOC automation & orchestration will be critical Organizations are threatened by advanced attacks from multiple threat vectors and cybersecurity teams need to respond within minutes. On top of this, they are also bombarded with too many alerts and a labyrinth of security tools. Infact, lack of automation and orchestration was observed second-biggest pain-point by SANS SOC Survey 2019 in the utilization of the full potential of cybersecurity solutions. Therefore, SOC automation and orchestration will continue to be critical for organizations. This will help build a centralized, integrated tool set to streamline the security analyst’s job and make cybersecurity professionals more efficient at monitoring and eliminating threats. The attack on Critical infrastructures continues to rise Critical infrastructure organizations such as oil and gas, nuclear power plants, water utilities, and manufacturing hubs will continue to rise as they create an integrated infrastructure based on IoT. Organizations that use critical infrastructures need to do away with the myth that IT and OT are two separate entities. With the emergence of IoT-based use cases to monitor and analyse production data, the air-gapped environment no longer exists. Most of the SCADA attacks we’re seeing today are initiated from the IT world, which can either be through spear phishing, social engineering, infected USB sticks, vulnerability related to the standard IT environment or some other source. The security leaders hence need to invest in technologies that can provide unprecedented IT and OT asset discovery and visibility to detect known and unknown OT threats and anomalies. Ransomware to become ever more threatening A study by Cybersecurity Ventures shows the towering volume of cyberattacks that companies have to face on a daily basis. According to this study, a business fell victim to a ransomware attack every 14 seconds in 2019, and by 2021, this figure is projected to become 11 seconds. Ransomwares are getting more sophisticated and can penetrate most of the conventional or sophisticated solutions such as antivirus, firewalls and even enterprise-grade endpoint detection and response (EDR). Highly targeted organizations today require military-grade protection that is reliable, and collects and analyses the across the-board data of the organization using big data, designed for air-gapped environments, and uses advanced behavioral detection. MSPs will focus on detection & response capabilities to acquire new customers Many organizations of varying shapes and sizes lack the internal security resources and expertise required to move beyond preventative security technologies. Today, they need to proactively address detection, response, and drive 24/7 monitoring. As organizations are struggling with increasing alerts and skill shortages, security information and event management (SIEM) system alone can’t meet the demands of the ever-growing threat landscape. There is a need for establishing capabilities that let organizations perform dedicated threat monitoring, detection and response capabilities through a turnkey approach. In a recent research note, Gartner highlights the fact that many MSSPs are adding MDR-type services to their portfolios. The report predicts that by 2020, 15% of organizations will be using MDR service. Managed Detection and Response (MDR) envisions creating a proficient service that combines the forces of the perimeter, as well as advanced endpoint-telemetry with SOC analysts. Prevention is better than cure. However, in cybersecurity, prevention has now become just a single aspect of comprehensive security. Today, organizations need a lot more than mere prevention, as a number of recent cyberattacks have also illustrated to us. 2020 will obviously witness a shift towards a holistic and robust cybersecurity framework that has all of its elements, including human resources, well connected, thereby ensuring that no stone is left unturned in terms of addressing the modern threats.  

Read More

Trends & Predictions 2020

AI: Separating facts from fiction While artificial intelligence (AI) is becoming a household term, it’s far from being a household reality. While machines are making huge steps forward, they are not capable of thinking or acting like humans. What they are really good at, however, is combing through a huge amount of data to provide deeper insights to help humans make informed decisions more quickly and efficiently. In 2020, we can expect machine learning to continue to make huge strides in the security sector, helping cities and law enforcement deploy their physical resources more efficiently based on predicted trends in crime. Machine learning will also be instrumental in helping automated license plate recognition (ALPR) systems become better than ever at reading characters, rejecting bad reads, recognizing a license plate’s state of origin and more. Facial recognition and privacy While some people see the deployment of facial recognition or other analytics that can identify individuals and track their movements as a powerful way to enhance efficiency and security, others see it as invasive. As we move into 2020, developers will need to work hand in hand with regulating bodies, while continuing to improve the technology to eliminate biases. Developing solutions using a privacy-by-design approach will help reduce concerns and increase protection. Physical identity management Organizations of all sizes need to control access to their spaces and facilities. However, companies that do not have the budget to invest in costly customized applications have to rely on untraceable processes that involve a lot of human interactions to grant and then revoke access to their secured spaces and facilities. Keeping track of access on an individual basis requires a great deal of time and energy from security operators, personnel, and visitors. Fortunately, in 2020, the proliferation of out-of-the-box solutions will result in more small and mid-sized organizations moving to cloud-based identity management systems that they can implement easily. These more affordable physical identity and access management (PIAM) solutions will help organizations secure their systems and facilities by effectively managing access requests based on an individual’s identity and an organization’s security policies. They can also ensure that only those individuals who have the right to access a secured area can do so by managing and automating the process. Improving data protection with blockchain While blockchain is typically associated with cryptocurrency, it’s increasingly being used in other sectors. Essentially, it’s a non-destructive way to track data changes over time. When used in security technology, blockchain can prevent tampering with video and access control evidence as well as identity management systems. Because of its capacity to track interactions with digital files, blockchain can determine if a file has been tampered with, and then provide information about where and when the tampering occurred. This is incredibly powerful when it comes to maintaining the chain of custody and ensuring that security data has not been manipulated. We’re already seeing it being used by enterprise-level, global organizations that are looking for a technology to underpin their security systems. As the benefits of blockchain become more widely recognized, others will also start using it to protect the integrity of both their operational and security data. Continued focus on cybersecurity Cybersecurity will continue to be a huge issue for the physical security industry in 2020. As companies collect more data, they’re going to have more data to protect. Today, governing bodies and responsible manufacturers are already working in partnership with academic researchers, technology experts, civil rights advocates and industry leaders to regulate the use of potentially invasive technology, and the procedures required to safeguard against data breaches. These partnerships will only strengthen in 2020. In addition to helping guide regulations, manufacturers will need to invest heavily in cybersecurity by building protections into their products by default. For all involved, the goal will be to promote security while protecting individual privacy and civil liberties. Only if done correctly, they will be able to have both at the same time.  

Read More

SMART CITIES TO SMART VILLAGES: DRONES HAVE BECOME INDISPENSABLE!

Could you remember when you saw a drone the last time – hopefully in a wedding! As the latest fad, grand weddings suddenly appear incomplete without drones doing aerial photography. Almost everyone today is familiar with the term ‘drone,’ and everyone does likely remember the kids flying toys as the earliest airborne drones. It is becoming an increasingly popular way to refer the small (usually) helicopter-like devices that are being flown as ‘drones.’ The word ‘drone’ is used not only to cover a $15 hobby aircraft that a child flies, but also to describe a high-tech $15 million weapon used on a battlefield. Those devices don’t exactly serve the same purpose. They have different names too. Drones are also known as ‘unmanned aerial vehicles’ (UAVs). Many professionals in the industry believe that UAVs need to have autonomous flight capabilities, whereas drones do not. Therefore, all drones are UAVs but not vice versa – all UAVs are not drones. While drones make most people think of ‘unmanned aircrafts that can fly autonomously – that is – without a human in control,’ it can actually be used to describe a wide variety of vehicles. For example, there are seafarings (like submarines), or unmanned underwater vehicles (UUVs), and/ or also even land based unmanned ground vehicles (UGVs) – they also count under the given definition of drone. While most of us are still fathoming drones as our own sky-patrolling aircraft, the next major step for them is already happening i.e., the unexplored underwater tasks. Scientists with National Ocean Service estimate that more than 95 percent of the earth’s oceans have so far gone unexplored in absence of an equipment like underwater drones. Sensors: The core Prior to understanding the deployment of UAVs or drones it is important to understand that a drone is just a meagre platform to carry the sensors which form the core of what is desired from the UAV platform. Without the sensor package a UAV is nothing but a fancy toy. With the advancement and miniaturization of sensor technology UAVs are finding new ways to solve myriad problems. With the advent of 3D printing technology and advanced materials, the design and development cost of UAVs have also gone down significantly, making it possible for governments, private and public sector to consider using them. Gone are the days when a UAV carried a simple video camera – today they carry fused sensors which can be deployed under varying weather conditions. Some of the important sensors such as hyperspectral sensor and LIDAR are beginning to revolutionize agriculture, and town and country planning. With the development and integration of ‘sense-and-avoid’ (SAA) system, UAVs are poised to take another quantum leap in deployment for delivery operations as they will be able to perform complex flight operations in the national airspace. Drones in India India’s drone journey which began more than two decades ago, deploys one of the largest fleets of military drones in the world; however, its journey in the civilian and commercial arena has only just begun. The UAV sector in India is beginning to look up with a number of service providers, startups engaged in innovative design and development. There are over a dozen UAV companies that have found their niche in this sector and are engaged in military, civil and commercial sectors. Drones & Mission Smart Cities India with its smart cities program spread across its diverse landscape provides an ideal laboratory for the deployment of UAVs and related technologies. India, in keeping with the global trend of transforming existing cities into smart cities, has identified nearly 100 such cities for transformation. The smart city initiative launched by the Modi Government in 2014 is expected to find new vigor which will provide a much-needed boost to the UAV industry. According to CISCO, smart cities are those cities that use digital technology to connect, protect and enhance the lives of the citizens. The UN has estimated that by the year 2050, 68% of the world population will be living in urban areas. In such a scenario drones become an ever-increasing important piece of puzzle for ushering in efficiencies in the management of the urban environment. UAVs become effective tools only when they are available at the grass root levels of every arm of government and civil society, and operate within a set of well-defined rules and regulations. With the recent advances in cloud computing, AI, wireless sensors, networked unmanned systems, big data, and Internet of Things, billions of devices are being connected together, providing a substantial opportunity for UAVs in smart cities program. “A drone is just a meagre platform to carry the sensors which form the core of what is desired from the UAV platform. Without the sensor package a UAV is nothing but a fancy toy” The use of UAVs in geo-spatial surveying and geographical information systems is revolutionizing the way smart cities operate by bringing down cost for such operations. A land survey which takes weeks and months while done manually by a surveyor can now be done in less than an hour. UAVs can relay accurate and real time information which plays an important role in the civil security of cities. They may provides information to the civic administration to deploy proactive measures rather than reactive ones. Such a decision-making process is a hallmark of a smart city concept. Drone technology today has matured to the point where it does not take an engineer or a technician to operate. Even a normal high school graduate can be trained to operate it very effectively. A good quality UAV system is fully autonomous, meaning it can take off, conduct the mission and land back in base all by itself. Such autonomous UAVs are now being used by law enforcement agencies for smart policing activities. Integration of UAVs with mobile applications, forensic software, secure and reliable wireless networks can help smart cities become a safe place. The recent news has caught attention that our own police department in Uttar…

Read More

Argentina Selects HID goID Technology

The government of Argentina has selected HID goID® citizen identity technology to power the country’s digital version of its mandatory National Identity Document for its Mi Argentina app. The collaborative effort between HID, Argentina’s Ministry of Interior, Public Works and Housing through the National Registry of Persons (Renaper), and the Ministry of Modernization makes Argentina the first country in the world to offer a true national identity credential within a mobile app to its citizens. Currently, there are 47 million DNI cards in circulation and recent legislation has accorded full legal equivalence to the smartphone version of the card. The Mi Argentina app, which houses the National Identity Document, was developed by the Ministry of Modernization and allows citizens who download the app on their mobile devices to request appointments, receive health information, and access credentials such as their drivers’ license. Powered by HID goID technology, citizens can also access their National Identity Document on a mobile device on the app while offline. “The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens,” said José D’Amico, Director of Renaper, “This innovative application is not only easy to get, but we also believe this could be the first step in digitizing identity across the government in Argentina and potentially other countries in years to come.” Citizens with the ‘Mi Argentina’ app can initiate their request for a mobile ID by visiting a Renaper office, where their identity is verified and authenticated. Once approved, they receive an email with a code to activate their National Identity Document. In the event a smartphone is lost or stolen, credentials can be immediately revoked, safeguarding the citizen from potential identity theft. The mobile ID is securely stored on the citizen’s smartphone, meaning it can still be accessed if the cell phone has no data plan or when connection to a network or Wi-Fi is not available. Storage on the phone brings additional security for the mobile ID ecosystem, as a channel back to the central database is never required. Renaper issues all citizens a National Identity Document at birth and requires two mandatory renewals – between the ages of 5 and 8, and at the age of 14. Adults are required to renew it every 15 years. “HID Global is committed to providing identity solutions that meet the evolving standards of the 21st century,” said Jessica Westerouen van Meeteren, VP & Managing Director, Citizen Identity with HID Global, “The government of Argentina’s implementation of our technology provides its citizens with innovative ID access and the ease of a completely mobile experience from registration to issuance.” The government of Argentina previously partnered with HID to upgrade the country’s ICAO electronic passport to a newer generation that was more cost efficient, improved security and enhanced data reading at border control checkpoints. The successful partnership was a key factor in the government’s decision to collaborate with HID Global and deploy the HID goID mobile identity solution. HID goID technology for a more secure, connected world The HID goID mobile ID ecosystem powers a more secure and connected world based on field-proven technology. It enables the issuance, lifecycle management and verification of mobile identities, and is a customizable solution that delivers many more functions than physical identity documents.

Read More

Thales – Cybels Analytics

At the 2020 edition of the International Cybersecurity Forum (FIC), Thales is unveiling Cybels Analytics, an innovative cybersecurity platform relying on advanced artificial intelligence and big data analytics technologies. The platform provides faster, sharper, more exhaustive detection of the most complex attacks in real time or proactively in differed time (hunting). It meets the needs of the most demanding customers, operating as a single, simple platform that even allows individual users to adapt the AI algorithms to the specific operational context of each sector. The cyberattack techniques that have emerged in recent years are increasingly complex and hard to detect. Despite growing awareness on the part of organisations, and frequent deployments of rules-based detection systems designed around well-known attack patterns, cybersecurity analysts also need to detect previously unknown threats, detect attacks more quickly and save time in conducting investigation analysis once a system has been compromised. Thales has developed Cybels Analytics, a comprehensive and advanced attack detection solution, to meet these needs. The innovative platform combines real-time threat detection based on analysis of existing threats (cyber threat intelligence) and proactive search for advanced and unprecedented cyberattacks (cold investigation or hunting), thanks to artificial intelligence and graphic visualization modules. These capabilities significantly reduce the time taken to detect advanced persistent threats from three months in average to just a few days, according to test results. Cybels Analytics uses machine learning algorithms developed by Thales to detect abnormal situations based on huge volumes of heterogeneous data from multiple sources (network data, end point analysis, OT logging etc.), helping to identify attack patterns and discover previously unknown threats. These algorithms, based on the principles of Thales TrUE AI, can be tailored to the specific needs of each business sector of activity by customers themselves via an easy to-use graphical interface. Cybels Analytics can be integrated with an on-premise security operations centre (SOC) or provided as a service in the cloud, enabling all the user’s detection systems (SIEM, EDR, NIDS etc.) to work together and complement one another. The platform is an important addition to Thales’s cybersecurity offering, rounding out the range of managed services provided through its SOC network and supporting the Cybels Sensor trusted probe, which is accredited by France’s National Agency for Information System Security (ANSSI). Cybels Analytics is also connected to the Thales Cyber Threat Intelligence service. By cross-referencing information about existing cyberthreats with an organisation’s system logs, Cybels Analytics ensures more acute, more exhaustive detection of untargeted attacks, revealing three times more indicators of compromise detection than conventional attack detection products. “We developed Cybels Analytics to help cybersecurity analysts overcome the challenges they face on a daily basis: growing data volumes, long detection times and investigation procedures, and the difficult task of qualifying previously unknown situations. Cybels Analytics is a trusted solution that delivers more efficient results, more simply and in a significantly shorter timeframe so that users can focus on value-added tasks in an area where talent is scarce and needs are constantly rising,” said Laurent Maury, Vice President, Cybersecurity and Critical Information Systems, Thales.

Read More

English Premier League Uses Patented Video Security Technology from Germany

Like many national football leagues, the teams of the English Premier League also suffer from unacceptable incidents such as lighting of pyrotechnics and throwing projectiles, hate crime and vandalism. This is why as early as 2013, the managers at Everton F.C. opted for a patented video security solution from the German video technology company Dallmeier. Today, 14 of 20 clubs of the 2019-20 Premier League season have implemented Dallmeier Panomera® multifocal sensor systems – including Arsenal, Chelsea, Liverpool and Manchester United. Dallmeier solution approach proves equal to international safety standards The patented Panomera® camera technology captures even very large areas with maximum efficiency and minimum overall operating costs Many teams in the top flight of English football are also involved in the Champions League and Europa League. So it is also extremely important for them to satisfy the safety regulations imposed internationally by UEFA and similar bodies. For this purpose, Dallmeier solutions enable high-resolution capture of expansive areas such as the stands with a minimum number of camera systems. With Panomera® cameras, multiple operators have the capability to zoom in on suspicious activities independently of each other, while the system continues recording the entire scene. With this combination of advantages of PTZ and megapixel cameras, an optimum overview of the situation is obtained, which can also be searched in the required minimum resolution at any time afterwards. This enables the clubs to achieve continuity of video evidence, get instant ID of people and events, and so reduce potential penalty payments. Smart content analysis through precisely defined image quality Besides the court usability of video recordings, the ‘minimum resolution density’ is also important for video analysis applications. As stated so succinctly by the rule – ‘quality in, quality out,’ of course the quality of the results of analysis – for example in ‘crowd analyses’ for people counting on stands, for ‘hostile vehicle mitigation’ or to detect intrusion in sterile areas – can only ever be as good as the quality of the image, and accordingly the quality of the input data. With Dallmeier solutions, as early as the planning stage customers can precisely specify the pixel density values defined according to DIN EN 62676-4 for each region of the area captured – depending on whether for example at least 62.5 px/m is required for AI-based object classification, or 125 or even 250 px/m is required to guarantee that recordings of persons will be usable in the court. “Throughout our selection procedure, the Panomera® cameras from Dallmeier were able to deliver images of the highest quality time after time, not only in normal daylight conditions, but also under weaker floodlighting, that is to say not only live but also in the recording with the highest resolution quality in all regions of the images. Moreover, with the Panomera® cameras we can capture large expanses, the entire area of the stands, for example, with just a small number of systems. Ultimately, these considerations were the critical factor in our decision to award Dallmeier the contract for video security at Goodison Park,” said David Lewis, Head of Security and Stadium Safety for Everton F.C. What we plan is what you get: 3D planning approach for maximum cost effectiveness The innovative 3D planning approach by Dallmeier provides stadium operators with the ability to place each individual camera with the highest precision in advance through the use of a ‘digital twin.’ Thus, even the planning contributes to a reduction of total costs. At the same time, the in-house planning team uses it to manage any difficulties such as visual obstacles (e.g., a video cube) or subsequent structural changes. This ensures that there are no ‘cost traps’ for the customers, and that compliance with all requirements is guaranteed without exception when the system is implemented.

Read More

VIVOTEK and CyberLink Announce Strategic Partnership in Facial Recognition

VIVOTEK, the global leading IP surveillance solution provider, and CyberLink Corp., a pioneer of AI and facial recognition technologies, have recently entered into a strategic partnership, which will integrate CyberLink’s FaceMe® AI facial recognition engine into VIVOTEK’s IP surveillance solutions. The initial collaboration was showcased in VIVOTEK’s booth at Intersec 2020 in Dubai, United Arab Emirates. “Founded in 2000, VIVOTEK has been dedicated to the IP surveillance industry for 20 years. Entering the era of AIoT, we will continue global partnerships to accelerate and enhance video applications by joining forces with industry-leading analytic software providers. We are honored to partner with CyberLink, also a Taiwanese company and to adopt CyberLink’s FaceMe®, which was ranked one of the most accurate AI facial recognition engines in the NIST Face Recognition Vendor Test (VISA and WILD tests),” said Owen Chen, Chairman of VIVOTEK, “Through this strengthened alliance, facial recognition intelligence will be integrated with VIVOTEK’s network cameras and back-end video management software, enabling security operators to receive accurate facial recognition alerts based on both blacklists and whitelists. We are very pleased to see our partnership being elevated to a new chapter today, further enhancing our goal to provide advanced video value for users around the globe.” “The demand for facial recognition is booming, driven by the latest IoT and AIoT innovations, and enabling a wide array of scenarios across industries such as security, home and public safety, retail, banking and more,” said Dr. Jau Huang, CyberLink’s Founder and CEO, “Each application is dependent on the performance of the cameras used to capture faces. CyberLink is pleased to partner with VIVOTEK, a world leader in surveillance cameras, and to integrate FaceMe® into VIVOTEK devices to provide accurate and reliable solutions to the market.”  

Read More

BMCE Bank of Africa’s IT Subsidiary Selects nCipher Security to Secure its Digital Certificates

nCipher Security, an Entrust Datacard company and provider of trust, integrity and control for business-critical information and applications, announces that its nShield® HSMs are being used by Eurafric Information (EAI), the IT subsidiary of BMCE Bank of Africa, to secure the digital certificates that enable device authentication for secure network access. The integration project was carried out by Oxyliom, an nCipher partner. BMCE Bank of Africa operates over 1,500 commercial branches in Africa, Europe and Asia. As BMCE’s IT subsidiary, EAI offers computer services to BMCE Bank Group’s members. nCipher and its partner Oxyliom were recognized for their roles in facilitating the digital certificate technology for EAI during a key ceremony held in Casablanca. The ceremony publicly affirmed nCipher’s ability to help meet the requirements of the Direction Générale de la Sécurité des Systèmesd’ Information (DGSSI), the Moroccan authority responsible for computer systems security, as well as international standards such as eIDAS. The nCipher HSMs also are used by EAI to facilitate secure digital signatures. Digital signatures use cryptographic techniques to dramatically increase security and transparency over electronic version of traditional signatures, which is critical for establishing trust and legal validity. nCipher’s HSMs are hardened, tamper-resistant appliances that provide encryption, digital signing, and cryptographic key generation and protection. Over 1,000 organizations rely on nCipher HSMs to secure their applications and information, including 5 of the top 10 companies on the Fortune 500. Based in Morocco, Oxyliom is an nCipher partner specializing in advanced secure electronic identity solutions for Africa and the Middle East. “Securing the certificate issuance process creates a high-assurance foundation for digital security, while enabling secure digital signing allows organizations to take full advantage of manual signature automation, including reduced costs and higher efficiency,” said Philip Schreiber, Regional Director, Middle East, Africa and South Asia at nCipher Security, “nCipher is honored that the IT subsidiary of one of the biggest banks in Morocco has placed its trust and confidence in nCipher Security.”  

Read More

VSS at Intersec 2020

VSS’ recent participation in Intersec 2020 saw its stand packed throughout all three days of the show with visitors who were eager to learn more about their powerful video recording appliances which are pre-engineered for guaranteed performance. “We are very grateful to the consultants, resellers, distributors and technology partners who took the time to come to our open day and help us celebrate this important stage in our company’s development” -Rohit Khubchandani VSS’ Regional Sales Director for METAI Wesley Varughese, who has recently been relocated to Dubai as VSS’ Business Development Manager for the METAI region was also present there. Earlier Wesley was based at BCD International’s U.S. headquarters in Chicago, Ill., since 2016, during which he acquired experience in several different roles. Most recently he has been focusing on supporting customers across the EMEA region to bolster channel business development and enablement. “We are delighted that Wesley has made the decision to move from the U.S. to join our Middle East team. He has made the transition to more greatly assist BCD International and its divisions, increase market share and penetration in the region. This reflects the fact that the company’s global expansion focus has been largely directed toward the METAI markets,” said Rohit Khubchandani, VSS’ Regional Sales Director for METAI (Middle East, Turkey, Africa & India), “Although primarily focusing on helping VSS achieve success, Wesley’s expertise also will be available to any BCD International ecosystem partners in order to help support their sales and business development efforts. His extensive knowledge of the market-disrupting technologies built into our appliance portfolio certainly will be put to very good use as the company looks to raise the level of support it provides to the video surveillance community across the region.” “Our support for Intersec 2020, the opening of our office in Dubai Internet City and my relocation, all underscore a determination to succeed in the METAI region. We fully appreciate the need to be in local contact with our customers, so that we can better understand their requirements and provide the best possible pre and post sales support” -Wesley Varughese VSS’ Business Development Manager, METAI Video Storage Solutions (VSS) also marked the official opening of its new Middle East office with an open day attended by over 100 guests. “This is a truly exciting time for VSS,” said Rohit Khubchandani, “The opening of our office in Dubai Internet City underscores our commitment to a region which we regard as a key market for our recording and storage appliances. Located in the heart of Dubai, the office will serve as a regional hub, enabling us to serve our customers and business partners more efficiently.” VSS, a division of the BCD International, specialises in offering video recording and storage appliances pre-engineered with Milestone XProtect® video management software through its channel partners. The appliances are built on the latest generation of Intel Xeon Scalable processors and utilise Seagate Skyhawk AI surveillance-grade drives. They also feature innovative and market-disrupting technology such as its storage accelerator, which significantly increases storage scalability, performance and reliability.  

Read More

Facial Recognition Hardware to Feature on Over 800M Mobiles by 2024, but Software Will Win Out

A new report from Juniper Research found that facial recognition hardware such as Face ID on recent iPhones, will be the fastest growing form of smartphone biometric hardware. This means it will reach over 800 million in 2024, compared to an estimated 96 million in 2019. The new research, Mobile Payment Authentication – Biometrics, Regulation & Forecasts 2019-2024, however, notes that the majority of smartphone facial recognition will be software-based, with over 1.3 billion devices having that capability by 2024. This is made possible by advances in AI, with companies like iProov and Mastercard offering facial recognition authentication that is strong enough to be used for payment and other highend authentication tasks. Juniper Research recommends that all vendors embrace AI to drive further developments of capabilities and therefore increase customer acquisition. Fingerprints to lead remote commerce authentication The research also found that despite the ubiquitous nature of selfie cameras, fingerprint hardware will remain a dominant element in biometric payments, as sensors expand to emerging markets. Juniper Research anticipates over 4.6 billion smartphones worldwide will have fingerprint sensors installed by 2024, although their usage for payment will be significantly lower than this. This expansion of biometric capabilities will bring the technology to more e-commerce platforms, as retailers seek to meet enhanced security requirements. Originally envisioned for contactless payment use, the report expects over 60% of biometrically authenticated payments in 2024 will be for authorising remote payments. As the longest running biometric modality, fingerprint payments will take the lead in this market as standards coalesce around the technology more easily than for facial recognition payments. “Many consumers are now used to making fingerprint-based biometric payments, both for contactless and remote payments,” remarked Research Author James Moar, “That familiarity and continued inclusion in smartphones will make it hard to displace in many markets.”  

Read More