securitylinkindia

Single Bollard Stops and Destroys Simulated Bomb Truck

Delta Scientific has announced the successful testing of its Model DSC635, a single shallow foundation bollard design that stopped and destroyed a 15,000 pound test truck with less than two feet of static penetration and 6.14 feet of dynamic. The simulated bomb load remained intact on contained on the truck bed. The test vehicle weighed 15,000 pounds and was traveling over 50 miles per hour. The fronts wheels were pushed back behind the cab and the engine ended up on the passenger side of the seat. The truck was stopped and completely disabled. “Delta is proud of our long history of innovation and full scale crash testing,” states David Dickinson, CEO of Delta Scientific. The DSC635 bollard has a height of 44 inches and a diameter of 15.75 inches with a cover. Delta’s bollards can be furnished with an array of decorative covers to enhance the look and match the aesthetic of the surrounding structures. These covers include stainless steel, powder coated aluminum, and fiberglass with custom styling and painting also available. Lights, beacons and audible devices can also be added to the bollards for additional safety protocols. Delta has been manufacturing shallow foundation bollards and barricades (24 inches or less) for decades. Shallow foundation bollards are the perfect solution for sidewalks, campuses, parking structures and government/ corporate facility perimeters where underground utilities and space limitations pose a problem for traditional deep foundation bollards. Delta’s shallow foundation bollards are often used to protect building perimeters and sports stadiums as static arrays and used in conjunction with the Delta’s active bollards and vehicle barricades at entrances and exits. Delta Scientific Corporation is the leading manufacturer of vehicle access control equipment with over 260,000 square feet of production facilities in Palmdale, Calif. Delta’s three product lines consist of high-security vehicle barricade systems, parking control equipment and guard booths. Delta Scientific has been engineering and manufacturing vehicle access control equipment since 1974 and sells its products worldwide.  

Read More

Operation 30 Days at Sea 3.0 Reveals 1,600 Marine Pollution Offences Worldwide

Thousands of suspects, companies and criminal networks engaged in maritime pollution have been detected and investigated in a global INTERPOL-led operation. Operation 30 Days at Sea 3.0 (1-31 March) saw simultaneous action by 300 agencies across 67 countries resulting in an unprecedented 34,000 inspections at sea and inland waterways, coastal areas and ports to detect marine pollution violations. Frontline action followed five months of intelligence collection and analysis, enabling the identification of specific hotspots and suspects behind the criminal, deliberate pollution of the world’s waterways. Preliminary results from the operation’s tactical phase included the detection of 1,600 marine pollution offences, often triggering fines and follow-up investigations across all continents. These include: Nearly 500 illegal acts of pollution committed at sea, including oil discharges, illegal ship-breaking and sulphur emissions from vessels; 1,000 pollution offences in coastal areas and in rivers, including illegal discharges of sewage, mercury, plastics, and other contaminants, leading to serious water contamination which flows into the oceans; 130 cases of waste trafficking through ports. By using INTERPOL’s wide range of databases and analytical capabilities, countries were able to connect pollution crime with other serious offences such as fraud, corruption, tax evasion, money laundering, piracy, and illegal fishing. With surveillance down, criminals are seizing opportunities With many enforcement resources being reassigned to tackle the pandemic, criminals have been quick to exploit growing vulnerabilities in environmental security and reduced risk of detection. Authorities in Indonesia detected 65 oil spills and detained two vessels which tried to evade detection by turning off geolocation systems and concealing their national flags. A major criminal network trafficking plastic waste between Europe and Asia was exposed, triggering cooperation between authorities from both regions. So far, 22 suspects have been arrested and thousands of tonnes of waste have been prevented from being illegally shipped to Asia, where it would have likely been dumped, contaminating soils and generating considerable marine litter. Several countries from Europe, Asia and Africa reported illegal shipments of contaminated or mixed metal waste falsely declared as metal scraps. In one case, the Italian Coast Guard seized and prevented 11,000 tonnes of metal scraps mixed with plastic, rubber, mineral oil and other contaminants from being loaded onto bulk carriers headed for Turkey. Namibia, the Philippines and Croatia also reported cases of illegal waste shipments from Europe. Growing trends included COVID-19 disposable items such as masks and gloves, with 13 cases involving medical waste opened as a result of the operation. With the value of gold on the rise, agencies across Africa, Central and South America worked to track illegal mining, which often results in devastating contamination due to mercury discharges. INTERPOL Secretary General Jürgen Stock said, “The threat of pollution crime is constantly evolving, endangering the air we breathe, our water and soil. Although this is the third edition of 30 Days at Sea, it is never the same exercise. “It is thanks to a global yet agile network that we have seen the number of inspections more than double since the first edition – a clear sign that the international community will not stand for criminal attacks on our environment.” INTERPOL will assist member countries in their follow-up operations and intelligence analysis with support from its Pollution Crime Working Group. Joining forces for greater impact With INTERPOL’s Environmental Security Programme coordinating the operation globally, Europol and FRONTEX (European Border and Coast Guard Agency) provided crucial support by coordinating the European leg of 30 Days at Sea 3.0, as part of the EMPACT action plan on environmental crime. Europol’s Executive Director Catherine De Bolle said, “Marine pollution is a serious threat, which endangers not only the environment but our health and in the long run our global economy. Criminals do not care about the environment; they do not think of tomorrow, but only of increasing their profits on the back of our society. Consolidated law enforcement efforts such as 30 Days at Sea are critical to tackle these borderless crimes and protect our environmental heritage for generations to come.” “Environmental crime is one of many criminal activities Frontex targets as part of our mission as the European Border and Coast Guard Agency. This is our contribution to the protection of the environment. I’m proud that, as part of 30 Days at Sea, Frontex aerial and maritime assets monitored nearly 1 000 vessels,” said Frontex Executive Director Fabrice Leggeri. All three editions of Operation 30 Days at Sea have been carried out with funding from the Norwegian Agency for Development Cooperation (Norad). Participating countries Participating countries include Angola, Argentina, Australia, Bangladesh, Benin, Bolivia, Bosnia and Herzegovina, Brazil, Bulgaria, Cameroon, Canada, Chile, China, Cote d’Ivoire, Croatia, Cyprus, Democratic Republic of Congo, Ecuador, Ethiopia, Fiji, Finland, France, Georgia, Germany, Ghana, Greece, Guatemala, Guinea Bissau, Honduras, India, Indonesia, Ireland, Israel, Italy, Kenya, Kuwait, Latvia, Liberia, Malaysia, Maldives, Malta, Namibia, Netherlands, Nigeria, Norway, Peru, Philippines, Poland, Portugal, Qatar, Republic of Korea, Romania, Russia, Saudi Arabia, Senegal, South Africa, Spain, Sweden, Tanzania, Thailand, Timor Leste, Ukraine, United Kingdom, United States, Uruguay, Vietnam, Zimbabwe.  

Read More

HID Global Empowers qiiosk Ltd to Meet Rising Demand for Truly Touch-Free Dining Experiences

HID Global, a worldwide player in trusted identity solutions, recently announced that qiiosk Ltd. uses its HID NFC Tags to meet skyrocketing demand from restaurants and diners for its product Menu Tile, to give a completely contact-free dining experience. With HID NFC Tags, qiiosk was able to respond quickly to the demand for solutions capable of addressing the ‘new normal’ of contactless dining, takeout, and delivery. The company’s enhanced solutions enable restaurant goers to securely access current menus, place orders, and submit payment simply by scanning a QR code or tapping an embedded NFC tag with an NFC-enabled smartphone or tablet. High-quality HID NFC Tags facilitate end-user interactions with qiiosk’s products, providing restaurants and other hospitality venues with robust hardware and best-in-class software for touchfree ordering and payment. “HID NFC Tags now solidly underpin our Menu Tile product and others in development,” said Justin Clark, Director at qiiosk, “We chose the solution due to our experience and confidence in the tags after significant and fierce field trials. We are confident in HID products and use them not only within our organization, but also in organizations we support.” Of particular importance to the Menu Tile product was the adhesive quality, read rate and ruggedness of HID NFC Tags, which allowed the company to equip its customers with a ‘fire-and-forget’ solution to address rapidly evolving regulations in the hospitality sector due to the COVID-19 pandemic and increased attention on food allergen issues. With HID NFC Tags, qiiosk was able to quickly upgrade their physical product and produce enough tiles to supply customers. This positioned the company to maintain their high growth by delivering a high-quality product capable of enduring the harsh conditions of bars and restaurants – leading to cost savings and reliability. “We are pleased that qiiosk has leveraged the power of HID NFC Tags to deliver an improved product that provides exceptional results during a time of high demand and great uncertainty,” said Jean Miguel Robadey, Vice President of Industrial Smart Components, Identification Technologies with HID Global, “By integrating HID NFC Tags into its solutions, qiiosk was able to deliver to its customers more touch-free opportunities and the ability to immediately communicate menu changes and even possible COVID-19 exposures to protect their staff and diners.”  

Read More

Videonetics helps Indonesia Government Institution Improve People Identification and Authentication

Mission With a mission to recognize faces of the people entering/ exiting premise of the Government Institution at Indonesia, and analyse their attributes in real-time, the authority needed an extremely robust and ‘highly secured’ facial recognition system. Due to heavy footfall at the premise, it was difficult for staff to manually record information of visiting people and verify their identity on daily basis. Sometimes, they faced challenge in verifying them due to changes in appearance or features. The solution Videonetics MeraFace™ – facial recognition software was selected after a thorough technical evaluation by the partner as well as government decision makers, Videonetics MeraFace™ was selected for its highest accuracy in recognizing and detecting faces, in varied lighting condition, providing additional attributes of gender, age and emotions and comprehensive statistical reporting. Operating 24x7x365 on one of the busiest premises having footfall of VIPs, citizens, media, and government officials, Videonetics MeraFace™ was deployed at strategic locations with high human traffic flows including entry and exit and lift lobby area, of the institution. Video streams from IP cameras are processed at MeraFace™ to detect faces in real-time and operators find probable match with the registered faces. In case, any face which is not registered but has been captured and stored in the system, can also be found anytime. Operators have been keeping records of registered faces and attributes of the person’s face for future search and investigation. Powered by AI & deep learning framework, MeraFace™ analyses and delivers more information such as gender, age, emotion – eventually helpful for officials to make accurate visitors’ analysis. Now, operators can identify and classify VIP, suspected, blacklisted people in real-time with easy clicks and send the instant notification to the staff, for any swift action. At the time of any suspicious activity, operators can quickly investigate person’s face in the given videos or collection of face images. Moreover, this feature has been phenomenally successful as an investigation tool, for conducting post incident analysis. The impact Videonetics MeraFace™ has been proven to be a reliable and scalable system for the government authority by delivering fast and highly accurate results. Today, the security staff can recognize and detect faces in real-time. Furthermore, MeraFace™ has helped in appointing a smaller number of security guards around the entrance or exit of the premise, thanks to automated facial recognition system of identifying and validating information. Risk of human errors in face matching has also been eliminated. “Videonetics has not only delivered a perfect facial recognition solution, but also delivered on its reputation of providing outstanding training and support to us and customer. Our customer has invested in the future-proof technology that has the ability to grow with their needs,” expressed Alfred Bisuk, Technical Manager, Lamjaya Inovasi Komputindo.  

Read More

360 Vision Technology Explore Radar and Thermal Camera Deployment in Security Summit Live Virtual Presentation

360 Vision Technology, the UK manufacturer of rugged PTZ and thermal imaging cameras, has promoted the application and deployment of radar and thermal imaging at Security Summit 2021, one of the largest virtual security industry events in Europe. Scheduled for 11.30-12.00 (GMT), Wednesday May 5th, the free-to-attend live virtual keynote presentation was given by 360 Vision’s technology expert, Tony Holloway, on the subject of ‘The application of radar and thermal surveillance technologies for large area security detection.’ In his keynote speech, Tony discussed the technology, performance differences and considerations for the deployment of radar and thermal detection cameras suitable for large area surveillance applications. Underpinned by the science behind the solutions, Tony explored the features and limits, to enable attendees to clearly identify applications for successful deployment. “Following the recent success of our technology learning webinars, we are delighted to have been offered the opportunity to deliver a technology keynote speech at the Security Summit Virtual Event,” said Sara Fisher, Sales Director at 360 Vision Technology, “In Tony’s presentation, he’ll be looking at how radar and thermal imaging can be successfully specified for use in a variety of large area applications. The presentation will be highly beneficial for anyone interested in deploying a surveillance capability that offers immediate and reliable detection, with simultaneous alert and visual verification.”  

Read More

9 Factors to Consider While Selecting the Right Cloud Service Provider

By Vikas Bhonsle, CEO, Crayon Software Experts India As more and more IT systems are outsourced, zeroing in the best cloud providers is critical to long-term success. The market is already vast, with different brands offering large numbers of services. Apart from the big providers like Microsoft, Amazon and Google, there are also smaller niche players, who provide bespoke services. With too many choices to opt from, you must put down the selection and procurement process appropriate as per the needs. The right time to select a cloud provider I t is significant to understand the requirements of a business before choosing a cloud service provider. Clarifying the specific requirements and minimum expectations in advance, while assessing providers ensures that they are compared against the requirement checklist and not against their competitors. It is a faster way to narrow down the list of providers. With more clarity on the requirements such as technical, service, security, data governance and service management, you will be better prepared to interrogate and negotiate with your potential providers. Common areas to focus while choosing a service provider Apart from the unique requirements that a company will have from a cloud provider, there are some common areas of focus during any service provider assessment. 1. Certifications & Standards Providers must comply with recognised standards and quality frameworks, which demonstrate adherence to industry best practices and standards. This may not only help to determine which service provider is best to choose from, but they can be very helpful in shortlisting potential suppliers. 2.Technologies Integration & Migration Services The cloud provider’s technology must support the cloud objectives of your organisation. Assess what migration services they can provide and how much customisation is required to integrate with their platforms. In the case of some providers offering limited services, understand if any third party support is needed and if the platform provider can recommend any that have experience and extensive knowledge of the target platform. 3.Support For SaaS (Software as a Service) providers, a roadmap of features, service and integration is highly desirable. Depending on the particular cloud strategy, companies may also want to evaluate the overall portfolio of services that providers can offer. If you plan to use separate services from a broad mix of providers then this is not very relevant, but if the preference is to use only a few key cloud service providers, it is important for the providers to offer a good range of compatible services. 4.Data Management Data management and security are currently of foremost importance. You can opt for providers that give the best choice and control regarding the jurisdiction in which the data is stored, processed and managed. Cloud service providers should be transparent about their data centre locations, but you should also be proactive in finding this information. Assess the data encryption strategies of the provider and the measures that they take to protect data. Look to understand the provider’s data loss and breach notification processes and ensure they are aligned with your organisation’s risk appetite and legal or regulatory obligations. 5.Service Dependencies & Partnerships Certain factors such as the service provider’s relationships with their key vendors, their accreditation levels, technical capabilities and staff certifications can be crucial in choosing the best provider. It is pivotal to uncover any service dependencies and partnerships involved in the provision of cloud services. For example, SaaS providers will often build their service on existing IaaS (Infrastructure as a Service) platforms. Thereby, it must be clear how and where the service is being delivered. 6.Contracts, Commercials & SLAs Cloud agreements and SLAs should specify how issues should be identified and resolved, by whom and in what period. Look for a clear definition of the service and deliverables. Get clarity on the roles and responsibilities relating to the service (delivery, provisioning, service management, monitoring, support, escalations etc.). Scrutiny of these terms is vital, as often service credit calculations are complex – ask for worked examples or give all shortlist providers the same imaginary downtime scenario and compare different compensations offered. 7.Reliability & Performance Several methods can be employed to measure the reliability of a service provider. First, check their performance against their SLAs for the last 6-12 months. Secondly, know how the provider deals with downtime, as it is inevitable with most cloud services. Also, there should be documents and proven processes for dealing with planned and unplanned downtime. Get clarity of their methods and practices of communicating with customers during times of disruption. This includes their timeliness, how do they prioritise and what is the severity level assessment of issues. 8.Migration Support, Vendor Lock in & Exit Planning Cloud providers may use proprietary technologies, which lead to vendor lock-in during exit, meaning that a customer cannot easily transit to another provider, as the technology will not be compatible. It can impact portability to other providers or in-house operations. It is especially true if applications have to be re-architected in order to run on a service provider platform. It is eliminated by ensuring that the chosen provider has minimal use of proprietary technology. Similarly, ensure there is a clear exit strategy in place at the start of the deal. Moving away from one cloud service provider isn’t always an easy or smooth transition, so it’s worth knowing their processes before signing a contract. Furthermore, consider how the data will be accessible, what state it will be in and for how long the provider will keep it. 9.Business health & Company profile Assessing the technical and operational capabilities of a potential supplier is important. At the same time, the provider must be in the best financial health and profile. The most compatible or competitive cloud service is immaterial if the provider doesn’t have a sound business. Contractual assurances and good intentions cannot save the day, if the providers get into financial troubles and do not have the resources to refund the losses. Check if the organisation has had entangled legal history and how they have been…

Read More

Multi-Factor Authentication – A Much Needed Safety Net Against Cyberattacks

Shibu Paul, Vice President – International Sales at Array Networks 2021 is the dawn of a new decade, with the new decade the Indian tech industry is ready to witness a revolutionary change surrounding various factors and one of the most important factors that is to undergo this change is ‘cybersecurity.’ This change is validated with the continuous emergence of reports on the increasing number of cyberattacks against India’s government agencies, private organizations and individual users. According to a report by Kaspersky, India witnessed 36 million cyberattacks between January and November 2020, whereas the number of attacks in 2019 for the same months was 18 million. This only emphasises the need for a better cybersecurity measure to be brought in to keep the data safe from cyberattacks. multi-factor authentication (MFA) is one of the best ways to keep threat actors at bay. In 2020, many organizations had to do a complete overhaul of their cybersecurity measure, a few other organizations had to rejig their security features, especially with remote working culture coming into the picture. All of this leads to one problem – IT Complexity. The best solution for IT administrators is to provide easy safety access for employees who are remotely logging in. Using Array’s AG series secure access gateways, organizations can provide tokenless, secure and easy-to-use multi-factor authentication. Through interoperability with 3rd party dual and MFA solutions, the AG series adds an additional layer of defense against unauthorized access and misuse of data and applications. Using this, administrators can adapt the level of support needed using contextual information such as login behavior patterns, geo-location and type of login system being accessed. Many a time threat actors find it easy to breach the security set up by IT administrators due to the loopholes that come into existence as a result of complex cybersecurity setup. If MFA is provided at the user end, there will be an additional security that will help the users prevent any sort of breach from their end. This will in-turn help in avoiding identity theft, use of stolen credentials, avoiding data breaches due to malicious attacks and so on. While firewalls and antivirus solutions keep the systems safe via backdoor entry, it’s MFA that guards the front doors. As per global multi-factor authentication (MFA) market report, the MFA market revenue which was $8,967 Mn in 2019 is estimated to reach $16,105 Mn in 2025, with a CAGR of 10.25% during 2020-2025, thus showcasing the opportunity and the demand MFA is set to rise in the next five years. This leads to the question of why now more than ever MFA is of importance. MFA is easy to implement and is considered an inexpensive security add-on by IT administrators. It is considered beneficial as it will enhance the organization’s security by requiring users to identify themselves by more than a username and password. Using MFA an organization can achieve compliance, increase flexibility and productivity by bringing-in stability with streamlining login process and it complies with single sign-on (SSO) solution. While providing cybersecurity is now a complex matter since the threats posed by the actors is equally proportional in complexity, a simple add-on such as multi-factor authentication helps take users and organizations one step closer towards keeping the data safe.  

Read More

Milestone Systems Delivers Successful Result in A Challenging Year

With a solid COVID-19 continuity plan, a strong focus on people retention and new ways of collaborating with partners, Milestone Systems achieved a net revenue of DKK 1 billion in 2020, a decrease of 1% compared with 2019. The operating income (EBIT) was DKK 112 million, a decrease of 9%, reflecting the pandemic’s impact on sales, an increase in development capacity, and investments in new head counts to fuel future growth. “Given the challenging situation of the pandemic, our annual result is a successful outcome, made possible by our people, without whom long-term sustainable growth would not be possible. We quickly turned around how we manage the company and found new ways of supporting our network of partners. This resilience combined with the adaptability of our people and partners prepared us to face the new challenges” Thomas Jensen Chief Executive Officer, Milestone Systems   People First During 2020, Milestone’s People First approach was tested to its core. It was crucial for Milestone to avoid restructuring while supporting its people – keeping them motivated and feeling included as part of the team. To support this, Milestone launched the Grow Together program that focuses on mental and physical health and knowledge-sharing about exercise, food, and sleep. In addition, despite the COVID-19 pandemic, Milestone lived up to the ambition to invest in people and growth, increasing the number of employees by 69 to a total of 934 at the end of 2020. “Many of our partners found themselves suddenly in silos when the pandemic hit, so we re-routed our business strategy virtually with rigorous online trainings and webinars. In 2021, we are looking to further expand our partner community and help them grow in India and beyond via Marketplace. We will continue to support our customers in 2021 with the same approach of putting people first with focus on partner and community involvement” Sandesh Kaup Country Manager, Milestone Systems, India & SAARC   Increased support of partners The wide network of channel and technology partners is the core of Milestone’s open video technology platform. When the pandemic hit, Milestone optimized its support to help partners keep selling Milestone solutions. Product training went online with webinars attracting thousands of partners and, with the Milestone Care™ campaign, Milestone helped its partners to continue their business without having to be onsite with their customers. Looking ahead, Thomas Jensen expects challenges but also looks forward to Milestone’s continued growth journey. He concluded, “COVID-19 created a lot of uncertainty and unpredictability in 2020. The pandemic is not behind us yet, and therefore we see challenges as well as opportunities ahead. But with our strong COVID-19 continuity plan, we are confident that 2021 will become another growth year for Milestone.”  

Read More

Videonetics & Axis Enhance their Technology Partnership Under Axis Application Development Partner Program

Videonetics, the world’s leading AI & DL powered Unified Video Computing Platform (UVCP™) strengthened its technology partnership with Axis Communications, Market leader in IP surveillance, by co-creating and delivering numerous integrated solutions under Axis Application Development Partner (ADP) program, to meet growing demands of different market segments. The Axis Application Development Partner (ADP) Program is designed to help software vendors streamlining their software integration for Axis range of IP cameras and other network system devices. Over the years, the technology alliance has benefited both the companies to expand market penetration and geographical reach by collaborating with industry’s largest partner network and providing innovative integrated solutions to partners and design customised solutions for end-users. Videonetics and Axis Communications have successfully completed following integrations: Videonetics Intelligent VMS 3.0 supports AXIS Zipstream technology which reduces the cost of bandwidth, server equipment, data storage systems and lowers the complexity of the video surveillance system along with the total cost of ownership. Integration with AXIS network speakers allows users to react immediately to suspicious situations by making a live announcement and VMS sends the alert to designated operators to deter potential intruders and they can replay audio clips as and when required. Videonetics Intelligent VMS 3.0 when integrated with AXIS Radar, provides additional visual information of the scene with help of many cameras connected to IVMS, thus providing much needed situational awareness, detects real-time threats or multiple intrusions at the same time while reducing false alarms. Videonetics AI enabled video analytics has been embedded directly to the AXIS IP cameras ‘on the edge’ enabling each camera to operate independently with real-time detection capabilities while eliminating the need for additional hardware. Similarly, Intelligent VMS 3.0 integration with edge storage of AXIS cameras, minimize loss of video in the event of connection issues or network failure between recording servers and cameras. Last but not the least, Intelligent VMS 3.0 added a new level of secure integration with cameras from Axis based on secure real-time transport protocol (SRTP) as a means of hardening surveillance content against cyber-attacks and unauthorized interception.  

Read More

Fortinet Reduces Cyber Skills Gap with Training Advancement Agenda (TAA)

Fortinet® a global player in broad, integrated and automated cybersecurity solutions, is continuing to make significant progress in helping close the skills gap through the NSE Training Institute programs and its Training Advancement Agenda (TAA). By increasing the access of training, developing cybersecurity career pathways and connecting individuals to employers, the NSE Training Institute is making big strides in advancing TAA efforts. The NSE Training Institute continues to grow globally, serving IT and security professionals and under represented populations. In addition to recently expanding NSE offerings, including the extension of more than 30 free, self-paced technical training courses, the NSE Training Institute welcomes new global partners working alongside Fortinet to close the cybersecurity skills gap. The skills gap remains a top challenge for organizations The cyber skills gap is a top concern for CISOs as it helps contribute to security risks and the opportunity for bad actors to exploit vulnerabilities when strained security teams are short staffed. The Fortinet Network Security Expert (NSE) Training Institute – comprising the Certification Program, the Security Academy Program, the Veterans Program, Authorized Training Centers and the Information Security Awareness and Training Service – was established to address the widening cyber skills gap plaguing the industry. For the first time since the NSE Training Institute’s establishment in 2015, the industry saw a decrease in the number of security professionals required to fill the gap in 2020 with a shrinkage from 4.07 million professionals needed to 3.12 million professionals according to an (ISC)2 report. While this demonstrates progress toward solving the issue, the gap is still a significant challenge for organizations of all sizes. Fortinet creates opportunities through training, certifications and partnerships To address the skills gap challenge, Fortinet’s NSE Training Institute offers a number of different programs to individuals at all stages of their cybersecurity career. The TAA leverages several NSE offerings to close the cyber skills gap through training and certifications, career opportunities and partnerships. Below are some recent NSE Training Institute milestones: Providing Fortinet curricula to students: Through the Security Academy Program, Fortinet supports almost 400 institutions in more than 85 different countries and territories. These academic institutions range from students in K-12 all the way to higher education and research institutions. New participants that have recently become authorized security academies include – Stanford University, University of California, Berkeley, University of Arkansas (ULAR), Francisco Gavidia University in El Salvador, University of Costa Rica, U-tad University in Spain, Women in Tech based out of France, Collège Communautaire du Nouveau-Brunswick (CCNB) in Canada, Southern Alberta Institute of Technology (SAIT) in Canada, Tower Australian College, Tennessee College of Applied Technology in the US and the University of Benghazi. Through the program, institutions are given access to Fortinet’s NSE Certification Program content to integrate into their own curriculum, along with exam vouchers for those who complete the course, in order to prepare students for a career in cybersecurity and help develop the next-generation of cybersecurity professionals. Free NSE Training courses reach more than 1,000,000 registrations: Recently, Fortinet announced the extension of all its advanced self-paced courses available free of charge to continue developing the world’s cyber workforce. The free cybersecurity training courses first introduced in early 2020 offer more than 30 self-paced, technical courses on critical topics ranging from Secure SD-WAN to operational technology to cloud security. There have been more than 10,00,000 registrations for these free courses to date. It leverages courses that count toward (ISC)2 CPE Submitter Program and the NSE Certification Program, Fortinet’s eight level certifications from cybersecurity fundamental education courses (NSE 1-3), technical product training (NSE 4-6), advanced solution-based training (NSE 7) and the cybersecurity expert recognition (NSE 8). Fortinet’s Information Security Awareness and Training Service is also offered to organizations free-of-charge, aimed at helping companies better educate their workforce on how to identify and protect themselves and their organizations against all types of cybersecurity threats. Raising cyber awareness in young children: Fortinet recently released a children’s book designed to further increase cyber awareness amongst children ranging from 7 to 12 years old. The book ‘Cyber Safe: A Dog’s Guide to Internet Security’ was co-authored by Renee Tarun, Deputy CISO at Fortinet. Charting new education pathways: Fortinet has developed education pathways to further facilitate the transition into a career in cybersecurity and close the skills gap. The education pathways were created to help align Fortinet training and certifications with roles defined in the Cybersecurity Workforce Framework developed by National Initiative for Cybersecurity Education (NICE), a part of the National Institute of Standards and Technology (NIST). Fortinet has defined four pathways for learners in some of the most critical areas in the industry: security operations, security-driven networking, adaptive cloud security, and zero-trust network. Delivering expert training via Fortinet and our authorized training centers: Fortinet authorized training centers (ATCs) provide a global network of training facilities that deliver expert-level training in local languages. Fortinet has more than 80 ATCs worldwide and is continuing to expand the locations of the training center partners to further the reach of NSE training. Fortinet’s ATCs are currently teaching in 72 countries and territories and can deliver training and local cultural support in 22 different languages. New NSE courses and updates launched in 2021: New courses have been added to the NSE library, including NSE 5 FortiEDR 4.2, FortiAnalyzer 6.4 and FortiManager 6.4. A new technical course focused on OT security which outlines how to design, implement, and operate an OT security solution based on Fortinet products has also been added. These courses are all available as self-paced as well as instructor-led and can be taken with Fortinet or one of our ATCs. Customers are also able to book private training sessions online that are customized for their organization and delivered through a virtual classroom application. Continued collaboration on Cybersecurity Learning Hub: As a founding partner of World Economic Forum’s Centre for Cybersecurity, Fortinet continues to build on its partnership with Salesforce.com and WEF on the Cybersecurity Learning Hub initiative. The Cybersecurity Learning Hub leverages NSE 1 and 2…

Read More