securitylinkindia

Hikvision Announces Technology Partnership with Yeastar for IP-based Video Intercom Integration

Hikvision, an IoT solution provider with video as its core competency, announced a new technology partnership with Yeastar for IP-based video intercom integration. The integration provides a convenient solution for customers in small-to-medium size enterprises (SMEs) to control and manage their intercom systems remotely, as well as communicate with visitors. For SME customers, when the employees are out of the office, welcoming visitors is nearly impossible. But integrating Hikvision’s video intercom with Yeastar’s IP PBX system enables customers to easily and remotely communicate with visitors. Even the receptionist who is not at a work station won’t miss company visitors, since the integration provides SMEs with visualized call management, video communications, and anywhere, anytime connectivity – performing across web browsers, mobile devices, and desktop computers. With the integration, SME customers can: See who is at the front door and answer from anywhere. Converse easily via IP video phone and even open a door. Auto-forward calls initiated from the door phone to a mobile number. Avoid expensive and separate paging servers – the PBX built-in paging system easily broadcasts from the devices customers prefer (IP phone, mobile or PC). “We are happy to announce this partnership with Yeastar, which will expand the scope of Hikvision’s intercom solution and create more value for our customers. More collaboration across the industry is benefiting the market with greater variety and functionality. Hikvision will persist in openness and work closely with technology partners to build a strong and mutually beneficial ecosystem,” said Adler Wu, Global Technology Partner Alliance Manager at Hikvision. “Hikvision has a proven record of providing high-quality IP-based intercom solutions, and we’re pleased to now call them an official Yeastar technology partner. With Yeastar and Hikvision, our mutual customers can take advantage of a market-leading, award-winning business phone system and also benefit from an integrated PBX-Intercom solution that improves productivity, streamlines operations, and cut overheads,” added Prince Cai, Vice President of Yeastar. Yeastar provides cloud-based and on-premises VoIP PBXs for SMEs and delivers unified communications (UC) solutions that connect the workforce and clients more efficiently. Founded in 2006, Yeastar has established itself as a global leader in the industry with a worldwide network of value-added distributors and resellers and over 200,000 customers. Yeastar customers enjoy the easy-to-own and easy-to-manage communications solutions that have been consistently recognized for high performance and innovation.  

Read More

How Does The Pandemic Change The Way We Protect Systems From Internal Threats?

Sergey Ozhegov, CEO of SearchInform During these two years of the lockdown being on and off, business processes moved outside the offices and back inside, some security weak spots were disregarded, some of them emerged, some time was spent not working, some – wasted on financial recovery from inevitable slowing down. These factors might play a role in several biggest data breaches and security incidents India has recently faced. Air India had gone through a cyberattack on its servers which was announced in February 2021, Domino’s India’s data breach compromised the details of about 180 million orders exposing a million credit cards and other data in May – the information has recently become available outside the dark net and could be simply Googled by anyone curious. MobiKwik app’s user data was allegedly put up for sale violating the privacy of 110 million people, Facebook put at risk the contacts of 6 million Indians, 2.5 million Upstox clients got their data misused due to a third party failure to secure a data-warehouse. Juspay, payment processor, endangered the processing of records belonging to 100 million of users due to a leaked database in 2020. If last year we talked about going remote, today we see that most organisations leave employees the opportunity to work from home permanently or several days a week. We can see this tendency happens to our clients – if in 2019 the companies had slightly more than 10% of remote employees, and in 2020 they relocated most of the staffers to work remotely, then in 2021 the percentage of remote workers decreased, but not significantly. Therefore, now the information security solutions need to be developed with this factor in developers’ minds. It is well known that the transition to remote work has exacerbated information security problems. After all, it is much more difficult to control employee activity in a hybrid office (a significant part of employees has the opportunity to work at home for a certain amount of time) than in an enterprise in which information circulates exclusively within the corporate network. At the same time, under the influence of the pandemic, the number of hybrid enterprises has increased markedly. For example, according to the IDC survey, if before the pandemic in 38% of the enterprises which took part in the survey no one was allowed to work at home, then after the first wave of the coronavirus the share of such enterprises decreased to 8%. At the same time, under the influence of the pandemic, the share of companies in which over 50% of employees had the right to spend more than half of their working hours at home increased from 15% to 35%. The mindset of information security experts has changed. In the context of remote work, blocking of document transfer (financial documents, information to which the access is limited, personal data, etc.) has become critical. Therefore, the developers have strengthened and expanded the types of blocking in DLP systems. Previously, blocking features were implemented only for specific communication channels and specific applications. However, now insiders have access to hundreds of data transfer and communication channels – zoom, skype, instant messengers, video conferencing systems, etc. Therefore, there is a need for technologies that are not tied to a specific application. We are seeing an increased demand for open-source APIs. Customers want to be able to modify products for their own unique business processes, for rare or self-written software. Companies need seamless interoperability of all IT infrastructure components. We also noted that if previously the topic of moving to the cloud was practically a ‘taboo’ for information security specialists, now the use of cloud technologies for many companies started to be the new normal. The Internet is becoming more reliable and end users have less and less questions about protecting cloud storage. What do insiders leak, where to and in which ways? 80% of companies believe that internal information security incidents are more dangerous than external ones, according to SearchInform analysts based on the company’s research. The cause of these incidents can be both deliberate actions and disregard for the elementary rules of ‘cybersecurity hygiene.’ Moreover, unintentional actions of employees are the causes of information security incidents more often than deliberate and malicious ones. Alexey Drozd, head of the SearchInform information security department, believes that SMB is most exposed to information security risks. The reason is that, as a rule, they do not use specialised software that allows automated control of employee actions and information movement. Therefore, managers can’t assess the likelihood of risks and the effectiveness of possible data protection measures. To dig deeper, SearchInform analysts summarised information received about incidents in 50 SMB companies in six industries (wholesale and retail, manufacturing, services, IT, construction, thermal power), which was collected while outsourcing information security and data protection to professional services. The data collected using DLP systems showed that during the study (it lasted several months), attempts to leak data were recorded in each of 50 enterprises. It also turned out that during the attempts to leak corporate data, employees most often (in 56% of cases) used external media – flash drives, hard drives, mobile phones and other equipment. Also, email (21% of cases) and cloud (19%) follow by a wide margin. “To prevent employees from leaking data while uploading it to external media, the employer may prohibit copying data of a certain format. Or any documents on particular PCs. However, at the same time, there is a risk of slowing down some business processes, because then employees will not be able to perform part of their job duties. Therefore, such a measure must be applied pointwise. It is more efficient to use a data encryption tool – the document will be copied to an external storage, but the user will be able to open it only on authorised PCs, or if there are specific permissions (a password, for example). This will allow employees to share data, but will prevent data transfer outside the company,” as…

Read More

4 Technology Trends Shaping the Future of Traffic Management

“Digital technologies are creating new opportunities for cities to reduce congestion and accelerate incident responses, from smart algorithms that detect and report violations; to all-in-one violation detection devices and cameras that capture high-resolution, fullcolor video – even in the lowest-light conditions” Jayden Xu, Senior ITS Solution Manager, Hikvision The 4 key trends that are shaping the future of the industry and helping agencies and authorities to manage traffic flows, detect violations, and respond to incidents more effectively. These are: Digitized ITS infrastructure delivers improved traffic outcomes Digital technology solutions are creating a range of new opportunities to reduce traffic congestion and emissions, and to improve road safety. This is achieved by sourcing and analyzing data from a range of sources, including roadside cameras and sensors, to enable a 360º view of traffic conditions, including accidents and violations. The resulting insights can be used by traffic authorities and city planners to optimize the design of road networks, and to prioritize investments in road infrastructure. Additionally, traffic police can use real-time traffic and incident data to enhance dispatch of emergency teams, or to guide traffic at key intersections to optimize traffic flow. High-quality color imaging for traffic management and violations, 24 hours a day Improving traffic conditions and road safety requires effective monitoring around the clock, with the ability to identify and react to traffic violations reliably. To achieve this, agencies need reliable video solutions, such as Hikvision traffic cameras with its top-notch imaging technology, which can capture crystal clear, colored video images, even in extremely low-light conditions, or at night. Importantly, agencies’ chosen enforcement cameras must be able capture high-quality images without emitting white light, which creates environmental issues and distracts drivers. Smart algorithms enable ‘pole mounted’ ITS devices – without compromising accuracy I n an ideal world, agencies and authorities would be able to mount roadside ITS equipment on gantries, but these are a rare sight in cities. This means it’s often more practical to take advantage of street light poles or the other available poles beside urban roadways to install ITS devices. Obviously, this places higher demand for devices with onboard algorithms that can recognize vehicle types and read number places (where necessary) with less strict device installation requirements than gantry mounted devices. ‘All in one’ devices combat speeding more efficiently Speeding is a major traffic issue in cities worldwide. But detecting vehicles breaking the speed limit usually require a coordinated effort between different devices – typically, a traffic camera, a radar, and a supplemental light. The latest trend is to increase simplicity, reduce costs, and reduce pressure on roadside mount locations, by integrating these three capabilities into a single device. Hikvision has been exploring this area for years, and we have developed all-in-one equipment for traffic violation detection use that maximizes efficiency – both in terms of space, cost, and support.  

Read More

India’s Leading Tech Institute IIT DELHI Trusts Videonetics to Secure its Campus

The customer One of India’s most premier educational institutions, IIT Delhi, is sprawled over 325 acres of land. It houses classrooms, department buildings, laboratories, libraries, recreational zones and residential areas for students, faculty, and other staff, among other things. The challenge As expansive and beautifully landscaped, the institute presented a massive security challenge. Until now, its measures were limited to the campus being physically manned by security personnel. Considering the size of the institute, having a few security guards was clearly inadequate and inefficient to properly monitor the entire premises, safeguard the students and prevent unsightly events. The need of the hour was an intelligent surveillance system that facilitate end-to-end protection by providing complete visibility of the campus, especially the entry and exit points, perimeter walls, and passages, as well as help instil discipline within the institute. And this is precisely what Videonetics delivered. The solution How Videonetics provided 24×7 protection to IIT Delhi Videonetics worked closely with IIT Delhi and system integrator Supreme Audiotek to identify key strategic locations on the premise that needed to be secured. Approximately 300 high-definition network cameras were deployed to cover all vantage points and locations. These cameras covered entry and exits, boundaries of the campus, passages, playground, cafeteria, outdoor walkaways and lobbies of the various buildings, to keep in check incidents of bullying, vandalism, teasing, unauthorized visitors, and so on. Videonetics AI-powered Intelligent Video Management Software (IVMS) 3.0 was chosen to support these network cameras to ensure efficient and seamless management of humongous video data. The enterprise-class solution helped record, view and manage these cameras from its unified interface, providing situational awareness and actionable intelligence. Vigilance and collaborative action The hundreds of cameras deployed across the campus provide a comprehensive view of all areas to the security personnel manning the command & control centre. With live video playing 24×7 on the video wall, they are able to ensure constant vigilance, spot unusual behaviour at any time and send alerts to the on-ground security staff for swift action. With Videonetics Intelligent VMS, security operators at IIT Delhi are proactively identifying, addressing and investigating incidents faster. Robust data protection To safeguard the privacy of students, staff and visitors, Intelligent VMS ensures that the highest possible standards of data protection are followed. In this respect, it has offered its multi-pronged security measures, which includes multi-factor authentication so that data is accessible only to authorized operators, encryption of data at rest to protect from cyber threats, video watermarking to discourage unauthorized use, and more. Smart investigation-friendly software With smart and user-friendly navigation of Intelligent VMS, security operators are able to monitor and evaluate live, as well as recorded videos simultaneously in the same interface, helping them to quickly investigate incidents in history, without losing sight of the current activities. That means when incidents happen, operators can quickly find, select such videos, and share them with authorized officials for conducting investigations without leaving their desks. Furthermore, the leading-edge Intelligent VMS also provides collaborative tools for the operators to exchange messages and share observations about any suspected activity by using in-built chat room of the software. Resilient and future-ready platform Lastly, Videonetics open, flexible, and resilient IVMS system can be evolved with the growth of the infrastructure, as well as seamlessly integrate with third-party applications and devices. Moreover, it is future-ready and can tackle all the challenges of today and tomorrow. The impact Boosting Safety and Confidence of Students With the cutting-edge and state-ofthe-art Videonetics Intelligent VMS 3.0, security personnel are able to efficiently monitor the entire campus round the clock. With live visualization, they are able to identify incidents and emergencies in real-time and respond immediately. Additionally, the knowledge that the premises are protected by cameras has brought down disciplinary and safety-related incidents. The AI-powered offering also provides them with intelligent insights to help on-campus authorities predict and prevent events. For example, people crowding to fight, someone being followed, property being vandalised, unwanted people entering the premises etc. This allows them to intervene in time and take preventive action before the issue escalates. The intuitive, adaptive and user-friendly interface of the solution has made it very easy for the security teams to understand, learn and master the software. The solution is designed to complement the existing security systems and practices to ensure a comprehensive security infrastructure for enhanced safety of the students and faculty. The Videonetics solution has boosted the confidence of students, parents, faculty, staff and others and made them feel safe at all times. It has brought them immense peace of mind, helping them focus on what they came to IIT Delhi for – learn and grow. Tarun Sethi, Manager – Sales of Supreme Audiotek Pvt. Ltd expressed, “IIT Delhi wanted to install a surveillance system that can be adopted by their security personnel easily. Today, operators at the command control center are effortlessly using Intelligent VMS due to its user-friendly interface and advanced features. They are increasingly relying on real-time surveillance, monitoring, flagging, playback, and instantaneous investigation. Needless to mention, our partnership with Videonetics was one of the cornerstones that allowed the project to fly and succeed. We look forward to working with them in the future as well.” Mukesh Khandelwal, Institute Engineer of IIT Delhi said, “We were looking for a solution that could provide security to the entire premises of IIT Delhi, as well as help us administer discipline. The Videonetics IVMS solution was a perfect fit for viewing and managing extensive camera network covered all key strategic locations, enabling protection of students and faculty. Additionally, its user-friendly interface with advanced features made it very easy to monitor the campus 24×7, by empowering our existing security infrastructures.”  

Read More