securitylinkindia

Milestone Systems Promotes Barry Norton to Vice President of Research

Milestone Systems Promotes Barry Norton to Vice President of Research As of today, Barry Norton is promoted to Vice President of Research. Barry Norton joined Milestone Systems in May 2018 as Director of Research. In his new role as VP of Research Barry will, in addition to continue leading Milestone’s growing research department, also be responsible for an increased collaboration with universities to move forward the state-of the-art in machine learning, especially in application to computer vision. Milestone believes that an even closer collaboration and exchange of knowledge with universities is a prerequisite to be able to predict future technologies and megatrends that will help them create video software technology for a greater good. Dr. Barry Norton ,Vice President of Research Milestone Systems ” Milestone’s ‘Make the World See’ mission is a clarion call to bring together the latest achievements in artificial intelligence from the lab to deliver true situational understanding in the real world. The commitment to deliver such technology in a responsible manner makes Milestone the ideal environment to deliver on this vision”  “Barry is always more than one step ahead when it comes to applying future technologies because of his profound knowledge and ingenuity. I’m confident that Barry will play a key role in taking Milestone’s video software technology to the next level,” said Bjørn Skou Eilertsen, Chief Technology Officer, Milestone Systems, “Milestone Systems has high ambitions for the future. We need to understand and predict future technologies and megatrends to help accelerate Milestone Systems’ ambitious growth journey. Increasing our focus on research will gear this journey.” Over the years, Milestone Systems has gradually increased the investment in research capability and expertise. Now, they have formed a new role as VP of Research reporting directly to their Chief Technology Officer. With the newly created role VP of Research, Milestone Systems wants to further develop its business and core strategic initiatives to accelerate the company’s ambitious growth journey with more cutting-edge high-quality features in our new releases. When joining Milestone, Barry will be part of a company that is a global leader in data-driven video technology software in and beyond security. Since their start in Denmark in 1998 they have grown to be nearly 1,000 employees across development centers and regional offices in more than 25 countries. Today, their solutions are used in 500,000+ installations worldwide – with many more to come. They believe that their success is first and foremost based on their sworn dedication to put people first – the people they work with and the people around them. It’s how they grow their culture, their business and their community. They want to blaze new trails, stay curious and push the industry standard. Investing in people is how they do it. Because at Milestone, they grow together.  

Read More

Navigating Change with Professional Services in the New Reality

Nadia Boujenoui, Vice President of Customer Experience, Genetec Inc. The raison d’être of an IT provider’s professional services is to optimise the performance of the solutions implemented at the customer’s premises, and thus to meet their operational needs as precisely as possible. However, in just a short while with the pandemic, these needs have changed radically, as companies have had to adapt and completely rethink their operating methods to cope with the crisis. To continue to support them as closely as possible, professional services must also transform their offer and consider trends that have emerged or that have already been underway for several years and that have now accelerated. Remote services to meet the cloud boom As a direct result of social distancing measures and the massive use of teleworking, cloud consumption has grown dramatically in 2020 and is expected to continue to do so in the years to come. 57% of companies believe they will spend more on SaaS solutions this year, and 49% on public cloud. In the physical security sector, where the cloud has traditionally played a minor role, this has resulted in the emergence of hybrid solutions that allow existing solutions to remain on site, move to the cloud for specific applications and gradually migrate systems as needed. This new development does add a layer of complexity to those carrying out complex, multi-system and multi-site physical security projects, including the job of integrators who support them. For professional services, this means offering services linked to easing the transition to a hybrid or cloud model, but also changing the way these services are delivered and packaged so that they are more consistent with the cloud – remote and longer-term services, covering the entire life cycle of the customer and their experience Strengthening cyber security services At the same time, cyber attacks have increased. Hackers have seen and seized many of the opportunities generated by the rapid and improvised implementation of teleworking in companies during the initial containment. In this context, 90% of companies have seen an increase in cyber attacks. The news of the last few weeks also shows that the trend is not weakening. Cyber security cannot be improvised. It involves choosing the right solutions, with several layers of protection such as encryption, authentication and authorisation, and acquired from trusted suppliers, recognised for their transparency and the reliability of their products. This is essential, but it is not enough. To strengthen their cyber hygiene, companies must also consider every integration, every configuration, every password in the deployment and life cycle of their software and hardware solutions. A multitude of risks must be minimised to ensure the best protection. Professional services are best placed to assist in protecting not only their enterprise customers, but their integrators. Both of whom can be confident that their solutions have been optimised by the people who know them best – the people who developed and market them. To build resilience, companies need to be able to rely on services that assess their current cybersecurity, across all components of their infrastructure, and professional services need to take a more proactive approach to building resilience. Despite the pandemic, the missions of professional services remain the same – to deliver value and minimise risk in the deployment of systems, and then to ensure that everything works as intended over time. But the nature of these services needs to adapt, as deployments are now more open to the cloud and the risks are greater and more present. It is this new reality that professional services must consider.  

Read More

Not all DLP Systems are Equally Helpful

Alexey Parfentiev, Senior Business Analyst, SearchInform SITA company’s security became compromised by fraudsters who copied personal data of Lufthansa, Air New Zealand, Japan Airlines, Singapore Airlines and about 4.5 million Air India passengers in the beginning of the year. The processing company could confirm the leak only a few months later. CNA Financial had to cover the ‘expenses’ brought by violators’ activity and pay $40 million to retrieve the breached data after a ransomware attack. Opting to pay ransom can not only be a high-priced choice but also an illegal one. How does ransomware needle through one’s network? An employee might open a malicious file, click a suspicious link, communicate with a violator and even keep doing the same mistake. There are monitoring systems which are capable enough or less powerful to deal with the most needed task. What should a company know to tell a strong proactive system from a solution with annoying limitations. For many companies a DLP system is a musthave solution when it comes to data leak prevention and protection from other insider threats. But customer experience while using a DLP is not always enjoyable. This article will comment on deserved and unfair reproaches to DLP systems, will clarify which are the natural limitations of such kind of systems and which are the drawbacks of particular products. Not enough functions to solve a task DLP systems have long outgrown their original purpose of data leak control. Now they are used for a much wider range of tasks within information, economic and human resources security. Today DLP solutions are true supertools. Nevertheless, a customer might need more and more functions. This often becomes clear soon after the deployment stage, as a customer ignores a full-fledged trial and relies on marketing description and third-party comparison tables. Testing does take your time in the beginning, but saves it notably when the real work with the solution begins. That’s why the actual implementation requires preparedness. Compile your own comparison table, test gradually each system and see how they work regarding the tasks you’re interested in the most. For example, one of our clients wanted to block file transfer by metadata, and other cases of file transfer were of no trouble for them. Before they purchased a DLP system, their company tried a few other solutions, and it appeared that those products didn’t manage to tackle this problem, although the brochures seemed to ensure this type of blocking. The functionality limits can also be associated with the fact that DLP systems use third-party technologies. Sometimes these are the whole engines, modules, platforms or even white-labeling a third-party product as a proprietary solution. As a result, vendors are limited by the functionality of someone else’s software and its development plan. This is a common problem for many DLP systems out there. We have decided to build our system based on our own engine, and we use it not only in our DLP but in other solutions as well. All other elements of our systems are also coded by our team. If a client needs some adjustment, error fixing or technical support we guarantee our help. Often a DLP appears to be limited in its functionality when a customer wants some specific features. If these features are crucial, and other customers might benefit from them as well, vendors tend to include these ones in their development plan. This is how we made integration with access control systems possible, and enabled joint work with BI systems, task managers, phrase search elements etc. Anyway, sometimes specific capabilities aren’t needed to solve the majority of client tasks, and the combination of existing software functions is quite enough. A client doesn’t necessarily know about it, the best practices are shared by a developer. But usually, vendors don’t include such an option, and technical support is their only customer accompanying. One more factor to consider – whether a vendor can offer anything besides a DLP. This system has become the central element of protection from any insider risks, that’s why when choosing it a customer chooses the whole ecosystem of other protection tools. If a developer doesn’t have such a product line, a company can face a problem of product integration. Often, it’s a complicated even unsolvable task, companies should think about it beforehand. DLP is difficult to deploy, it ‘eats’ a lot of resources This is one of the primary issues. Developers approach a DLP system functioning optimisation differently, as a result software solutions differ significantly as it comes to their ‘voracity.’ Despite the fact that vendors describe minimum technical requirements in detail, the deployment stage can still surprise you in a bad way. And the bigger the scope of deployment the higher the possibility of such an unpleasant surprise. There are two options. The perfect one is to launch a comprehensive trial period (deploy all the modules on a maximum number of computers). But this is not always possible. The second option is to ask the opinion of those information security specialists who use a DLP system on a number of PCs similar to yours. Be curious, let the interesting or difficult moments get shared by them. We work on minimising requirements to hardware. Last year we altered the architecture, and this allowed for DLP speed increase up to 30% and expand the variety of solved tasks – search for data in very large networks, for example. Earlier customers had to allot enough power, locate additional servers. Now our DLP requires 2-3 times less of server resources than many competitors’ solutions. The speed of deployment also matters, it’s not normal if it takes weeks or months. Processes can last longer if a client limits access or doesn’t have a technical specialist. Anyway, the optimal pace of deployment of a typical pilot version is a few hours. We guarantee it thanks to providing a customer with our technical specialist (engineer) and implementation specialist (who will teach a company how to work with the solution, help configure…

Read More

Oncam Further Enhances Top Performing C-Series 360-Degree Video Surveillance Cameras with Multi-Mode

Oncam, the provider of premium 360-degree video capture technologies, has recently released updated firmware that transforms the already powerful and compact C-Series cameras into some of the most advanced and flexible cameras of their kind on the market. With the addition of Multi-Mode, users can choose from five different views and stream up to four of them simultaneously. Multi-Mode adds the flexibility, versatility and ultimately expands the use cases possible with 360-video technology. With the updated C-Series, stakeholders are empowered to record everything that happens within a scene with the 360-degree video coverage and at the same time easily configure alternate and more natural looking views tailored on specific needs. The enhanced functionalities of the C-Series continue to be powered by the Qualcomm® Vision Intelligence Platform, which spans a full range of system-on-chips (SoCs) designed for running compute-intensive workloads at the edge of the network. With Multi-Mode, users can stream four different views at any given time including: Fisheye: A standard 360-degree fisheye view that is ideal for total situational awareness. Panoramic+: A 5:2 pre-dewarped panoramic view best suited for wall-mounted cameras that use the center of the fisheye sensor to generate an actual 180-degree image. Panoramic+ also includes specifically designed accessories to help ensure the correct tilting of the camera at the desired angle. Created for both the Indoor and Outdoor Plus models, Panoramic+ accessories will be available to purchase from Q3. This 180-degree view can also be set for all streams in Panoramic+ Only Mode, providing a compelling replacement for popular Evolution 180 cameras, which are being placed in End Of Life. Corridor+: a split 2-way corridor view, Corridor+ allows to see in two opposite directions of a 360-image at the same time, with no gap in between, so that objects move seamlessly from one section to the other. T Corridor+: a perfect 3-way junction view, T Corridor+ focuses on three chosen directions in the fisheye image without any gap so that what is directly in front can be monitored as well as what’s on either side. VCam: a user-defined dewarped view of a chosen area of the fisheye image, where users can decide which specific area of the scene is of interest and focus on it. “Multi-Mode delivers unrivalled camera flexibility, all from one camera,” said Dilen Thakrar, Product Manager, Oncam, “This camera solution can be tailored to many needs. Whether an operator requires a 360-degree camera, a panoramic camera, or both at the same time, the C-Series can exceed the expectations of 360-video today. Being able to offer this level of versatility all from the same camera ensures we can meet many more uses cases whilst providing simpler configuration, ordering and stocking processes for our partners. Since launching the C-Series in 2020, Oncam and its partners have been pivotal in expanding the adoption of 360-degree video surveillance across the globe. These efforts have resulted in significant growth with enterprises turning to its intelligent video solutions to support mission-critical use cases. “Video is a core data source generated from IoT deployments and 360-degree video is an integral part of this ecosystem,” said Jérôme Jacqmin, Senior Director Business Development, Qualcomm Communications S.A.R.L., “Our continued collaboration with Oncam contributes to the development of the innovative video solutions that support organizations to enhance their digital transformation strategies. We believe that together, we are pushing the envelope of what is possible with video.” “We’re not just leading the way in 360-degree video. We’re redefining it for the next evolution of IoT and security solutions,” said Jon Marsh, SVP Technology, Oncam, “We’re dedicated to providing our strategic alliance partners and customers with the flexibility they need to achieve their ever-evolving operational and security requirements. This commitment is driven by our promise to continue to leverage our deep expertise in panoramic imaging and edge dewarping to push the envelopes of 360-video technology.”  

Read More

A K Capital Seamlessly Integrates Security across Network, Branches, Hybrid Cloud and Remote Workers with the Fortinet Security Fabric

A K Capital Services Ltd., one of India’s most trusted bond houses, has implemented the Fortinet Security Fabric cybersecurity platform to improve user application experience, enable secure cloud transformation, simplify business operations, reduce cost and manage security with limited skilled resources. A K Capital Services Ltd. provides services through management of private placements and public issues in the fixed income market. Incorporated in 1993, it is the flagship company of A K Group, a leading financial conglomerate that operates and develops debt capital. With clients comprising large Indian banks and government, the company is a fund mobilizer for the largest public debt issues, tax-free bonds and private debt placements. The Group has an indelible mark in investment banking with a range of financial products, tapping new investor and issues. Digital transformation at the organization led to increased bandwidth requirements and the need for secure access to applications in the cloud. The organization was also dealing with the challenges of providing secure, robust, and cost-effective connectivity to the branch offices. They also needed a high performing Next-Generation Firewall (NGFW) and better connectivity to securely transfer data from their data center to the disaster recovery site as their existing multi-protocol label switching (MPLS) connection was very slow and experiencing a significant amount of downtime. Adding to this, employees began to work from home because of the pandemic. The end result was a degradation in application availability and performance. Not only did the availability issue negatively impact employee collaboration, but it also hurt customer interactions and business. A K Capital decided to adopt a new approach to improve network and application performance and reduce the complexity of managing multiple point products that operated in isolation. The business objective was to make their network more robust and efficient to eliminate chronic outages, improve user experience, and simplify and streamline the ability of branch offices to securely access critical business resources. Application visibility was also a priority as the business increasingly started to rely on cloud applications. To achieve that, consistent security had to be seamlessly deployed at the branch offices, endpoints, cloud and data center  with user identity management for remote access to help the small security team to manage the expanding network. “Financial services organizations are adding more remote workers and branch offices while simultaneously adopting new cloud applications and infrastructure. They need secure connectivity solutions that can provide fast, compliant, and secure access to cloud-based applications and the core network,” explained Rajesh Maurya, Regional Vice President, India & SAARC at Fortinet. The company selected the Fortinet Security Fabric to bring together best of breed security and high performing networking leveraging Fortinet’s integrated security for users and applications including their hybrid cloud environment to consistently secure their applications access. “The Fortinet Security Fabric provides them with all the tools they need and enables them to control costs and optimize operational efficiency at the same time.” added Rajesh Maurya. A K Capital deployed the FortiGate Next-Generation Firewalls for advance threat protection, including botnet protection, IPS, real time AV and AI-powered cloud sandbox at both the data center and the disaster recovery site to achieve high performance while transferring data and help comply with ISO 270001 security compliance standards. The NGFW provides deep SSL inspection without hindering performance which has helped in not only saving time but also helps meet with the required compliance and provide better security while handling financial data. For their branches, the shift from MPLS to SD-WAN allows direct access to the internet and requires a different approach to security. A K Capital choose to deploy UTP Security bundles that includes advanced content security with real-time protection thanks to AV and AI-powered cloud Sandbox, as well as a full web security package (web, video, and DNS filtering among others). This FortiGuard rich suite of security technologies natively integrated with NGFW and SD-WAN offerings, provides consistent policy enforcement and closes the security gaps. Fortinet Secure SD-WAN also enables direct access to cloud & on-premise applications and helps in WAN optimization, automation and traffic shaping. The Secure SD-WAN solution has the ability to intelligently identify applications to determine the best path to be taken as a means to enhance performance, even during brown out or black conditions. To secure their cloud applications and provide seamless visibility across the hybrid environment, FortiGate NGFW virtual machines have been deployed in AWS cloud. This helps them to protect their cloud network traffic with features such as high-performance IPSec virtual private network (VPN) and secure sockets layer (SSL) VPN, as well as Intrusion detection and prevention system (IDPS), Deep packet inspection (DPI), cloud delivered web, video and DNS filtering and anti-malware protection including real time AV with AI powered Cloud Sandbox. Moreover, with FortiGate NGFW deployed both on-premises and in the cloud, A K Capital gains the advantage of seamless and simplified operations through consistent security and networking policies across their full deployment. FortiManager and FortiAnalyzer provide simplified management and visibility into the network to manage security with limited skilled professionals. Remote workers connecting to the corporate network from home are identified with FortiToken two-factor authentication. A single solution provides advance threat protection on premise, in the cloud and secure SD-WAN connectivity with capabilities to hyperscale as their network grows. The seamless integration of cloud security helps them to scale their cloud application requirements to support business growth.  

Read More

FARO® Empowers Innovative Intelligence with Comprehensive & Accurate 3D Investigative Evidence

The ability to present unbiased, accurate 3D data in the courtroom as opposed to conventional 2D evidence can make all the difference in the outcome of a case. While still photographs, manual measurements, and written reports have been widely accepted as standard procedure, they often offer a limited perspective of a crime, crash, or fire scene that could be laden with information bias. When called upon, investigators (whether public or private) are tasked to seek and present the truth for their clients. For the most part, they only have a single opportunity to document evidence that is relevant and critical to the case, and they must ensure that the collected evidence stands up to scrutiny in court. For private investigation company Innovative Intelligence, the ability to quickly and accurately deliver crucial evidence for their clients’ investigations is paramount to cementing their success in an industry where credibility is key. Based in Auckland, New Zealand, Innovative Intelligence offers nationwide private and corporate investigation services – such as criminal and claims investigations. Recognizing the need for change Familiar with the struggles of evidence collection, the team at Innovative Intelligence saw great value in cap turing scenes in 3D detail, so they embarked on a journey to find a solution that would both improve their work processes and ensure the validity of their findings. Drones were initially adopted for overhead captures, which helped the team to provide context and perspective for investigation scenes that spanned a large area. However, this failed to sufficiently document and preserve the details in the scene. The team relied on conventional methods like cameras for scene captures, and employed laborious methods like tape and laser measures for cases that required accurate measurements. Frustrated, the team went on to research advanced 3D scanning solutions that were available in the market. After going through reviews on forums, the company made a decision to get in touch with FARO to learn more about its 3D laser scanners and software, and the rest was history. Enhancing investigation capabilities with 3D laser scanning A primary concern for Innovative Intelligence was to be able to obtain accurate measurements that would stand up in court. This would reduce contention over investigative evidence presented by the company on behalf of their clients. In addition, the team also desired solutions that were easy to use as none of them had prior experience with 3D scanning technology. “Besides the various benefits of the FARO hardware and software, what really swung our decision was FARO’s offer to provide a technical expert’s support if ever a situation arises where our scans are challenged in court.” Hamish Williams Managing Director, Innovative Intelligence       The team eventually invested in the FARO® FocusM 70 Laser Scanner, FARO® ScanPlan™ 2D Handheld Mapper, FARO® SCENE Software, and FARO® Zone 3D Software – a suite of solutions that significantly enhanced their capabilities and expanded the range of services they could offer their clients.   Details in most investigation scenes like apartments, vehicles, and fire sites can now be digitally captured in 3D with the FocusM 70, which proved especially useful for cases of arson, fatal accidents, and sexual assault, where precise data analysis is key. Separately, the ScanPlan is employed to offer visualizations of a scene in 2D for cases like burglaries, or to offer a snapshot of an apartment complex’s floorplan to complement the detailed scans done with the FocusM 70. Reaping fulfilling results Soon after adopting the FARO solutions, Innovative Intelligence’s capabilities rose to prominence among both private and public sectors due to its involvement in the investigation of a high-profile fire accident. The company was engaged by an insurance firm to digitize the damage to the roof and top floor of the SkyCity Convention Centre in Auckland, New Zealand, which was still under construction at the time.   Probably the biggest commercial fire incident in New Zealand, the SkyCity fire burned for three days and caused the city center to come to a standstill with multiple road and business closures. Hamish and his team were allowed on scene once the fire was contained. Dangerous post-fire conditions would have made documenting the large, complex scenes in a timely manner very difficult. However, the FocusM 70 Laser Scanner enabled the Innovative Intelligence team to capture all the required scenes within just 6 hours onsite – at a rate of up to 488,000 points/ second. With a combination of the most advanced sensor technologies available, the adaptable FocusM 70 allowed the team to capture various scenes, whether in bright sun or in complete darkness, and allowed them to verify and make adjustments immediately to ensure a high-quality scan data end product. Speaking about the efficiency of the FARO laser scanner, Hamish shared, “If we had used photographs and conventional methods for measurements, we would not have been able to capture the number of scenes we had with the laser scanner and at the same level of detail.” As a result of the scenes captured, Innovative Intelligence was able to scientifically and forensically recreate the scene and produce a 3D, to-scale replication of the fire site and a Scene2Go viewer to assist in the investigation into the cause of the fire. Insurers and investigators who could not be physically present at the fire site were now able to visualize and assess the damages – and even deduce the cause of the fire incident. These outputs were shared across multiple agencies, including the fire and police departments, and major insurers to assist in all aspects of the inquiry. New possibilities With FARO’s FocusM 70 Laser Scanner, Innovative Intelligence is able to efficiently capture a 3D representation of a scene as it is at the time of the scan and record everything visible as data points – with just one scan. This point cloud data can later be used to digitally take measurements, create diagrams, animate the scene, and present ‘walk-throughs’ for courtroom presentations. “Our FARO laser scanners and software have given us greater confidence that…

Read More

How Ajax Protects the Vernadsky Research Base in Antarctica from Fires

  In the spring of 2021, the Vernadsky Research Base, a Ukrainian Antarctic Station, was equipped with an Ajax security system featuring FireProtect and FireProtect Plus fire detectors. The Ajax equipment was delivered at a distance of 16 thousand kilometers and now protects the scientific base in Antarctica. From this article, you will learn how to install a fire alarm system at a facility if that facility is a polar station.   Wasn’t there already a fire alarm at the Vernadsky Research Base? There was, but no one upgraded it for 36 years (since 1985). For the first 10 years, the base was used by British polar explorers. At the time, the base was called ‘Faraday’ and belonged to the United Kingdom. Since then, it changed name, flag, and country, but not its fire detection equipment. “There are 10 to 14 members of the Ukrainian expedition living at the Vernadsky Research Base. They are scientists and the people who run the station. Every year, one team of polar explorers replaces the other. They study the Southern Ocean, the Earth’s magnetic field, and Antarctica’s climate, flora, and fauna. For example, they record the ‘languages’ and ‘dialects’ of whales, monitor the hole in the ozone layer, and make daily meteorological measurements to predict the weather worldwide and global climate change.” The old system malfunctioned and caused false alarms. Some detectors were inoperable. But finding spare parts for them (and bringing them to Antarctica) was becoming more difficult. What happens if there is a fire in Antarctica? Antarctica is the windiest place on earth, where hurricane-force winds blow most of the time. Even a tiny flame can quickly turn into a large blaze. Most of the buildings at Antarctic stations were built decades ago. These are often small wooden houses with metal panels insulated with foam. When the foam burns, it releases the deadly phosgene gas. In 2020, there was a short circuit at the Russian ‘Mirny’ station. The fire burned down laboratories, the radio room, and other buildings. A polar station is an unusual facility. What to consider when choosing an alarm system? Communication reliability. The station is a complex of buildings, so it is important to cover them with one system. For this, the most reliable radio communication with a long range is required. Communication reliability. The station is a complex of buildings, so it is important to cover them with one system. For this, the most reliable radio communication with a long range is required. Fire alert. There is a person at the station who monitors the system. You need a system with a handy alarm-monitoring app for PCs as well as loud sirens to alert people to danger.   Climate impact. During the cold season, the temperature outside drops to -27°C. In residential premises, it is kept at +16-18°C, and in non-residential ones, it is kept with a slight ‘plus.’ The specifications of the detectors must correspond to these conditions. Why was Ajax chosen for Antarctica? The policy of the Antarctic Center is to buy Ukrainian. And only buy the best – you can’t economize on Antarctica. The price of failure is very high, and shipping costs a lot of money. A marker was triggered – if a security system – then Ajax. And we were not mistaken with the choice. Viacheslav Marchenko, Deputy Director of the National Antarctic Scientific Center (NASC). In addition to the hub (the security system control panel) and two sirens, ten Ajax fire detectors were delivered to Galindez Island in West Antarctica. They protect against fire, detect smoke and rapid temperature swings, and prevent carbon monoxide poisoning. When connected to the Ajax security system via the secure Jeweller radio protocol, the detectors can operate at distances of up to 1,300 meters from the hub. Ajax fire detectors will do the job even if the station loses access to the Internet or there is no one to monitor alarms. The devices can operate independently from the system control panel. Even if there will be no connection with the hub, detectors will recognize the threat, and the built-in sirens will alert the danger. The siren volume is 85dB to wake up even those who fast asleep. Ajax will also handle it when the temperature in the station premises drops to +11-12°C (happens when there are strong winds). Detector’s operating temperature ranges from 0°C to +65°C. Finally, there is no need to worry about how frequently you have to send new batteries to the station. The autonomous operation period of the detectors is up to 4 years. How to bring equipment to the edge of the world? All Ajax devices were bought in Ukraine. It took three planes, one ship, and about seven days to get them to Antarctica. Five of those were spent traveling by ship, which crossed the most stormy place on the planet – the Drake Passage. Each polar explorer brings three bags – two with their own stuff and one shared. Ajax was delivered in such a bag. The system was installed by the lead specialist, the system mechanic of the Vernadsky Research Base. For participation in the expedition, the competition committee of the National Antarctic Scientific Center selects the best candidate among applicants from all over Ukraine. The system mechanic supervises the quality of installation and ensures the reliable operation of the equipment Installation and setup. How did everything go? Ajax devices are ready to work out of the box; the battery is already pre-installed, and the detectors don’t need to be disassembled. They connect to a hub in one tap in the apps and mount in a few minutes on a SmartBracket. Any questions can always be resolved by contacting the Ajax support team, which is available 24/7 and helps users from all over the world in six languages. How does station alarm monitoring work? The station uses the computer with the PRO Desktop app installed. A screen with all the indicators is placed in the lobby of the main…

Read More

Prama Hikvision Launches a CSR Initiative to Support its Employees and Partners in Combating Covid-19

As India continues to fight the devastating second wave of Covid-19, Prama Hikvision has stepped up its efforts to help the security professional community. As a responsible organisation, Prama Hikvision has announced a one-of-itskind CSR initiative across India to donate free oxygen concentrators to support its immediate employees, partners and end-users. The employees and registered partners can avail the service by logging into the website https://covidhelp.pramahikvision.com and providing details of the requirement. The company has also set up separate helpline numbers for enquiries and understanding the process further. Prama Hikvision has also planned donation of oxygen concentrators to security industry associations, including FSAI (Fire and Security Association of India) and FOCUS (Forum of Critical Utility Services). Ashish P. Dhakan, MD & CEO Prama Hikvision India Pvt. Ltd., said, “The second wave has affected many of our employees, partners and their families across India. We stand firmly with our employees and partners in these testing times by providing free oxygen concentrators through this CSR initiative. Employee welfare and care of their loved ones has always been our top priority and this time again, we hope to extend as much help and support as we can to all our loved ones.” Prama Hikvision, India’s leading video security products and solutions provider, has initiated this program to provide oxygen concentrators as a part of its Corporate Social Responsibility (CSR) drive. The key objective of this initiative is to address the problem of acute shortage of medical oxygen by providing oxygen concentrators to its immediate employees, partners and end-users. The company is providing oxygen concentrators free of cost for use and return basis. This CSR initiative will enable help and support in combating Covid-19. To apply for the oxygen concentrators under Prama Hikvision’s CSR initiative, the applicant needs to fill the details on the website with valid documents and patient details as per the terms and conditions. The company is providing pan-India service to deliver the oxygen concentrator machines. These machines have to be returned to the company once the patient gets recovered from Covid-19 so that they could be given to support other applicants. For more information contact via e-mail: covidhelp@pramahikvision.com  

Read More

Genetec Appoints Girish Maiyya as Channel Sales Manager for India

Genetec, Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions, has recently appointed Girish Maiyya as Channel Sales Manager for India. In this newly created role, Maiyya will lead the company’s channel strategy and partner ecosystem growth across India, one of the largest and fastest-growing markets for Genetec in APAC. Reporting to Genetec India Country Manager, Anand Thirunagari, Maiyya will be responsible for managing Genetec distribution and channel partners to accelerate sales growth in the region as well as onboarding and training new channel partners. Maiyya is an experienced security industry professional having spent over eight years with Bosch as a product manager for video surveillance and intrusion alarms systems in India. During his tenure at Bosch, he was responsible for establishing the company’s distribution business for video surveillance across India. He was also instrumental in setting up the intrusion alarm systems business in India and SAARC countries, and managed Bosch’s commercial and technical training for South Asia. Prior to Bosch, he was territory manager for Sharp Business Systems. “Our channel partners are an essential connection between Genetec and our end users,” said Thirunagari, “Girish not only brings industry knowledge, but he also has in-depth experience of managing and supporting both distributors and channel partners in India. We are excited to have such an experienced and customer-focused individual as our new Channel Sales Manager.”  

Read More

Have ‘Zero Trust’ and Secure Your Organizations with Safe-T the Right Way

BYOD, WFA, WFH – the pandemic has made many companies realize that there is now no need for employees to work from office. Safety trumps the comfort of working from the office. It has been more than a year and companies have now comfortably settled into the concept of remote working within the safety of their homes. But, what about the safety of the devices employees use? Cyberattacks are rampant now more than ever and there is a need to ensure the work devices are safe from the outside world. Effective and secure infrastructure for employees, suppliers and purchasers working remotely is the need and this is where Safe-T’s ‘Zero Trust’ architecture comes into the picture. “Zero trust model works on a philosophy of ‘trust nothing, always verify’ instead of the legacy philosophy of ‘trust but verify.’ The zero trust model has three fundamental processes in protecting the devices – trust nothing, continuous authentication and least privilege access. Safe-T provides secure-access solutions that would enable companies to enforce ZTNA within hours to secure remote access and authenticate users with MFA before network access is granted. Safe-T mastered zero trust architecture, and is enabling enterprises to secure users and their devices through their security review campaign. iValue InfoSolutions is an integral part of this campaign and delighted to support customers and partners in enhancing their security posture to mitigate prevailing and evolving threat landscape” Harsh Marwah Chief Growth Officer at iValue InfoSolutions  “Safe-T ZoneZero, is a unique ZTNA solution, being the only true client-less and agent-less solution, we allow connecting any type user, managed or unmanaged to any resource in minutes. In addition ZoneZero allows supporting both internal and external users in parallel, allowing to implement ZTNA concepts throughout the organization in a simple fashion,” said Eitan Bremler, VP Corporate Development at Safe-T Data. To help organizations, Safe-T has arranged a ‘Free Network Review.’ The review has been designed to provide the company with a custom report, documenting the current architecture, vulnerabilities, and network attack footprint. The review consists of a three-step process: Complete the online questionnaire. Results are analyzed by Safe-T Security Experts, and a custom report is built for the company detailing the existing architecture and potential vulnerabilities. Free consultation, with a security professional to review each risk, types of attacks and how Safe-T’s solution can mitigate different threats. Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyber threats. Using Safe-T’s ZoneZero™ SDP, ZoneZero™ VPN, ZoneZero™ MFA, Secure File Access (SFA) and Secure Data Access (SDA), organizations can provide complete zero trust access for network (LAN) users, remote employees, partners, applications, IoT devices and more, to company resources regardless of their location. As a variety of brands offer this solution, speedy deployment and ease of integration is the key differentiator for success of any deployment of zero trust security. Safe-T offers this key ingredient with zone zero that is easy to integrate with the existing security, besides offering an end-to-end zero trust access to the resources. A premium technology enabler, iValue InfoSolutions drives ‘go to market’ for niche, compelling and complementary offerings, ‘digital assets’ protection, optimization and transformation area, leveraging customer life cycle and product life cycle adoption frameworks. iValue’s mission is to optimize, protect and transform ‘digital assets’ of organizations, with leading-edge and proven offerings, in collaboration with trusted partners. iValue offerings are aligned, customized and optimized for organizations, across vertical & size, through its OEM, consultant & global, national, regional and local system integrators partnerships.  

Read More