securitylinkindia

ATOS Agrees for Distribution Partnership with VSS for Indian Subcontinent

ATOS Global LLP has been appointed a distributor of Video Storage Solutions’ (VSS) pre-engineered video recording and storage appliances. Based in Mumbai, ATOS Global, a specialist VAR national distributor of access and entrance control, life safety, intruder alarm, IP video surveillance, server and storage solutions, as well as IBMS, IOT and PA systems, will supply the complete range of VSS appliances to system integrators across the Indian subcontinent who are part of the Milestone Systems Community. VSS, a division of the BCD International brand of companies, specialises in offering video appliances that are pre-engineered with Milestone XProtect®, Seagate Skyhawk surveillance-grade drives and its state-of-the-art storage accelerator, which significantly increases storage scalability, performance and reliability for Milestone Systems’ projects. As such, they can withstand the taxing video data write load of systems which have a large number of cameras. “With demand increasing year-on-year for professional and enterprise-level video surveillance systems, there is a tremendous opportunity for us to significantly increase sales of our appliances across India and other SAARC countries,” said Rohit Khubchandani, VSS’ Regional Sales Director for METAI. “We are therefore delighted to have the support of ATOS Global as our distribution partner and are looking forward to working closely with them to help their resellers gain a competitive edge by offering robust, ultra reliable and affordable recording and storage solutions.” Commenting on the distribution agreement, Siddharth Mehta, Director of ATOS Global said, “We are very pleased to have the opportunity to add VSS appliances to our product portfolio. There are so many reasons why we believe our customers should take a close look at what VSS has to offer, not the least of which is that their verified appliances are supplied with guaranteed performance.” The VSS engineering team will certify the bandwidth capabilities of each appliance ordered through ATOS Global. System integrators can rest assured that they will be installing an effective video recording and storage solution with guaranteed performance, provided bandwidth requirements do not exceed the appliance’s specification.  

Read More

New ASIS Foundation Research Explores the State of Security Convergence

ASIS International, the world’s leading association of security management professionals, has published new State of Security Convergence in the United States, Europe, and India. The research was conducted by the ASIS Foundation. Using survey responses from more than 1,000 security leaders from around the globe – plus more than 20 follow-up interviews – the study analyzes the relationship between physical security, cybersecurity and business continuity in modern organizations. It provides relevant benchmarks to compare strategies, plans and operations, and determine best practices for creating more effective and cost-efficient security and risk operations. According to the report, despite years of predictions about the inevitability of security convergence, just 24 percent of respondents have converged their physical and cybersecurity functions. When business continuity is included, a total of 52 percent have converged two or all of the three functions. Of the 48 percent who have not converged at all, 70 percent have no current plans to converge. “For years, security practitioners have accepted that organizations are increasingly converging their physical security and cybersecurity functions,” said Brian Allen, CPP, President, ASIS Foundation Board of Trustees, “This study collected current data to measure trends and progress with converging environments. What we’ve learned is that although convergence has brought positive results, there is still much work to be done.” The study’s executive summary is available free on the Foundation’s website. The full report is available for purchase and is complimentary for all ASIS members. Supported by member and corporate donations, the ASIS Foundation invests in elevating security practice through research and education. The Foundation awarded more than 170 scholarships in 2019 totalling more than $75,000.  

Read More

CP PLUS Honored as the Best Electronics Security Company

  CP PLUS has recently been awarded as the ‘Best Electronics Security Company’ of 2019 at the 18th edition of VARINDIA Star Nite Awards (SNA) at Hotel Shangri-La, New Delhi. Nominated by the VARs and partners, the award recognizes and celebrates brand competencies in technology, innovation, marketing capabilities, and post-sales support etc. “It’s an honour to receive such an esteemed award that is really important for us. We thank all partners and vendors for choosing us the best brand. We are also thankful to VARINDIA, board members, and the management who showed trust in us. As a brand, CP PLUS has an enriching journey of growth and development with continual innovations,” expressed Yogesh B. Dutta, COO, CP PLUS. Many IT corporates, VAR fraternity, and industry leaders from across the country were present at the event. The forum also saw various interesting and knowledge-based sessions such as experts speech, super session and tech-talk. CP PLUS has been a pioneer in electronic surveillance and security solutions. The brand offers a complete portfolio of advanced surveillance products and systems for a wide range of applications in different verticals. Its integrated and intelligent solutions are used in government buildings, infrastructure projects, defence locations, transportation, hotels & hospitals, educational institutions, homes, and other areas. Further, CP PLUS has made crucial investments for the protection of society.

Read More

New Firmware Release for Videotec Cameras

Videotec has recently released the video encoders firmware version 3.0. This update brings new functionality to the system. This firmware can be uploaded on ULISSE EVO (all versions). Enhancements ONVIF Profil-T certification (in addition to Profile-S and Profile-Q). This offers better management of video stream configuration with VMS. Implementation of the SNMP protocol that allows feedback on the status of the devices present in the network to be obtained. Introduction of support for the NTCIP protocol so Videotec’s PTZs can be integrated into traffic control network systems. Introduction of support for positioning control of Videotec’s PTZs from maritime traffic radar interception systems (VTM – Vessel Traffic Management – systems). It is now possible to order ULISSE EVO and NVX models that do not have ONVIF Profile-Q to comply with specific requirements of some certifications regarding the request for username and password when the system is opened. These models will still have ONVIF Profile-S and Profile-T. New regulation parameters to achieve greater accuracy and reliability of temperature threshold alarms in thermal cameras. Ability to choose different colours for dynamic privacy masking. The new 3.0 firmware is only available if release 2.2.10 is pre-installed.

Read More

Cellebrite Breakthrough Digital Intelligence Platform

Cellebrite new digital intelligence (DI) platform, a fully integrated solution designed to maximize the potential of digital intelligence data and provide organizations with the most actionable intelligence critical to their investigations. Cellebrite’s DI platform employs a powerful ‘DI Core’ that stores and keeps data secure while allowing those who need to access it during various stages of the investigation to instantly obtain key intelligence information. Data uploaded to the core from remote sources can be sorted, managed and quickly analyzed using the latest artificial intelligence technologies to reveal insights for solving crimes, establishing defense plans or thwarting security threats. “The DI platform revolutionizes the way organizations deal with intelligence data, allowing teams to collaborate on shared information in real-time,” said Yossi Carmil, Co-CEO of Cellebrite, “This streamlined system safeguards digital intelligence information while allowing the right people to get the right data at the right time to manage the massive intelligence and data-handling problems facing law enforcement, intelligence, business and military organizations.” Cellebrite’s DI platform can be scaled depending upon an organization’s or enterprise’s needs and seamlessly integrates with existing infrastructures to maximize investments in previous digital management systems. “Agencies and businesses now have a platform that streamlines the data analysis process, allowing members from every arm of an organization to access and share key information in a collaborative environment that enables them to gain important investigative insights from the data presented,” said Mark Gambill, Chief Marketing Officer at Cellebrite, “And the DI Platform is backed by Cellebrite’s best-in-class training, service and technical support – all unmatched anywhere in the world.”

Read More

ExtremeCloud IQ Cloud Management Application

Extreme Networks, Inc. has recently unveiled ExtremeCloud™ IQ, one of the industry’s first end-to-end cloud management applications that leverages machine learning and artificial intelligence to provide enterprises with insights, as well as complete visibility, control, and automation of their entire network. With this announcement, Extreme is also introducing ‘Co-Pilot,’ a new automation feature that will help IT administrators save time and effort on an increasing number of everyday tasks. The ExtremeCloud IQ application can be deployed in the public cloud, private cloud, or on-premises, providing enterprises with unmatched flexibility to accomplish their business objectives. Abby Strong, Vice President of Product Marketing, Extreme Networks said, “Being an IT administrator in a constantly connected world is a difficult task on the best of days. Most cloud management vendors focus on a single place in the network, forcing administrators to triage across multiple UIs to troubleshoot and manage the network. With Extreme Cloud IQ, we’re taking our proven, third-generation cloud management architecture and integrating it across our endto-end enterprise networking solutions portfolio, adding AI, ML, and automation capabilities that help drive cost containment and streamline IT operations and – ultimately – deliver a secure, compelling, and differentiated end-user experience. We are the only vendor in the industry that can do this.”

Read More

DroneTracker

Airspace security technology leader Dedrone has been awarded certification from the UK’s Centre for the Protection of National Infrastructure (CPNI) for its counter-drone technology platform DroneTracker. DroneTracker detects, tracks, and identifies drones by using multi-sensor capability combining RF radar, and optical sensors. The new CPNI drone detection standard is the first official validation of counter-drone technology. It enables organisations deemed to be of critical national importance to adopt drone detection technology with the assurance that it has been tested rigorously. “Any organisation needing drone detection technology should consider platforms evaluated and tested by CPNI,” says Amit Samani, Dedrone’s Regional Sales Manager for the UK, “Dedrone’s DroneTracker platform has successfully met CPNI’s rigorous testing standards, and this certification provides further assurances to our customers and partners that our system meets the security needs of the UK’s most sensitive infrastructures. We will continue working closely with government sector users, risk-critical sites, and major corporate customers to provide the most robust available airspace security and defence against drones and multiple drones.” Dedrone’s multi-sensor system enables security providers to match the best-in-class sUAS (small Unmanned Aerial Systems) detection hardware with DroneTracker, Dedrone’s software. Radio frequency sensors, including the RF-100 and RF-300, provide flightpath, localization and classification of sUAS. A PTZ camera system adds localization information via optical and thermal detection, whilst a 3D radar system adds altitude data and detection of autonomous drones. Hardware data was analysed by DroneTracker 4.1, which provides a near-instantaneous decision regarding whether a drone is a threat, and allows security personnel to respond accordingly. Dedrone creates customised airspace security solutions allowing organisations to identify, track and eliminate sUAS threats. Dedrone’s solution is deployed to customers around the world, including three of the G7 countries, correctional facilities, utilities, airports and corporations, among other public and private organizations.  

Read More

Avigilon Control Center (ACC) 7.4

AI-powered facial recognition technology will help commercial customers enhance safety and efficiency Avigilon Corporation released the newest version of its video management software, Avigilon Control Center (ACC) 7.4, which incorporates artificial intelligence-powered facial recognition technology. The new ‘appearance alerts’ capability will help commercial organizations such as educational institutions and hospitals accelerate response times by identifying people of interest in enterprise settings. For example, the technology can alert the security team at a local high school when a banned or flagged individual enters the campus. People of interest are identified based on a secure, controlled watch list created and maintained by authorized users at the commercial organization. For organizations that use the new ACC™ software and license their Avigilon cameras for facial recognition, cameras will seek to identify potential matches based on the watch list. If a potential match is found, the user is alerted within the ACC software, and security personnel can then determine whether further investigation or action is necessary. “Our latest ACC software delivers substantial benefits to our commercial customers by offering facial recognition technology in a secure and controlled manner,” said John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions, “The appearance alerts capability enables our customers to move from a reactive approach – staring at a wall of video feeds where critical information can be easily missed – to a proactive approach that brings important information directly to authorized users so they can make better-informed decisions.” “It’s important to note that we view facial recognition as an aid that can improve the decision-making of the user – it does not make consequential decisions or initiate actions on its own. We refer to this approach as ‘human in the loop,’ and it is foundational to the way we apply AI,” added Kedzierski. ACC’s new facial recognition capabilities reflect Motorola Solutions’ commitment to the responsible use of artificial intelligence as well as individual privacy rights. Data stewardship is integral to these new capabilities, and they build compliance controls into their products to support this. For example, user authentication is required for these capabilities, audit logs of user actions are generated, data retention periods for the watch list can be specified within the application, and records can be expunged or deleted on demand as well as verified through auditing and reporting. Data is locally hosted, owned and controlled by the business or school. The data used to train the AI algorithms is also thoroughly evaluated, ensuring sufficient quantity, quality and diversity to ensure high accuracy and consistent performance.  

Read More

Bosch Building Technologies Make Access Management Simple, Scalable and Always Available with Access Management System 2.0

Today’s market wants access management systems that are easy to set up and use. They must be easily scalable and able to integrate with other security solutions like video and intrusion systems. Access management systems need to be highly resilient and always available. With the introduction of the Access Management System (AMS) 2.0 Bosch has addressed all these needs. Simple to specify, set up and operate The entire customer journey is designed to be as effortless and as simple as possible. Specifying the system is easy: the software is offered in three pre-configured software bundles for different sized organizations: Lite (max. 144 doors and 200,000 cards), Plus (max. 512 doors and 200,000 cards) and Professional (max. 10,000 doors and 200,000 cards). Configuration is easy:  Existing floor maps can be imported into the system and icons are dragged and dropped on the map to represent controllers, doors and building objects. On-boarding of users is straightforward: for example, enrolment and assignment of access profiles are all implemented in one dialog manager. Operation is also easy: The graphical user interface (GUI) is simple and easy to understand. The dark colorscheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. In addition, the colors of the AMS GUI are aligned with the colors of the Bosch Video Management Systems (BVMS) GUI, so operators enjoy the benefits of an integrated solution which is easier to operate than two distinct systems. Highly scalable and therefore future-proof Users can start small and add extra capacity whenever necessary. The Access Management System 2.0 can be expanded to 10,000 doors and 200,000 cardholders. No hardware needs replacing when expanding, users just require software upgrades and possibly additional controllers, readers and cards. So, increasing system size is not only easy, it is also cost-efficient. Since it is regularly updated with the latest data security enhancements, it is a future-proof investment. Ideal for office and government buildings, retail environments, educational institutes and more. Always available, highly resilient For maximized resilience and high availability, the access management system 2.0 includes the Master Access Controller (MAC) as an additional layer of resilience between the server and the access controllers. If the server fails in the Access Management System 2.0, the MAC takes over and ensures that the controllers still communicate with each other and share necessary information from the card readers. Thus, even functionalities which include various controllers such as anti-passback and guard tour can still be performed. The anti-passback functionality prevents a card holder passing back their card to another person and thereby enabling their unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route to be passed in a defined period of time. Any deviation of sequence or timing causes an alarm in the AMS. Colleagues or first responders can be notified at once improving the safety of security guards. In the extremely rare event that the AMS server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the access management controllers (AMCs). Thanks to this offline capability, it is furthermore possible to save millions of events even during down times. High level of safety thanks to threat level management Up to 15 configurable threat levels such as lockdown, controlled lockdown or evacuation mean that safety measures can be initiated quickly in critical situations such as fire or terrorist attack. The threat level state is activated by one of three triggers – operator workstation, emergency button, or specially configured ‘emergency’ cards that are presented to a reader. The different threat levels can make all doors open, or all doors blocked, or a mix of some open and some blocked. Individual doors can also have their own security profile and allow only certain cardholders access. High data security and privacy protection To protect against cybercrime and loss of personal data, the database as well as the communication between server and access controllers is encrypted at all stages e.g., through support of the secure open supervised device protocol (OSDP) v2 protocol. Access Management System 2.0 also has trusted digital certificates for mutual authentication between server and client to prevent tampering by unauthorized clients and uses secure design principles such as ‘secure-by-default’ and ‘principle of least privilege.’ Ideal as standalone but capable of growing into a complete security solution The Access Management System 2.0 is a flexible access management system for medium- to large-sized organizations. It is easy to set up, operate and expand. Access Management System 2.0 can grow with the needs of the customer and can also be integrated with video systems such as the BVMS (version 9.0 and higher) and third party systems such as Milestone’s XProtect. It will as of the second quarter 2020 be able to integrate with the B-/ G- series intrusion system from Bosch and other third party systems. With this integration capability, the access management system will serve as the solid platform to mix and match various security systems, depending on the customer’s individual needs. Overall, the Bosch Access Management System 2.0 that is available for sales makes access management simple, scalable and always available.  

Read More

New Series of AX Hybrid Alarm Security Control Panel

Hikvision has introduced AX Hybrid Security Control Panel (DS-PHA series) in India. It contains on board zones, and supports wired/ wireless alarm inputs and outputs expanding. It works with Wi-Fi, LAN, GPRS and 3G/ 4G communication methods, as well as ISAPI, e-home 5.0, and SIA DC09 protocol. It is applicable to the scenarios of market, store, house, factory, warehouse, office etc. It is a best-in class intrusion alarm solution for the SME (Small & Medium Enterprises) business segment. AX Hybrid Security Control Panel (DS-PHA Series) features include dual path communication of alarm events and other signals over LAN, PSTN, Wi-Fi & GPRS, 4/8 onboard wired zones, and expandable with up to 20/ 64 wired zones, camera accessing, pre-alarm (5s) and post-alarm (2s) recording for video verification over mobile app. It uploads alarm events to alarm receiving center, pushes alarm notification via messages and email, AES-128-bit data encryption, supports RS-485 input and output expander and supports lithium battery.  

Read More