securitylinkindia

Technical Surveillance Counter Measure (TSCM)

Kartik Vig, Director, Security Consulting, Netrika It’s a competitive world, and not everyone plays by the book. Sadly, gathering competitive intelligence is one of the ways being used to not only stay abreast of competition, but may be even try beating the competition to the finishing line. It is an ever-increasing threat in today’s data-driven world, and it ranges from criminals trying to obtain business critical information for commercial or technical gains, to sophisticated state-sponsored organisations looking for political and military gains. While it is not always possible to know every threat present around us, a robust security policy encompassing physical security, cybersecurity, and protection from electronic surveillance is necessary to ensure that your secrets remain secret. Devices being used by perpetrators for surveillance and gathering intelligence are increasingly becoming more sophisticated, small and inexpensive, which can compromise not only your sensitive information, your private conversations, your plans as well as secrets but also the entire security of your building. Critical and sensitive information whether of business or personal nature, can be misused by any detractor and may lead to financial loss and/ or loss of reputation. With our unique approach and state of the art TSCM equipment, we offer a comprehensive TSCM solution, which could greatly improve the security of your organisation. TSCM helps ensure safeguarding of critical/ sensitive information in a professional and comprehensive manner. What is Technical Surveillance Counter Measure? Technical Surveillance Counter Measure (TCSM) is a term that was coined by the United States government, that describes the action of sweeping for devices that may be spying on you. TSCM was initially aimed at sanitising rooms for listening devices by detection of emission of radio waves. The process of TCSM has evolved to the point where non – radio emissions can also be detected. It encompasses securing communications technology, thoroughly inspecting and fortifying information technology and ensuring a heightened protocol of physical security. With a proper TSCM sweep, one can counter the risk of corporate spying, ensure confidentiality and safeguard inside information – losing which could impact your firm. The goal of a TSCM sweep is to identify existing security gaps and potential weaknesses in technical and communications security and to recommend corrective actions to neutralize the identified risks. Mentioned below are some of the most used surveillance tools, that maybe used by perpetrators trying to steal your information: Mini audio/ video cameras and recorders, as in everyday use items. Radio microphones, IP and wireless microphones and cameras. Wired microphones or cameras. Devices intercepting the electromagnetic radiation. Eavesdropping software monitoring GSM phones, computers, laptops and tablets. Microphones transmitting information through electrical grid, internet cables. Technologies used in Technical Surveillance Counter Measure and Caution I n today’s technologically vibrant world, there are a number of TSCM technologies available in the market, from radio signal analysers to spectrum analysers, non-linear junction detectors to IR detectors, camera detectors etc. However, one needs to be cautious as use of inexpensive and local devices for conduct of TSCM may lead to a false sense of security and loss of all security efforts envisioned for securing critical information. It is therefore highly recommended to adopt a comprehensive approach using state-of the art technology to counter the threat of illicit surveillance. To Conclude Deploying TSCM measures will help safeguard your edge over your competition, your trade secrets and your conversations from illicit surveillance/ intelligence gathering. It is also one of the best ways of mitigating such risks. Scheduling regular TSCM sweeps can safeguard your trade secrets as well as ensure peace of mind.  

Read More

Boost Security at Remote Locations with Hikvision’s Solar-Powered Stand-Alone Security Solutions

Until now, it has been difficult for remote sites and operations to protect their people and assets – especially where no power supply or fixed networks are available. Now, there’s a simple, practical, cost-effective solution to this challenge in the form of Hikvision’s Solar-powered Security Camera Setup. The challenge of protecting remote and rural sites All kinds of remote and rural sites require constant security monitoring, from farms and fisheries, to forestry operations, oil and gas pipelines, and even national parks. The problem is that these kinds of sites are frequently ‘off-grid,’ lacking the power and fixed network connectivity needed to deploy security monitoring cameras. As an additional challenge, many sites have only temporary security requirements, making the cost of deploying ‘fixed’ cameras prohibitive. This is the case for open air music festivals, political rallies, and many other events. A range of other sites and operations also have short-term monitoring needs, from construction sites to temporary road maintenance works. Meeting security requirements at these kinds of remote and temporary sites requires a new kind of ‘standalone’ solution – one that can operate independently, without physical connections to either the energy grid or to a fixed network. Additionally, standalone solutions should be fast and simple to deploy, highly durable to withstand the most adverse weather conditions, and affordable enough to meet the needs of all kinds of remote sites and operations. Boosting security with Hikvision’s Solarpowered standalone solution To help remote operations to boost their security, Hikvision has created the Solar-powered Security Camera Setup. This solution uses a 40 Watt photovoltaic panel and a highly durable 20 Ah rechargeable Lithium battery to power a Hikvision EXIR Fixed Bullet Solar Power 4G Network Camera. Because the Solar-powered Security Camera Setup uses solar power and includes a micro SIM card for connectivity with the 4G network, there is no need for fixed power or network cables on site. Additionally, operators can monitor, review, and store footage remotely, 24 hours a day, 365 days a year. Key benefits for remote sites and operations Using the Hikvision solution, remote sites and operations can boost their security quickly, easily, and at low cost. With no need for a fixed network or power supply, and simple installation that can be carried out by just one person, the solution can be rolled out in hours – with very little need for ongoing maintenance or support. Key benefits include: High-quality imaging for fast, effective incident responses The Hikvision EXIR 4G Network Camera provided with the Solar-powered Security Camera Setup offers high resolution imaging (1920×1080 pixels @30fps). Additionally, the camera provides very clear images even where strong back-light exists due to Hikvision’s 120dB true wide dynamic range (WDR) technology. The excellent quality and clarity of video imaging means that operators can quickly identify and react to security incidents at remote sites – helping to reduce negative business impacts. 24×7 security monitoring – in any weather The product employs BMS (battery management system) in its 20Ah Lithium battery, which ensures the optimal use of the battery energy. With its smart power management features, the Solar-powered Security Camera Setup provides up to 7 days of operation during cloudy or rainy periods when fully charged. Its 4G camera further adds a 32GB eMMC (embedded multimedia card) besides the SD card, this ensures continuous video recording when there is an anomaly with the SD card or the network environment. Additionally, the self-sufficient unit is waterproof (accredited to the IP67 standard), and windproof (with a hurricane rating of 12). All this means that operators can continue monitoring and securing their remote sites without interruptions – even in the harshest and most challenging weather conditions. Rapid, simple, cost-effective installation A single person can install the solution at remote sites, making the process fast, easy, and cost-effective, thanks to its lightweight design. The pole mounted unit weighs just 14kg, and there are no complex cables to connect – further reducing deployment time and complexity. This speed and ease of deployment significantly lowers barriers for remote sites and operations looking to boost their security. It is also a major reason why it is the ideal choice for temporary sites such as construction sites and road maintenance sites. The key features of the Hikvision Solarpowered Security Camera Setup High quality imaging with 2MP (1920×1080 @30fps) resolution. Clear imaging against strong back light with 120dB true WDR technology. Ah rechargeable lithium battery with 7-day operation even in cloudy and rainy weather. 40-Watt photovoltaic panel for standalone operation. Support battery management features, including battery display. Battery high/ low temperature protection and charge/ discharge protection, with low-battery sleep protection and remote wakeup features. 4G Micro SIM card with LTE-TDD/ LTE-FDD/ WCDMA/ GSM transmission capabilities. Water and dust resistant camera (IP67 certified).  

Read More

How to Track Parcels in Real Time to Boost Performance and Minimize Lost Goods

Since e-commerce has steadily been on the rise globally in recent years, many people prefer not to visit physical stores as usual, leading to a major boom in online shopping and home parcel delivery. This means there are unprecedented opportunities for e-commerce and logistics companies to expand their businesses and grow their revenues. However, success depends on increasing performance and throughput, while also tracking and securing thousands of parcels a day as they head towards end-customers’ addresses. Why manual processes make parcel tracking harder For many logistics companies, the sheer volume of goods passing through distribution and fulfillment centers creates major challenges for tracking and securing parcels effectively. This is especially the case during manual steps in the parcel delivery process such as opening boxes to conduct quality control checks, and packing parcels for delivery to customers’ addresses. This is because manual processes inevitably introduce an element of risk into the parcel delivery process. Errors can occur, for example, leading to lost or mis-directed parcels. Additionally, manual interventions in the supply chain may increase the risk of lost inventory, especially where effective monitoring systems and processes are absent. The question for logistics providers processing thousands – or even tens of thousands – of parcels a day, is how to minimize the risk of errors and loss of goods across the entire, end-to-end delivery process. Track each and every one of the parcels with digital technology Using a combination of digital technologies, it’s now possible to monitor goods as they flow through the facility in real time. In particular, smart video cameras can be connected to barcode scanners, allowing users to understand exactly where goods and parcels are located, and how they are moving through their facility. By cross referencing data from cameras and scanners, one can quickly access footage of incidents such as goods that are dropped or damaged. In the same way, he can identify goods that were damaged before they reached him, proving that his teams were not responsible for breakages. The value of an end-to-end audit trail By creating an end-to-end audit trail for every parcel, this kind of solution allows the user to monitor his performance on an ongoing basis, and to make operational improvements that increase his productivity and throughput. Equally importantly, he can also find out exactly what happened to goods that are lost or stolen from the supply chain and take immediate action if required. If goods are lost, for example, he can quickly cross reference time and date information from barcode scanners with video footage recorded by security cameras. He can then see exactly what happened, giving him clear evidence for later use. Many times, of course, mistakes and issues are innocent such as parcels stuck in joins between conveyer belts. However, with digital, end-to-end parcel tracking, these kinds of events are also fast and easy to spot, ensuring that one can meet your delivery SLAs.  

Read More

Hikvision Completes Major Enhancements to its HikCentral Professional Integrated Security Software

Hikvision has announced the launch of newly updated HikCentral Professional 2.0 security software (HCP 2.0), which blends feeds from multiple systems onto a single platform. HCP 2.0 can be configured to link video security devices, alarm and access control systems, and more, including third-party systems through the OpenAPI – for easy centralized management of a variety of security and business applications. Frank Zhang, President of Hikvision’s International Product and Solution Center, said, “This is an important release for us, and a significant leap forward in our security management software offerings. HikCentral Professional 2.0 will help our customers manage a variety of activities seamlessly on one platform. We’re excited to see the value it delivers.” Nine key applications for numerous business needs HikCentral Professional 2.0 integrates multiple business and security systems with nine key applications, making it valuable to a wide variety of common security and business scenarios seen in buildings, factories, stores, apartments, and the like. Among them, video cameras and security alarms are integrated into the platform to deliver fluid live viewing and timely alarm notifications. Furthermore, access control can be included to assign a variety of access permissions using multiple methods including facial recognition, ID cards, fingerprints, QR codes, and more. HCP 2.0 also allows various personnel such as HR managers to set flexible attendance rules including schedules for shift work while delivering full reporting facilities. Additionally, site managers can also employ vehicle management and visitor management applications to streamline entrance management as well as on-site parking. Users can further rely on HCP 2.0 with intelligent analysis and reporting – an application that collects data and transforms it into easy-to-understand reports and dashboards. This includes flow status, people density and more. For systems management teams, HCP 2.0’s system maintenance application visualizes alarm and device notifications, as well as the full network and device topology for rapid, targeted action in unusual events. Last but not least, HCP 2.0 lets users deploy digital signage systems to display advertisements and announcements. The software comes with eight pre-installed templates for users to present content optimally. This can be crowd numbers and temperature status in a supermarket scenario, for example. Creating truly unified systems with enhanced security and greater operational efficiency With HCP 2.0, users will flexibly unite applications and build a tailored system to match their security and business needs. The unified approach not only creates greater situational awareness of their security environment, it also reduces real day-to-day management resources previously required by disparate systems. For example, users can integrate visitor management with vehicle management to enhance daily operational efficiency for building facilities. Facility managers can register visitor information into the HCP 2.0 system, and – by linking to an ANPR system – can set visitors to be automatically permitted into on-site parking. Similarly, the system can also pre-authorize visitor access to specific areas of an organization’s premises. Personalized user experience HikCentral Professional 2.0 can be tailored to deliver specific information to assigned users. The system comes with three pre-configured roles – ‘system installation and management,’ ‘security control and management,’ and ‘attendance management.’ In this way, HR staff can customize their feed to show employee attendance status, for example, while management staff can monitor security of the facilities. There is also one custom role, which can be tailored to specific needs. Perhaps most importantly, HikCentral Professional 2.0 features an improved user interface. Users can customize the control panel to suit their viewing preferences, simply dragging and dropping key video and device feeds into the dashboard, adjusting where they sit and how they look. Dynamic and intuitive user interface HCP 2.0 also incorporates multiple visualized dashboards that display key security and business insights generated from various applications, facilitating decision-making processes with more accuracy and efficiency. What’s more, users apply 3D E-maps that vividly demonstrate device monitoring statuses in different locations, and manage instant alerts interactively by clicking and watching associated live videos and other integrated system information. Easy setup and maintenance HikCentral Professional 2.0 is easy to deploy and quick to set up for a multitude of projects with single applications. Customers with minimum system requirement of Intel i3-CPU and 8 GB RAM can get up and running with a one-click installation procedure that makes HCP 2.0 setup a breeze. Operations guidance wizards are conspicuously displayed to support users in configuring key applications. In addition, the visualized health monitoring dashboards enable more focused and efficient IT maintenance.  

Read More

Bosch Intrusion Alarm Solution Secures UNESCO World Heritage Site with Sensor Data Fusion Technology

Bosch Building Technologies has installed a comprehensive intrusion alarm system at one of China’s most visited cultural sites – the Mausoleum of Qin Shihuangdi in the city of Xi’an. The UNESCO World Heritage Site is home to a 2,000-year-old army of clay statues, the world-famous Terracotta Warriors, guarding the tomb of China’s first emperor. Several hundred TriTech motion detectors are deployed to protect the 16,300 square feet museum against theft and damage. These detectors prevent costly and time-consuming false alarms under challenging environmental conditions, while providing detection reliability of real alarms. Because of the highly efficient intrusion detection system, which detects and reports any unauthorized intrusion into the security areas to security personnel in less than two seconds, the museum can dispense entirely with physical protective barriers such as glass walls, allowing visitors to directly experience their clay heroes. “The cooperation with Bosch is an excellent showcase of modern high-tech protection of historic buildings. Bosch intrusion alarm systems help upgrade the security level of these unique historic sites,” said Ren Xuxin, Project Manager of Xi’an Terracotta Warriors and Horses Pit Security Upgrade Project. Millennia-old warriors under the protection of cutting-edge technology As wall detectors, the TriTech motion detectors protect the pits where the terracotta warriors are located. Because these pits collect large amounts of dust that could cause false alarms, the intelligent sensor data fusion algorithm in each of the rugged detectors checks potential alarms with PIR sensor and microwave Doppler radar for a consistent result. The area to be protected is thereby also secured from above by ceiling-mounted TriTech motion detectors. These detectors are located 4.8 meters above the museum floor, yet operate accurately and reliably. They thus exceed the range of standard ceiling detectors by more than two meters. In the event of an actual security breach, the Bosch G-Series system controller sends an alert, including the location of the triggered detector, in less than two seconds to the security team in the control room, which uses live images from a video system to verify the alarm. In most cases, tourists trigger an alarm when they cross a threshold to retrieve their cameras or smartphones that have accidentally fallen into the pit. In doing so, there is a risk of damage to the priceless terracotta warriors. But even if real criminals should ever get into the act, the system is ready. The TriTech motion detectors provide round-the-clock protection for the museum, which is visited by thousands of culture enthusiasts every day. Thanks to their discreet design, the detectors are unobtrusive and thus do not interfere with the museum experience. In accordance with the museum operator’s list of requirements, the intrusion detection system protects not only the museum, including the perimeter, as well as the visitor areas of the mausoleum, but additionally the cultural treasures currently stored in the unmanned warehouse.  

Read More

Elbit Systems Deutschland Selected by German Federal Police to Supply XACT nv33 Night Vision Goggles

Elbit Systems Deutschland was selected by the procurement office of the German Federal Ministry of the Interior, after a competitive tender procedure, to supply XACT nv33 night vision goggles (NVGs) for the German Federal Police. The special forces and special operation Units of the Federal Police are facing new threats and complex scenarios from organized crime and international terrorism. The XACT nv33 NVG will supports the officers in the fight against crime across Germany, as they will be equipped with the ability to operate during the nights, which is an essential requirement. This decision by the German Federal Police follows another satisfied German customer – the German Armed Forces – that are already using the XACT nv33 NVG in various missions. The XACT product family have already been selected by a number of undisclosed NATO countries among them Germany and the Netherlands, as well as the Israeli and the Australian Armed Forces. Thomas Nützel, CEO of Elbit Systems Deutschland, commented, “After the establishment of our night vision systems with the German Armed Forces, we are very proud to serve the German Federal Police in the field of electro-optics. Our image intensifier goggles will expand the capabilities of the federal officers and support them in the fight against crime”. The XACT nv33 is a lightweight binocular image intensifier that can be mounted on a wide variety of helmets and can be used head-mounted or hand-held. Its compact dimensions and its lightweight and the capability to use the system to drive a vehicle in absolute darkness will further increase the operational capabilities for federal officers and better align their readiness for future security requirements.  

Read More

Chemistry That Can Save Lives

It’s a stressful moment for drivers when suddenly thick, black smoke billows up from the hood. But usually there’s no reason to panic. Car manufacturers have long ensured that a small fire, even one on the interior, doesn’t burst into a full-blow blaze. Typically it takes several minutes for an entire car to go up in flames. That’s generally enough time for driver and passengers to get out safely. All this is made possible by chemical flame retardants in materials, which inhibit or delay the combustion process. They can be found in plastics such as polyurethanes, that car manufacturers use for the seat upholstery, roof lining, rear window shelf and side trim panels. A reliable partner for such applications is LANXESS, in particular its Disflamoll® and Levagard® products. They ensure car manufactures can comply with the horizontal burning rate norm. The global standard for the interiors of cars and busses makes sure a fire spreads horizontally at a maximum rate of 102 millimeters per minute. So how does it work? In case of fire, the flame retardant forms a protective carbon layer on the material. This prevents oxygen and warmth from penetrating the lower layers of the material and keeps the flame from spreading. Ideally, the retardants ‘self-extinguish’ and the fire smothers itself, an effect that, if needed, can save lives. LANXESS is a leading specialty chemicals company with sales of EUR 6.8 billion in 2019. The company currently has about 14,400 employees in 33 countries. The core business of LANXESS is the development, manufacturing and marketing of chemical intermediates, additives, specialty chemicals and plastics. LANXESS is listed in the leading sustainability indices Dow Jones Sustainability Index (DJSI World and Europe) and FTSE4Good.  

Read More

Manawa Networks Relies on Invixium to Provide Staff with Touchless Healthy Access Control

Invixium, a lading global player in touchless biometric solutions, has been chosen as a biometric supplier by Manawa Networks, a Canadian managed IT services provider, to enhance security at the company’s headquarters. Due to the ongoing COVID-19 pandemic, Manawa sought to upgrade its current security system to include touchless temperature screening as a way to protect staff, visitors, customers, and the community from illness. As an essential service, Manawa and its staff need to continue working throughout various stages of lockdown and pandemic-response measures in Ontario. Manawa provides its clients with IT strategy, management, monitoring, and other critical infrastructure services 24/7. Many of their clients’ needs increased in complexity because of the pandemic, as businesses began to allow employees to work from home full- or part-time. The demand on IT service providers like Manawa remains high, so its management came to the realization that the company needed to invest in creative, intentional solutions to keep their staff healthy and office open. Prior to COVID-19, Manawa was already using fingerprint biometrics for access control at their office. Invixium’s launch of IXM TITAN with Enhancement Kit presented an opportunity for Manawa to upgrade from their existing fingerprint system to touchless facial recognition for access control with health screening measures. This selection was made with hygiene in mind to limit the number of surfaces touched as staff gains access to the office. Touchless temperature screening is the hallmark feature of this access control installation because it offers Manawa’s staff an increased sense of security when they need to be in the office. With the ability to work from home, it is now more important than ever for staff showing any symptoms of illness – including a fever – to stay home and not feel obligated to come to the office. If a person screens with an elevated body temperature, the door will remain locked, denying access and directing the person to return home until their fever subsides. Before installing TITAN, Manawa took staff temperatures using a temperature gun and logged results by hand in a logbook, which is a common strategy at small businesses like this one. However, this process left a large margin for human error, and management quickly realized that they needed something automated, contactless and highly accurate to track symptom data. The digitized temperature log kept by TITAN assures that every staff member’s temperature is screened. A transaction log that can be accessed at any time allows managers to use captured screening data for contact tracing when required. As an IT company, Manawa also utilized TITAN’s PoE and networking features to make installation easy, as well as RS485 connections to integrate with their existing AXIS door controller. Further, this installation required the ability to pull time and attendance data for any employee at any given time to calculate payroll. IXM WEB, Invixium’s software companion to its security solutions, solved this need with user-friendly records and web-based functionality. “We are an essential service whose job it is to keep other businesses working,” said Matthew Held, CEO at Manawa Networks, “If we have to go on-site to address our clients’ needs, we need to have the peace-of-mind that our visit is safe for our staff, customers and community. As a business owner, I aim to demonstrate that we are being forward-looking by doing our due diligence to ensure a healthy working environment. TITAN is well-suited to our needs because my staff knows that the door won’t open for them if they have a fever, so they can go home to rest or work safely.” “Invixium offers the most modern solution for healthy access right now,” said Shiraz Kapadia, CEO & President at Invixium, “Business owners take on a lot of risk and liability by keeping their doors open in these uncertain times. When a business is an essential service, they must do all they can to make their staff and customers feel confident that they are not spreading illness at their office and beyond. With solutions like ours that provide fast, accurate and traceable health screening, managers can achieve this in a very effective way.”  

Read More

2021 Will Be All About Protecting Your Data

Nikhil Korgaonkar, Regional Director, India & SAARC, Arcserve Cyber Security Ventures predicts that global data storage will exceed 200 zettabytes by 2025. To understand the quantum of this you can say, if each terabyte in a zettabyte were a kilometer, then 200 zettabytes will be equivalent to approximately 260,000 roundtrips to the moon. This data will come from data stored on private and public IT infrastructures, utility infrastructures, private and public cloud data centers, personal computing devices such as PCs, laptops, tablets, and smartphones, and IoT (Internet of Things) devices. Protection of this data is most crucial for any enterprise. Even the strongest of firewalls don’t guarantee complete protection for enterprise data – the actual wealth of any organization. A forefront defense firewall is part of the drill, but there must be a foolproof data protection plan at the end. In 2021, enterprises will see the next phase of changes in data protection trends as they are experiencing tech-tonic shifts brought about by digital transformation in 2020. 1. Remote Workforce Security and Data Protection Gartner lists ‘securing your remote workforce’ as the topmost security project for 2020-2021. In the first quarter of 2020 when enterprises were forced to migrate their entire workforce to remote work almost overnight, IT became busy creating safe and efficient remote access to the enterprises’ files and applications. The focus was security from a network and data perspective. Due to the critical nature of data which was now cloud-based and distributed, enterprises had to rely on hasty and last-minute security infrastructures which opened doors to cloud-based attacks. Cybercriminals took full advantage of this disruption in the workforce norms and increased phishing and ransomware attacks on the remote workers. Today, remote desk protocol (RDP) is currently considered the number one attack vector for ransomware, and even virtual private network (VPN) appliances are not able to save the situation entirely. What enterprises need is data recovery resilience in the face of increasing cyberattacks and IT disasters. With more data getting stored in the cloud, companies will need to develop more robust plans that aggregate and protect distributed data in line with new vulnerabilities in 2021. At the same time, the IT teams must track and secure non-compliant and compromised devices as they are still being used in remote settings. 2. Customer Data Protection Initiatives I gnoring data protection and privacy norms is a blunder businesses can make especially when it comes to customer data. Research shows that almost 60 percent consumers will stop doing business with an organization that has experienced a cyberattack in the past year. The data also indicates that one in four consumers will jump ship to a competitor’s product or service after a single ransomware-related service disruption. That’s a steep price to pay for letting customers down, and it’s not a surprise that so many enterprises are taking steps to ensure they provide the highest level of data protection for their users. 2021 should see enterprises prioritizing user data protection in both new and existing initiatives. They are likely to make use of technology to detect and resolve internal and external threats to data security. At a broader level, the Indian government is in the process of finalizing its personal data protection bill. The bill is expected to establish a data protection authority to protect personal data of individuals and create a framework for processing such personal data. 3. Enforcement of Data Protection Regulations and Compliance Data regulations are important. They ensure enterprises follow the same set of standards when protecting, sharing, collecting or storing sensitive data. Around 66 percent countries in the world have passed their own national data protection laws such as the European Union’s General Data Protection Regulation (GDPR) and Singapore’s Personal Data Protection Act (PDPA). India is in the final approval stage of its data protection bill which is expected to be presented to the parliament this year. While countries are taking precautions and creating guidelines to create a safe data economy for their businesses and people, it’s unfortunate that enterprises don’t take it as seriously as they should. Companies, globally often don’t play by the rules and the annual cost of noncompliance to businesses runs at a staggering average of $14.8 million, according to a Ponemon Institute report. Interestingly, it is seen that the cost of compliance to an enterprise is often much lesser than that of non-compliance. As we move into 2021 and remote work and cloud adoption continue, it is hoped that enterprises will go in for an increased enforcement of regulations and data privacy laws. 4. Data Protection from New Ransomware Techniques Ransomware techniques will become more sophisticated and innovative. For instance, there will be ransomware ‘families’ that will refine their tactics, techniques and procedures to become more evasive and finesse their sophistication, targeting multimillion-dollar business. Then there will be an increase in the number of entry-level, apprentice-type ransomware attackers offering ransomware-for-rent, or ransomware-as-as-service, allowing targeting of high volumes of smaller prey. ‘Secondary extortion’ will increase where attackers steal and threaten to publish sensitive or confidential information if their demands are not met. This brings us back to data protection. Ransomware and other cyberattacks will not stop. An enterprise can deal with all kinds of ransomware attacks provided it has invested in data protection and recovery. According to a recently released Sophos 2021 Threat Report, organizations are hard-pressed to predict the evolution of cyber threats because ransomware gangs are constantly devising new tactics to hold critical data hostage and solicit ransom payments. Enterprises, therefore, must take a proactive approach through an integrated first and last line of defencs that offers ransomware prevention, detection and removal, and if automated data restore to on-site and cloud targets. Integrating cybersecurity and data protection as a coordinated deployment is critical for an enterprise. Arcserve’s new X Series Appliances integrate both and are designed to create a robust system scalable for enterprise data centers. These appliances uniquely combine deep learning endpoint protection and on- and offsite disaster recovery with over…

Read More

Luxury Greek Resort Receives 5-Star Fire Protection

Based in the coastal town of Ierapetra in Crete, the Robinson Club is designed around ‘neighbourhoods’ of hotel rooms across a 150 acre-site. This unique layout meant that the fire system specified needed to deliver seamless detection and notification of a potential fire to the hotel’s staff and guests, who could be located anywhere across the 340 rooms and suites, multiple restaurants, spa facilities and conference rooms. Responsible for the design, supply and installation of the fire detection, extinguishing system and firefighting equipment at the 5-star Robinson Club Ierapetra were Advanced partners, Zarifopoulos. In total, Zarifopoulos installed 14 of Advanced’s industry-leading Axis EN fire alarm control panels on a high-speed, fault-tolerant network alongside over 900 notification and detection devices including detectors, call points and sounders. Spilios Alexopoulos, Commercial Director at Zarifopoulos, referring to the state of the art system as well as the special attention that has been paid to the fire protection of the luxurious Robinson Club Ierapetra, commented, “Its widespread nature required a high-speed network of fire alarm control panels to ensure instant notification of a fire event. As a long-term partner of Advanced, we knew the company’s solutions offered the high levels of performance and reliability required, combined with ease of use and installation.” Axis EN is EN54 parts 2, 4 and 13 approved and its panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop panels in 200 node networks covering huge areas. Advanced products’ ease of installation and configuration as well as the range of peripherals available make it customisable to almost any application. Vladimir Zrnic, Regional Sales Manager for Southern Europe, said, “In large-scale sites such as the Robinson Club, Ierapetra, it’s vital to ensure that the panels, when networked, will sustain adequate performance levels. As the number of panels and peripherals on a network increase, some systems can slow down dramatically, compromising safety and reliability. “Advanced’s fire panel networks are widely regarded as some of the most robust and resilient in fire situations. Axis EN panels can be configured into networks of up to 200 panels in standard or fault-tolerant configurations, while sophisticated cause and effect and intuitive, easy programming of rules make implementation effortless.” The Robinson Club Ierapetra resort opened in the summer of 2020 and is one of its German owner, TUI Group’s, largest investments in Greece. Designed with preservation of the natural environment in mind, the hotel offers a minimalist, high-end experience for its guests. Advanced, owned by FTSE 100 company Halma PLC, protects a wide range of prestigious and high-profile sites across Southern Europe – from Istanbul’s Hagia Sophia and the Romanian National Library to Serbia’s University of Belgrade. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.  

Read More