securitylinkindia

2021 Will Be All About Protecting Your Data

Nikhil Korgaonkar, Regional Director, India & SAARC, Arcserve Cyber Security Ventures predicts that global data storage will exceed 200 zettabytes by 2025. To understand the quantum of this you can say, if each terabyte in a zettabyte were a kilometer, then 200 zettabytes will be equivalent to approximately 260,000 roundtrips to the moon. This data will come from data stored on private and public IT infrastructures, utility infrastructures, private and public cloud data centers, personal computing devices such as PCs, laptops, tablets, and smartphones, and IoT (Internet of Things) devices. Protection of this data is most crucial for any enterprise. Even the strongest of firewalls don’t guarantee complete protection for enterprise data – the actual wealth of any organization. A forefront defense firewall is part of the drill, but there must be a foolproof data protection plan at the end. In 2021, enterprises will see the next phase of changes in data protection trends as they are experiencing tech-tonic shifts brought about by digital transformation in 2020. 1. Remote Workforce Security and Data Protection Gartner lists ‘securing your remote workforce’ as the topmost security project for 2020-2021. In the first quarter of 2020 when enterprises were forced to migrate their entire workforce to remote work almost overnight, IT became busy creating safe and efficient remote access to the enterprises’ files and applications. The focus was security from a network and data perspective. Due to the critical nature of data which was now cloud-based and distributed, enterprises had to rely on hasty and last-minute security infrastructures which opened doors to cloud-based attacks. Cybercriminals took full advantage of this disruption in the workforce norms and increased phishing and ransomware attacks on the remote workers. Today, remote desk protocol (RDP) is currently considered the number one attack vector for ransomware, and even virtual private network (VPN) appliances are not able to save the situation entirely. What enterprises need is data recovery resilience in the face of increasing cyberattacks and IT disasters. With more data getting stored in the cloud, companies will need to develop more robust plans that aggregate and protect distributed data in line with new vulnerabilities in 2021. At the same time, the IT teams must track and secure non-compliant and compromised devices as they are still being used in remote settings. 2. Customer Data Protection Initiatives I gnoring data protection and privacy norms is a blunder businesses can make especially when it comes to customer data. Research shows that almost 60 percent consumers will stop doing business with an organization that has experienced a cyberattack in the past year. The data also indicates that one in four consumers will jump ship to a competitor’s product or service after a single ransomware-related service disruption. That’s a steep price to pay for letting customers down, and it’s not a surprise that so many enterprises are taking steps to ensure they provide the highest level of data protection for their users. 2021 should see enterprises prioritizing user data protection in both new and existing initiatives. They are likely to make use of technology to detect and resolve internal and external threats to data security. At a broader level, the Indian government is in the process of finalizing its personal data protection bill. The bill is expected to establish a data protection authority to protect personal data of individuals and create a framework for processing such personal data. 3. Enforcement of Data Protection Regulations and Compliance Data regulations are important. They ensure enterprises follow the same set of standards when protecting, sharing, collecting or storing sensitive data. Around 66 percent countries in the world have passed their own national data protection laws such as the European Union’s General Data Protection Regulation (GDPR) and Singapore’s Personal Data Protection Act (PDPA). India is in the final approval stage of its data protection bill which is expected to be presented to the parliament this year. While countries are taking precautions and creating guidelines to create a safe data economy for their businesses and people, it’s unfortunate that enterprises don’t take it as seriously as they should. Companies, globally often don’t play by the rules and the annual cost of noncompliance to businesses runs at a staggering average of $14.8 million, according to a Ponemon Institute report. Interestingly, it is seen that the cost of compliance to an enterprise is often much lesser than that of non-compliance. As we move into 2021 and remote work and cloud adoption continue, it is hoped that enterprises will go in for an increased enforcement of regulations and data privacy laws. 4. Data Protection from New Ransomware Techniques Ransomware techniques will become more sophisticated and innovative. For instance, there will be ransomware ‘families’ that will refine their tactics, techniques and procedures to become more evasive and finesse their sophistication, targeting multimillion-dollar business. Then there will be an increase in the number of entry-level, apprentice-type ransomware attackers offering ransomware-for-rent, or ransomware-as-as-service, allowing targeting of high volumes of smaller prey. ‘Secondary extortion’ will increase where attackers steal and threaten to publish sensitive or confidential information if their demands are not met. This brings us back to data protection. Ransomware and other cyberattacks will not stop. An enterprise can deal with all kinds of ransomware attacks provided it has invested in data protection and recovery. According to a recently released Sophos 2021 Threat Report, organizations are hard-pressed to predict the evolution of cyber threats because ransomware gangs are constantly devising new tactics to hold critical data hostage and solicit ransom payments. Enterprises, therefore, must take a proactive approach through an integrated first and last line of defencs that offers ransomware prevention, detection and removal, and if automated data restore to on-site and cloud targets. Integrating cybersecurity and data protection as a coordinated deployment is critical for an enterprise. Arcserve’s new X Series Appliances integrate both and are designed to create a robust system scalable for enterprise data centers. These appliances uniquely combine deep learning endpoint protection and on- and offsite disaster recovery with over…

Read More

Luxury Greek Resort Receives 5-Star Fire Protection

Based in the coastal town of Ierapetra in Crete, the Robinson Club is designed around ‘neighbourhoods’ of hotel rooms across a 150 acre-site. This unique layout meant that the fire system specified needed to deliver seamless detection and notification of a potential fire to the hotel’s staff and guests, who could be located anywhere across the 340 rooms and suites, multiple restaurants, spa facilities and conference rooms. Responsible for the design, supply and installation of the fire detection, extinguishing system and firefighting equipment at the 5-star Robinson Club Ierapetra were Advanced partners, Zarifopoulos. In total, Zarifopoulos installed 14 of Advanced’s industry-leading Axis EN fire alarm control panels on a high-speed, fault-tolerant network alongside over 900 notification and detection devices including detectors, call points and sounders. Spilios Alexopoulos, Commercial Director at Zarifopoulos, referring to the state of the art system as well as the special attention that has been paid to the fire protection of the luxurious Robinson Club Ierapetra, commented, “Its widespread nature required a high-speed network of fire alarm control panels to ensure instant notification of a fire event. As a long-term partner of Advanced, we knew the company’s solutions offered the high levels of performance and reliability required, combined with ease of use and installation.” Axis EN is EN54 parts 2, 4 and 13 approved and its panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop panels in 200 node networks covering huge areas. Advanced products’ ease of installation and configuration as well as the range of peripherals available make it customisable to almost any application. Vladimir Zrnic, Regional Sales Manager for Southern Europe, said, “In large-scale sites such as the Robinson Club, Ierapetra, it’s vital to ensure that the panels, when networked, will sustain adequate performance levels. As the number of panels and peripherals on a network increase, some systems can slow down dramatically, compromising safety and reliability. “Advanced’s fire panel networks are widely regarded as some of the most robust and resilient in fire situations. Axis EN panels can be configured into networks of up to 200 panels in standard or fault-tolerant configurations, while sophisticated cause and effect and intuitive, easy programming of rules make implementation effortless.” The Robinson Club Ierapetra resort opened in the summer of 2020 and is one of its German owner, TUI Group’s, largest investments in Greece. Designed with preservation of the natural environment in mind, the hotel offers a minimalist, high-end experience for its guests. Advanced, owned by FTSE 100 company Halma PLC, protects a wide range of prestigious and high-profile sites across Southern Europe – from Istanbul’s Hagia Sophia and the Romanian National Library to Serbia’s University of Belgrade. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.  

Read More

Expedite Contact Tracing Efforts with Unified Video Security & Access Control Technology

Challenge Healthcare officials and organizations are facing the challenge of contact tracing quickly and effectively to curb the spread. Time is of the essence when it comes to backtracking an infected person and identifying potential people who were exposed to the infected person or contaminated areas, but there are currently gaps in information. Solution Motorola Solutions is committed to innovating mission-critical technologies to protect people and communities, including looking at the existing technology they have in the market that can help alleviate current healthcare challenges.   Motorola Solutions’ Avigilon™ Access Control Manager (ACM) is a physical access control system that is designed to help organizations protect its people, property and assets. The ACM™ system seamlessly integrates with Avigilon Control Center (ACC) video management software to provide a fully unified security solution that helps organizations proactively monitor and secure their sites. Key features of a unified ACM and ACC™ system can provide important insights to help support contact tracing efforts such as determining potentially exposed people and areas so organizations can intervene faster. For example, consider a scenario where an infected employee that worked at a distribution center has been identified. The infected employee has since been staying at home to recover. As a safety check, the security team at the distribution center can use their unified ACM and ACC system to trace the employee’s steps. It can be presumed that the doors the employee used may be contaminated, particularly door handle surfaces. The identity correlation report in the ACM system provides operators an efficient way to generate a report of any doors accessed by the employee during their working hours. The report provides the date and time of when a door was accessed by the employee, the time difference between door access events and who else accessed the door. Subsequently, operators can identify other employees that have accessed the same doors in the same timeframe as the infected employee. The report also tracks valid card reads and invalid card reads by including a list of employees that have attempted to access a door. Even if some employees did not access a door successfully, there is still an exposure risk because the door can potentially be contaminated due to contact by the infected employee. With the Identity Search feature in ACC software, security operators can easily search in the system and see when and where the infected employee has accessed a door at the distribution center with their access card. Operators can view all of the doors that the employee attempted to access when they were still working and extend contact tracing efforts further by launching Avigilon Appearance Search™ technology from the Identity Search results. Powered by AI, Avigilon Appearance Search technology allows operators to quickly search for the employee from the Identity Search results and track their route throughout the distribution center for other potentially contaminated areas. This can help reduce hours of video footage review to minutes – expediting contact tracing efforts. When combined with fixed video security cameras installed inside and outside the distribution center, operators can achieve optimal situational awareness across the entire site and create a powerful case detailing the chain-of-events associated with the infected employee’s whereabouts. The security team is in a position to obtain robust information to help determine which other employees have also accessed the same doors or areas during the same time frame as the infected employee – which can help in determining the number of potentially exposed people. The distribution center can then proactively advise the potentially exposed employees of the risks and take necessary hygiene and safety measures such as having the exposed employees tested and increasing sanitation of potentially contaminated areas. With a unified video security and access control solution in place, organizations can leverage its existing technology in an innovative way for obtaining critical information to better protect its employees and people in the community. Motorola Solutions proudly manufactures and deploys the sophisticated, cutting-edge communications, software, video security and analytics technologies that keep communities and nations safe. They have been on the front lines with federal, state and local governments, including in times of crisis, for over 90 years. Today, their 17,000 innovators, engineers and manufacturing specialists are eager to help address critical gaps in the availability of medical and health management technology needed to fight the COVID-19 pandemic.  

Read More

AIoT – A Powerful Convergence Transforming Businesses in 2021

Vikas Bhonsle CEO, Crayon Software Experts India One of the most trending buzzwords currently in the IT sector is AIoT. As the name indicates, AIoT is a fusion of AI – Artificial Intelligence and IoT – Internet of Things. While both AI and IoT have their individual operations and characteristics, their combination brings out a whole new scope for digital transformation One of the most trending buzzwords currently in the IT sector is AIoT. As the name indicates, AIoT is a fusion of AI – Artificial Intelligence and IoT – Internet of Things. While both AI and IoT have their individual operations and characteristics, their combination brings out a whole new scope for digital transformation. Businesses to achieve digital transformation can deploy AIoT to generate predictive analytics or anomaly alerts by shifting through millions of tank level data points. If AIoT is deployed at the edge computing, it helps reduce bandwidth and latency while enhancing privacy and security. AIoT can provide support for data analytics solutions that can create value out of IoT-generated data. While the concept of AIoT is still relatively new, there is a scope to improve the growth of various industry verticals. However, AIoT could be a viable solution to solve existing operational problems such as the expense associated with effective human capital management (HCM) or the complexity of supply chains and delivery models. AIoT helps organizations promote learning and personalization at the same time. For a productive digital transformation, AIoT synergizes solutions by allowing the inclusion of more advanced predictive capabilities. AIoT can use data analytics to make suitable suggestions or undertake commensurate actions. Let’s know about a few ways how AIoT can influence the changes: Intelligent decision making: AIoT can help enterprises to intelligently manage this overwhelming data in a way that provides valuable insights that they can use to make smart decisions. High operational efficiency: Using smart automation organizations can increase their operational efficiency and optimize their expenditure. Accurate predictions: With the high amount of data collected and analyzed, organizations can predict output of the operations more accurately than ever. Better customer experience: AIoT can help organizations understand their preferences by creating agile, targeted, and effective customer experience strategy. They are able to treat every customer individually by considering their habits, patterns, and preferences. IoT scalability: AI-powered IoT ecosystem analyzes and summarizes the data from one device before transferring it to another. As such, it reduces large volumes of data to a handy level and allows connecting to a large number of IoT devices. No costly unplanned downtime: The predictive maintenance with AIoT allows to predict the equipment failure in advance and schedule orderly maintenance procedures. These changes help organizations diversify and have an edge over their competitors. AIoT is supported by artificial intelligence, 5G network and big data. The AIoT fusion is increasingly becoming mainstream, as it continues to push the boundaries of data processing and intelligent learning for years to come. IoT coupled with AI technology can lead the way to the advanced level of solutions and experience.  

Read More

HID Global is Named a Leader in 2021 Gartner ‘Magic Quadrant for Indoor Location Services, Global’ Report for Second Year in a Row

HID Global, a worldwide provider of trusted identity solutions, recently announced it has again been positioned in the Leaders quadrant in the most recent Gartner ‘Magic Quadrant for Indoor Location Services, Global’ report. “We are proud to again be named a Leader in a Gartner’s 2021 Magic Quadrant,” said Mark Robinton, Vice President of IoT Services with HID Global, “HID® Location Services, including the latest Workplace Safety solution for contact tracing and physical distancing, continues to demonstrate the benefits of investing in a single, unified infrastructure to solve multiple business challenges. Widely adopted by Fortune 500 companies for managing building occupancy, optimizing office and facility space, tracking assets and monitoring equipment health, HID Location Services has become increasingly valuable across a growing range of new and existing markets and use cases.” HID Location Services for Workplace Safety leverages the solution’s Bluetooth Low Energy (BLE) HID BEEKS™ Aware fobs that alert employees when they are closer than 6 feet (2 meters) for a specified period for digitized physical distancing management. The solution also includes a contact tracing application that uses the same HID BEEKS Aware fob or a BEEKS badge/ badge holder that is easily added to existing ID cards. This provides a full digital trail of an employee’s whereabouts and historical interactions while at work, enabling rapid response to cases so isolation procedures can be activated as needed. According to the Gartner report, “Vendors in the Leaders quadrant will have demonstrated an ability to fulfill a broad variety of customer requirements through the breadth of its indoor location service solution. Leaders will have the ability to provide complete and differentiating capabilities as part of their indoor location offerings. This includes global service and support. Leaders should have demonstrated the ability to shape the market, maintain strong relationships with their channels and customers, and have no obvious gaps in their portfolios.” In addition to delivering physical distancing and contact tracing capabilities, HID Location Services solutions can be used in a wide variety of applications that require real-time visibility into an organizations people, property and assets across multiple locations or a specific area. A seamless end-to-end IoT ecosystem spans the beacons, gateways and cloud management software for creating solutions in applications including employee safety, smart buildings, healthcare and hospitality.  

Read More