securitylinkindia

Missouri DOT Selects Rekor Systems’ Advanced AI-Driven Solutions to Improve Highway Congestion and Reduce Traffic Fatalities

Rekor Systems, Inc., a global AI technology company with a mission to provide data-driven insights that build safer, smarter and more efficient cities around the world through intelligent infrastructure, recently announced that Rekor has been selected for the launch of a multi-year program with the Missouri Department of Transportation (MoDOT) to not only make roads less congested and safer, but to help rid the state of severe traffic crashes – all key objectives of Missouri’s Show-Me Zero Strategic Highway Safety Plan 2021-2025. The program is a result of a $719,000 grant from MoDOT’s Advanced Transportation and Congestion Management Technologies Deployment Program (ATCMTD). CV data has become a crucial component of traffic management across the globe, making its accuracy all the more important. As part of the program, Rekor expects to deploy over 100 of its edge-based processing systems and new optical roadside sensors along the roadway and integrate the real-time data from those sensors with a combination of CV data, telematics, dashcam video analytics, and real-time weather. Rekor can then leverage AI & machine learning algorithms running on top of this data to find traffic incidents faster than traditional means of incident detection and identify areas of high crash risk with the mission of improving safety on MoDOT roadways. The roadway of focus for the program is I-270 North, which has a higher severe crash rate than comparable roads in the region, with the eastbound span showing an average crash rate that is 30% higher than the statewide average. Rekor’s AI-driven solution will capture nearly 100% of all traffic on critical segments of I-270 in north St. Louis County and, with its data partner network, will deliver more than two billion additional monthly data points to the State’s existing data resources to drive improvements. “This project is unprecedented in scope and scale and provides a definitive ‘ground truth’ view of the data being captured on roadways by connected vehicles and other sensors,” said Rekor President, David Desharnais, “Rekor’s Transportation Management platform is uniquely capable to manage this level of real-time data capture while providing insight to help MoDOT address roadway safety and congestion in an entirely new way.”  

Read More

Securiton Fire Protection for the Suez Tunnel

Egypt has made great efforts in terms of infrastructure expansion in recent years. Several new tunnels under the Suez Canal connect the Sinai Peninsula with the African mainland. A number of fire detection systems from Securiton provide reliable, effective protection in the new Ahmed-Hamdi Road Tunnel II and associated infrastructure. September 2021 saw Egyptian President Abdel Fattah Al-Sisi inaugurate the Ahmed Hamdi Tunnel II, a road tunnel running under the Suez Canal. The Ahmed-Hamdi Tunnel II represents yet another link between Africa and Asia: the 4.25km long two-lane tunnel, which runs parallel to the Ahmed Hamdi Tunnel I, which has been in existence since the 1980s, connects the Sinai Peninsula with the city of Suez. This latest canal underpass is the sixth link between the eastern and western Suez Canal region, five of which have only been completed in the last two years. Before that, the Ahmed Hamdi Tunnel I was the only way of getting from one side of the canal to the other underground without taking a ferry – ferries have linked the Sinai and the African mainland since the opening of the Suez Canal in 1869. In addition, a high road bridge over the canal was inaugurated in 2001. Top-class fire protection The Ahmed-Hamdi Tunnel II was commissioned by the Armed Forces Engineering Authority, which underlines the importance of the construction project. The road tunnel, service tunnel and associated service buildings are protected by high-quality fire protection supplied by Securiton. Ten-plus kilometres of SecuriHeat LIST sensor cable provide highly sensitive tunnel fire detection. The Egyptian authorities place their trust in the tried-and-tested linetype heat detection system for tunnels and industrial facilities. Deployed around the world, it was developed by Listec GmbH, which is part of the Swiss Securitas Group. The installation was implemented in partnership with local Securiton partner Deutschland Technology. In addition to tunnel fire detection, Securiton has equipped facilities around the Ahmed-Hamdi Tunnel II with other equally effective fire detection solutions – the service buildings, pump facilities, firefighting systems and emergency shafts located east and west of the Suez Canal are monitored by a range of Securiton fire protection systems, including 12 redundant, modular SecuriFire 3000 fire detection systems, 230 SecuriStar MCD 573X combined smoke and heat detectors and four SecuriSmoke ASD 535 aspirating smoke detectors.  

Read More

Security Against Fuel Theft

Founded in 2002, Portugalenses Transportes, Lda became one of the leading transport companies in Europe. A fleet of over a hundred trucks operates all over Portugal and makes daily deliveries to Italy, the South of France, and Spain. The company aims at rapid growth, like expanding its fleet to 150 vehicles by the end of 2022, so the management focused on cost efficiency by addressing security issues. Challenge Protect vehicles against fuel theft and monitor the refuelling process The transportation market is highly competitive. The control of costs and resources is essential not to weigh down the financial results of a logistics company. Due to increased fuel thefts, Portugalenses Transportes contracted with professionals to find a security solution to improve control and cost efficiency. The Oliveira&Canha installation company has developed a pioneering customised solution based on an Ajax security system. Protect millions of litres of fuel One truck’s fuel tank is 1,400 litres on average. With 100 vehicles, and fuel price fluctuating around 2 euro, regular fuel thefts (up to 10 per month) cost Portugalenses Transportes up to 150,000 euro per year. Protecting fuel tanks in rest, parking areas, and gas stations and monitoring the refuelling process could save this money. Solution A customised fuel tank cap with in-built magnetic opening detector To find a solution, Portugalenses Transportes contracted with the Oliveira&Canha, a security services and installation company. The installer developed and patented a fuel tank cap customised to prevent losses. Featuring a built-in magnetic opening detector – Ajax DoorProtect – this cap can activate Ajax StreetSiren and instantly notify the driver and the company control centre about opening the tank. The new device has successfully passed all the quality tests, considering several issues such as preventing fuel losses or the electronic circuit isolation. “Oliveira&Canha, Lda has developed a solution adapted to our needs and implemented it with the greatest efficiency and professionalism, becoming a reliable and essential partner in our company day-to-day” Luís Sousa Fleet Manager, Portugalenses Transportes, Lda How it works Every protected truck has an Ajax Hub 2 (2G) control panel connected to the vehicle battery via Ajax 12V PSU. The hub uses 2G networks to communicate with the company control centre.. In case of alarm, the control panel activates the siren, sends notifications to the Ajax app on the driver’s smartphone and the Ajax PRO Desktop monitoring app at Portugalenses Transportes control centre. To open the fuel tank at a gas station, the driver needs to disarm the system with the Ajax SpaceControl keyfob or via the app, and arm it back when refuelling is done. Thus, every refuelling process is logged. Notifications on the hub security state are transmitted instantly in real time. With a vehicle ID assigned to every hub, operators can collect data for analytics. The vehicle security system includes the Ajax StreetSiren outdoor sounder. Experience shows that a loud Ajax StreetSiren alert works perfectly to deter thieves in rest and parking areas. Why Ajax Wireless devices with reliable communication. Free mobile and desktop apps. Instant notifications and event log. Quality technical support. Client-oriented development. Actual outcomes Portugalenses Transportes has installed Ajax security systems in 60 trucks and now incorporates this solution in its growing fleet. So far, the company has observed such outcomes: Increased security. Cost savings. More control and efficiency. “Ajax has been our choice for its reliability, price/quality ratio and ease of use. Since the beginning of our relationship with Ajax, we have seen continuous product development with constant improvements and updates, increasing our confidence in the Ajax brand. Thanks to its versatility, it has allowed us to develop solutions for our clients” Miguel Oliveira CEO, Oliveira&Canha, Lda An Ajax security system protects vehicles and drivers against theft and danger. Instant notifications, a loud siren, a panic button on the keyfob, and mobile and desktop apps work perfectly to deliver comprehensive security. Monitoring and security reduced 90% of fuel thefts, saving money enough to buy one brand new truck per year. The implemented solution helps the company to carry out analytics, which provides management with the ground to make relevant decisions for the business.  

Read More

Using Thermal Technology to Monitor Traffic in Neuilly-Sur-Seine

The city of Neuilly-Sur-Seine is home to Avenue Charles-de-Gaulle (RN13), an urban expressway which is frequented by c.130,000 vehicles per day – from small cars to large buses and trucks. The avenue serves as a connection from Paris to the business district of La Defense and is one of the busiest motorways in France. To get this avenue keep on thriving, the municipality started in 2019 a major modernization project called ‘Les Allées de Neuilly.’ CHALLENGE: Traffic management for a busy urban expressway Neuilly-Sur-Seine began a project in 2019 with the view of turning this urban expressway into an accessible, calm and welcoming boulevard lined with trees and walkways and pavilions to encourage soft mobility and local business development. Since the city is home to the headquarters of many businesses, the civil works of the project must be achieved without compromising on the road’s capacity for traffic flow in and through the city. Expected to finish in 2024, the project will result in a nice boulevard that guarantees transit capacity between Paris and La Defense for all types of mobility – vehicles, cyclists and pedestrians. The project requires rearranging the 10 hectares that Avenue Charles-de-Gaulle occupies. Reconstructing such an infrastructure is no easy feat, and getting it right is key to the everyday functioning of the city in the future. It is also important that whilst the project is underway, the routes and traffic aren’t entirely disrupted. To adequately plan for traffic diversions and the potential impact this could have on daily commuters, the potential adverse effects to motorists and their safety need to be measured, and for this you need reliable traffic data. This is where Wintics came in. Wintics is a Hikvision Technology Partner that uses artificial intelligence (AI) to turn video stream into insightful data with the vision “to make mobility a safer, more reliable and more sustainable experience.” SOLUTION Hikvision’s thermal cameras integrated with traffic analysis software Wintics Cityvision software installed at Neuilly analyses video stream from 5 Hikvision thermal cameras. Cityvision uses AI to measure, analyze and visualize traffic data from the boulevard to assist in measuring the state and type of traffic as well as how and when people use the 10 traffic lanes. Once the project is complete, the installation will also assist the city in monitoring traffic to measure its positive impact and changes in travel methods. To ensure the maximum reliability of its software, Wintics needs correct cameras to connect to Cityvision. This is where Hikvision cameras contributed to the solution. In May 2020, Wintics chose Hikvision thermal cameras (DS2TD2136) to integrate with its own software to film the traffic lanes, which then feeds into the Wintics system, which can differentiate between cars, motorbikes, buses, and other vehicles, producing real-time data with more than 90% accuracy. Wintics used Hikvision cameras for several reasons. Firstly, Hikvision had the perfect balance between competitiveness and quality on the market as Hikvision offers reliable and consistent products. In fact, Wintics usually defers to Hikvision cameras for its installations. Secondly, the company opted for thermal rather than optical cameras for this case because thermal cameras solve an inevitable problem for optical cameras capturing traffic images – glare! Optical cameras may capture the glare from oncoming headlights, and strong sunshine, resulting in an obscured image, which in turn can obscure the data and analysis. Thermal cameras on the other hand don’t capture light at all, only heat – ruling out the possibility of glare obstructing the camera’s function. Thermal cameras also have an edge for potential GDPR issues. Since only the vehicle is recorded, the faces of drivers and their license plates are indecipherable. Where privacy is concerned, erring on the side of caution is made easier by using thermal cameras. Another plus to using thermal cameras is that they generally require less bandwidth to operate than optical cameras, making them an ideal solution if bandwidth is a potential constraint to effective operation. RESULT: Accurate vehicle counting and classification Quentin Barenne, co-founder of Wintics said, “We’ve audited the whole system, and it resulted in over 90% accuracy – not only for counting the vehicles, but also in classifying them into different categories. By integrating Hikvision’s thermal cameras with our own AI application, I can now confidently discuss next steps for improving the safety of the road.” This installation is just one example of how Hikvision products can be easily and effectively integrated for various needs, creating intelligent, flexible solutions for many challenges – getting the most out of technology.  

Read More

Securing the New Age Workforce in Post-Pandemic Era

“What Identity and Access Management (IAM) means for businesses in today’s complex digital world “ Matthew Lewis Director of Product Marketing & Identity and Access Management, HID Global In today’s competitive and dynamic markets, organizations face numerous difficulties, such as adjusting to regulatory requirements, securing organizational needs, and implementing stronger security models. The expansive role of digitisation and rise of remote work has further pushed the need to adopt a holistic approach to securing identities while accessing data, infrastructure, and applications. This can range from zero-day threats bypassing conventional security models to the expansive role of digitization and rise of remote work. Propelled by COVID-19, the global workforce had to relook at how remote work models function, thereby normalising distant work and adding a new dimension to professional engagement. According to a Frost & Sullivan analysis, organizations will not return to pre-pandemic operating models and will continue to adjust the remote and hybrid work model over time. Organizations are facing an increased requirement to implement new rules for securing work resources and secure data access points as this technology proves to be a game changer. Several enterprises have seen a significant change in how they conduct business as a result of the global pandemic. In particular, technological implementations that were originally planned to take three to five years to complete are now commonly being adopted almost overnight. The cloud is one of the major factors responsible behind the developments, with businesses increasingly recognising its importance in its technology infrastructure. However, as more businesses move to the cloud, the danger of malware assaults and data leaks increases, as well as new difficulties in achieving compliance. The traditional security model has lost relevance over the past two year. Now, an organization’s security fence extends beyond on-premises networks with SaaS applications being leveraged for business, IoT devices being installed everywhere, and employees accessing corporate resources from various locations and networks. So, what does it take for a corporation to migrate to the cloud while maintaining a secure foundation? Perhaps the most serious threat to organizational security is related to identity, necessitating the establishment of policies governing user authentication and validation. This helps in cases where users with higher privileges or dormant accounts become easy targets for infiltrating or launching a malicious attack into an organization. Identity and Access Management (IAM), a critical component of a Zero Trust strategy, is designed to assist organizations in authenticating devices, technologies, and network infrastructure. This framework is based on features such as Multi-Factor Authentication (MFA), Single Sign-on (SSO), and granular permissions, which establishes data access privileges, secures access for cloud services, and protects critical login/entry points. One of the most significant challenges in establishing Zero Trust is putting it into practice. This is because legacy security models often impede the transition to supporting remote work, making it difficult to retain legacy IT security tools and architecture. To implement Zero Trust, organizations must assess workflows and business processes, as well as identify patterns in how users interact with those flows. This should lead to the implementation of appropriate controls in accordance with the identified risks to help secure the organization. As a result, it is critical to consider the user experience throughout the planning and implementation process. In today’s world, users expect quick, easy access to applications, whether on their mobile devices or work systems. Another important point to remember is that a mismatch between an employee and a company’s critical systems can result in compromised security due to neglect, wrongful behaviour, or violations. To determine implementation sequences and tools in line with the company’s risk profile, Zero Trust must be established based on organizational requirements and its industry. In 2022, cybersecurity will play a significant and growing role in boardroom agendas, with a focus on identity and authorization. Establishing identity-centric and minimal privilege access control, for example, may be preferable to micro-segmenting networks or enforcing Zero Trust network access across managed and unmanaged devices. Faced with the complexity of managing identities in globally distributed companies, Zero Trust remains a lofty goal. Creating a planned roadmap that takes into account the risks posed to your organization is a great first step. Partnership with vendors, whether for affiliating current technology with future goals or addressing multiple requirements at once, can also greatly simplify your journey. According to a Gartner report, 30% of large organizations will have publicly shared their environmental, social, and governance (ESG) goals with a focus on cybersecurity by 2026, up from less than 2 percent in 2021. The goal is to improve security, but ultimately, companies want to deliver better business results, and Identity and Access Management (IAM) planning and governance is a big step along the way.  

Read More

How to Put on a Vacation. Safety Regulations: CEO’s Security Check-List

Alexey Parfentiev, Senior Business Analyst, SearchInform Once we’ve conducted a research, which aimed to obtain, if employees in various companies are acknowledged with information security rules. Among others, there was the following question – “would you share your login/ password with colleagues while you are on a vacation?” Only 6% of respondents answered in the affirmative. This number seems encouraging, but it’s important to understand, that usually people tend to give ‘correct’ answers in the test in order to seem a bit ‘better,’ than they are in the real life. So, what’s the situation like in real life? In fact, people often are not only ready to share their passwords, but they sometimes make notes, in which they write down all the information on a paper beforehand and leave these notes in places, where these papers will be definitely found. The reason for that is very simple and understandable: people just want to be left alone during a vacation. isky. On the contrary, this is believed to be a responsible approach – employee has thought about partners and clients in advance. But in fact, it’s only self-deception. There are lots of cases in our clients’ practice, when such kind of ‘generosity’ has lead to disclosure of information. What’s more, less frequently, but still not so rare, access to other peoples’ accounts is used for real ‘setups.’ In order to avoid such situations some information security specialists prefer to react in a radical manner. With the help of special software they block all processes on employee’s computer during the vacation time, in case the person, who logs into the account, isn’t the account owner. This method in modern business-circumstances is too strict, that’s why it’s better to control, than to block. The question arises, what is required to do, before employee may start a vacation? Case study Information security specialists detected suspicious activity on the computer of employee, who was on a vacation at that moment. It was found out that before the vacation, the employee gave access to his account to his colleague ‘just in case.’ According to company’s internal regulations such ‘password transmission’ was strictly prohibited. Some confidential data was stored on the employee’s computer, and in case of leakage, there was a high probability, that company would have experienced serious financial and reputational losses. Luckily, data leak incident didn’t occur, and the careless employee had to face a serious conversation. Make sure, that access system is configured appropriately ‘ Appropriately’ means, that some particular employee can obtain info only in his/ her part of information disk, CRM base and tasks, line manager – his/ her own and department employees,’ CEO – all employees.’ In this situation employee simply doesn’t have to share account info with colleagues. All employees, who may need this particular employee’s documents, and who, at the same time, have enough powers to work with them, have access to the documents. This piece of advice may seem obvious, but in fact, access hierarchy is not set up appropriately in many companies. This results into arise of emergency calls with the request to ‘urgently send login/ password.’ Make sure, that employee hasn’t ‘shared’ information in advance In order to be able to work remotely, many workaholics try to provide themselves with all necessary information and accesses. The tricky moment is that public cloud and free private email, as well as flash drives, which are the most popular storages of transferred information, don’t provide secure way of data retention. ‘Timely’ storages are usually forgotten quickly, and confidential data may be stored in the clouds for ages without real necessity and without appropriate level of security esurance. What’s more, users often even forget to block public access to them, don’t care about data encryption. This situation was depicted with the incident with massive leak from Google.docs, which took place last summer. Internal instructions, documents, containing passwords and reports (including ones of very well-known brands) were published on the Internet. So, any form of corporate posture in public services should be prohibited in the company, and info, addressing this forbiddance, should be explained to the staff. Facts of deliberate leaks are easily detected by well-developed DLP-systems. Ensure security, if employee has to work with corporate info using unverified Wi-Fi hotspots Some employees have to take a corporate laptop with them during a vacation. It’s crucial to ensure, that the employee won’t have to worry about internet-connection security. In order to deal with this task, use VPN. IT-service staff should be ready to set up VPN, thus, employee will have the opportunity to work outside the office without risk of exposing data to danger. Make sure, that no one logs into employee’s account This may be implemented in different ways. First of all, IT-specialists may block employee’s account during the vacation time in active directory. This way has one drawback – even legal access will be banned too. Some say, there are companies, which organize vacation for the whole team during the period of summer decrease in business activities. However, this is a really exotic situation. Most companies can hardly stand pause in business-processes for such a long term. Another option, which is more efficient, is to set two-factor authentication, when apart from usual ‘login + password’ system requires something else, for example, code from SMS. Nowadays, two-factor authentication function may be added to practically all modern services, including CRM. This measure helps to be more sure, that the account owner is the one who logins in the account. In case this employee has a temporary deputy (we mean that deputy is in charge during his chief’s vacation), deputy’s phone number may be added to the CRM-system. In case something suspicious or illegal happens, it will be possible to identify the violator by monitoring of ‘logs in.’ Still, it’s not a 100% guarantee, because employee may be very creative. In this relation, more advanced software product – DLP-system may help. This system may be configured the way it takes photoshoots…

Read More

Everbridge Selected by State of Maharashtra, India’s 2nd Most Populous State, to Provide Emergency Preparedness and Response Solution

Representing the seventh statewide deployment of Everbridge in India, the Maharashtra win underscores the company’s global leadership in Public Safety and Crisis Preparedness with countrywide contracts in APAC, EMEA, and the Americas Everbridge, Inc., the global company in critical event management (CEM) and national public safety software solutions, recently announced that the Indian State of Maharashtra selected the company’s Incident Response Solutions to help governments plan for, respond to, and recover from any disaster. Home to a combined 150 million residents and annual tourists, Maharashtra is the second-most populous state in India, and its capital Mumbai is the most populous city in the country. The Government of Maharashtra chose Everbridge’s Previstar Continual Preparedness System (CPS) solution to help the State’s Relief and Rehabilitation Department to create dynamic plans, manage disasters, and provide decision support along with situational awareness throughout a critical incident’s life-cycle. In doing so, Maharashtra becomes the seventh state in India to adopt Everbridge’s Public Safety solutions, along with Andhra Pradesh, Kerala, Odisha, Uttarakhand, Gujarat, and West Bengal. Following crises such as massive floods in 2021, Maharashtra undertook an initiative to implement an Incident Planning and Response System that would bring together stakeholders and support agencies including Police, Fire, Public Works, and Health under one platform, and to provide one common operating picture, to respond to any disaster in a unified manner. The State partnered with Everbridge to leverage its Previstar CPS to create a comprehensive incident management platform that puts their plans into action, tracks activities, mobilizes resources, and enables decision support. Speaking during the recent Maharashtra Day, Governor Bhagat Singh Koshyari mentioned the State’s vision to achieve Zero Death by operationalizing a statewide Incident Response System (IRS). “We are honored to support Maharashtra on the evolution of its statewide emergency preparedness and capacity building as the government institutionalizes an Incident Response System,” said Valerie Risk, Vice President of Public Safety Solutions at Everbridge. Himadri Banerjee, Global Director of Everbridge’s Previstar said, “As we have demonstrated in India and in countries around the world, our public safety platform promotes effective disaster management and greater safety for the millions of people living in the region.” The deployment of Maharashtra’s emergency/ disaster management system expands on Everbridge’s position as the global leader in population-wide Public Warning and Public Safety Solutions. More local, state, and national governments across the globe deploy the Everbridge Public Safety solutions than any other provider, offering government agencies with the ability to save time and save lives. The Everbridge platform reaches residents and travelers in more than 200 countries and territories in case of natural disasters: such as floods, severe storms, volcanic eruptions, earthquakes, and wildfires; manmade threats: such as geo-political, terrorist attacks, and industrial accidents; and digital threats: such as ransomware, cyberattacks, and IT disruptions.  

Read More

Tata Tele Business Services Recognized as the: Enterprise Service Provider of the Year 2022- at ET Telecom Awards

Tata Tele Business Services (TTBS), leading enabler of digital connectivity and cloud solutions for businesses in India has won the prestigious ‘Enterprise Service Provider of the Year’ award at the ET Telecom Awards 2022. This award recognises the companies which have been working closely with enterprise customers to help drive their businesses successfully. Recognised as the Enterprise Service Provider of the Year 2022, TTBS has always strived to bring the best technology and services to businesses that enable them to improve processes, reach customers more effectively, and enhance their productivity. TTBS has maintained a progressive approach of partnering with enterprises as a technology enabler by providing innovative solutions that allow enterprises to be resilient and maintain business continuity in a flexible, scalable, and secure manner. “We are truly honoured and delighted to be recognised as the best Enterprise Service Provider in the country. At TTBS, our focus has always been on serving the evolving needs of the enterprises and help them build advance digital capabilities to compete and win in their respective businesses. This award reflects our organizational purpose of accelerating adoption of digital technologies by businesses aspiring to Do Big and creating enduring partnerships” Vishal Rally Sr. Vice President – Product and Marketing, Tata Teleservices TTBS has taken several initiatives in the recent times to empower enterprises with innovative and reliable solutions as they move up the digital transformation curve. The company has strengthened its portfolio of enterprise grade solutions such as Smartflo – an advanced cloud communication suite; SmartOffice® – a one-box startup kit with voice, data, apps and storage, SD-WAN iFLX – an intelligently flexible solution (built on Fortinet’s platform) for network optimization, EZ Cloud Connect – a dedicated private network gateway to public clouds, Ultra-Lola – point to point connectivity with latency in microseconds for brokerage/ BFSI firms, Smart Internet leased line with built-in cloud security and manageability, collaboration solutions, IoT solutions, cloud applications, and a comprehensive suite of cyber security solutions across industries. It has also partnered with Zoom Video Communications, Inc. to offer world-class unified communication solutions to enterprises. All these solutions appropriately address the needs arising out of a distributed and remote working environment and enable businesses to deliver superior customer experience.  

Read More

Forcepoint Brings Personalized Automation at Scale to DLP

Today Forcepoint is delivering greater personalization and automation to DLP policy enforcement while also directly addressing the huge data growth problems organizations of all sizes are facing. Personalized automation with Forcepoint DLP is enabling tremendous efficiency gains in managing security incidents. To help enterprises manage their data growth, Forcepoint is scaling up to 8x the data visibility capabilities that were previously possible. We already led the industry in simplifying visibility with over 1,500 pre-built out-of-the-box templates (3x more than our leading competitors) that made it much easier to quickly deploy and efficiently manage DLP. Additional scalability brings needed power to these capabilities to easily manage much larger, unwieldy data sets. Bringing personalized automation to DLP Organizations strive to identify data loss as it happens. But what if it was possible to identify data loss before it happens? That’s the idea behind something we call Risk-Adaptive Protection (RAP). On average, it takes organizations 287 days to clearly identify and then contain a data breach. RAP utilizes over 150 ‘Incidents of Behavior’ (IoBs) to continuously monitor users for risky behavior. It brings true zero-trust capabilities to DLP while delivering context, automation, and precision to DLP policy enforcement. In the same way that Forcepoint DLP (DLP Everywhere) covers all the main vectors of security or channels (endpoint, web, cloud applications, cloud web and cloud email) RAP will soon cover not only the endpoint but also cloud web, cloud email, cloud applications and removable storage. As one Forcepoint RAP customer stated, “She finds the capability …incredibly exciting by virtue of the fact that we can start to be much more targeted in our security.” Handling exponential growth of data both today and tomorrow The amounts of data that organizations create, ingest and very often lose track of has been growing exponentially for many years. That aggressive data growth shows no signs of slowing in the future. It’s estimated that by 2025, there will be 181 zettabytes of data globally. It’s hard to get our minds wrapped around how much data that is but if you just look at the number (18 1,000,000,000,000,000,000,000 bytes) it already looks huge. Put another way, if each grain of sand equaled one byte, then there would be around 7.5 exabytes of sand on the earth. 1024 exabytes = 1 petabyte and 1024 petabytes = 1 zettabyte. Data can be a tremendous resource – but organizations require visibility and control of all of that data. For organizations, that means going beyond knowing what data you have, to understand who’s using it, how it’s being used and where it’s being used from. Getting a handle on dark data For many companies, the ability to collect data far exceeds their ability to derive any use from it. In most cases the majority of data collected becomes dark data. Dark data is data organizations possess that remains unused. In other words, dark data is not being used to gain insights or make informed decisions. Why not just delete all this extra data? One reason of course is data is valuable – ‘the new oil.’ Many companies don’t simply delete dark data because a lot of it contains sensitive information which needs to be retained for compliance purposes. Due to compliance regulations, organizations are held responsible for all the data they acquire. Our new DLP capabilities help organizations shed light on dark data. Combining this scale with Forcepoint DLP capabilities enables customers to solve their dark data issues on two fronts. The first front is by dramatically increasing the amount of data that can be processed. Secondly, we’ve made it faster too. As an example, Forcepoint DLP simplifies things like compliance audits with its ability to handle up to 8x more data at 15x the speed. With out-of-the-box policies covering 86 countries and over 155 regions we can help customers with the most challenging regulations to successfully account for all the data they have at remarkable speed. With Exact Data Match (EDM), Forcepoint DLP now allows customers to fingerprint 5x more data (up to 100 million records or 600 million fields) to give them incredible visibility and control across their data. “We’ve fingerprinted almost 20+ million files with Forcepoint DLP and look forward to scaling that up to 100 million files in the near future.”  Elif Ahmetoglu, Information Security Manager, VakifBank Forcepoint DLP is also now able to retain 8x more incidents for forensics purposes. Bringing visibility and control to removable storage To round things out, Forcepoint is also announcing new device control capabilities. Forcepoint DLP already had ways of controlling data exfiltration to USB drives. Now, we’re adding important capabilities that allow for much stronger control of these ubiquitous storage devices that are regularly being plugged into endpoints. Data security admins can see exactly what removable storage device is being plugged in, what data is going into those devices, what data is coming into the organization from those devices and be able to apply simple controls such as allowing, read-only, and blocking.  

Read More

Fortinet Enhances the Industry’s Only True Converged Networking and Security Platform with New Suite of FortiGate Network Firewalls

Fortinet®, a global company in broad, integrated, and automated cybersecurity solutions, recently announced a suite of new FortiGate appliances that features ASIC-based performance acceleration and integrated AI-powered FortiGuard Security Services to support campus, branch, and hybrid data center environments. The new FortiGate 600F, FortiGate 3700F, and FortiGate 70F each feature Security Compute Ratings that offer better performance than competitive offerings. This means organizations that choose FortiGate realize better ROI, more scale to protect against advanced threats, and realize better user experience with a converged networking and security platform. Consistent networking and security convergence is key In today’s era of hybrid IT, the network is more important than ever to connect users, applications, physical locations, and multi-cloud environments. And as digital acceleration further drives the distribution of workers, devices, and data, the digital attack surface continues to expand. The ability of an organization to converge networking and security consistently across its physical and cloud locations will determine its success in securing the rapid expansion of these new edges. FortiGate Network Firewalls serve as the foundation of the industry’s most comprehensive converged networking and security platform powered by FortiOS everywhere to deliver advanced security that is seamlessly integrated with modern networking capabilities such as SD-WAN, universal ZTNA, LAN edge controllers, and support for 5G. And because FortiOS has been organically developed with both networking and security in mind, this convergence is available and consistent across all form factors, including appliances, virtual machines for multi-cloud deployments, containers, and SaaS. This makes FortiGate powered by FortiOS everywhere a powerful enabler of network modernization with security integrated across all parts of the network. New FortiGate network firewalls deliver converged networking and security to branch, campus, and hybrid data center environments FortiGate 600F Supports Today’s Dynamic Campus: The new FortiGate 600F series delivers a converged networking and security solution for campus edge deployments to support a Zero Trust Edge strategy. As enterprises balance their return to the office and support a hybrid workforce, rich media services such as video and application access must be included to support new growth initiatives in a hybrid IT model. To power today’s new, highly dynamic campus, Fortinet is bringing data-center-class capabilities to its mid-range line, including support for an average of seven times more connections per second than comparable industry offerings. These innovations are powered by Fortinet’s purpose-built Network Processor 7 (NP7) ASIC and include built-in 25GbE interfaces to stop the lateral movement of threats. FortiGate 600F also offers 7Gbps of SSL inspection with AI-powered security services enabled to eliminate network blind spots. FortiGate 3700F Delivers High-Speed Connections Between the Data Center and Multi-cloud: The new FortiGate 3700F secures data centers that are part of hybrid IT networks and are critical to an organization’s digital acceleration journey. As the industry’s only compact network firewall appliance with multiple 400GbE interfaces, FortiGate 3700F supports high-speed connections between the data center and multi-clouds to deliver an optimal digital experience for customers no matter where applications are hosted. With low latency at nearly two microseconds, it also supports high-frequency trading. Natively integrated ZTNA enforcement in FortiGate 3700F allows organizations to enact explicit application access to ensure that data and applications remain protected. When combined with our newly introduced in-line sandboxing service, FortiGate 3700F delivers real-time prevention of never-before-seen attacks with minimal impact on operations. FortiGate 70F Supports WAN Edge Transformation for Branch Offices: With FortiGate 70F, Fortinet continues to empower IT leaders to transform their WAN edge with SD-WAN, advanced security, advanced routing, and ZTNA enforcement capabilities in a single appliance that is right-sized for branch offices. FortiGate 70F has been re-engineered to enable alternative part sourcing as part of Fortinet’s strategy to remain resilient in the face of supply chain constraints. FortiGate and AI-Powered FortiGuard Security Services These new appliances integrate with all of the recently announced AI-powered FortiGuard Security Services introduced in FortiOS 7.2, including industry-first in-line Sandboxing, Advanced Device Protection for OT and IoT environments, outbreak detection delivering immediate alerts and threat hunting scripts for outbreaks, SOC-as-a-Service providing Tier 1 hunting and automation with options for Tier 2 and Tier 3 support, dedicated IPS, and in-line CASB. All FortiGuard Security Services are powered by trusted machine learning, artificial intelligence, and independent research from FortiGuard Labs, and integrate across the Fortinet Security Fabric to better protect against known and unknown modern attacks across today’s expanded attack surface. FortiGate 600F vs. Competitors Below is a comparison of the datasheet performance numbers of the top firewalls on the market against the target performance numbers of the FortiGate 600F series. Security Compute Rating is a benchmark (performance multiplier) that compares FortiGate performance versus the industry average of competing products across various categories that fall within the same price/performance band. Vishak Raman, Vice President of Sales, India, SAARC and SEA at Fortinet said, “FortiGate is more than just the most deployed network firewall in the world. It’s one of the top SD-WAN solutions on the market, a powerful LAN Edge controller and 5G controller, and delivers the industry’s only universal ZTNA enforcement. Most importantly, it’s the foundation of the only true converged networking and security platform available today. This convergence is over 20 years in the making and made possible by custom ASICs, integrated security services, and FortiOS, a single organically developed operating system shared across the Fortinet Security Fabric that is consistent whether on-premises or in the cloud.”  

Read More