securitylinkindia

Johnson Controls Acquires SES to Extend Access Control to Critical Infrastructure

Technology includes Bluetooth-enabled locks and mobile applications for the security of assets such as cellular and communication towers and sites The provision of local and off-site access via cellular adds to Johnson Controls robust access control portfolio Johnson Controls, the global company for smart, healthy and sustainable buildings, announced recently that it acquired Security Enhancement Systems LLC (SES), a provider of mobile-based, keyless access control solutions used in critical infrastructure, including telecommunication towers for major providers. “We are committed to providing the best and most complete access control solution to our customers,” said Sanjeev Singh, Vice President, Product Management, Johnson Controls Security Products Business, “This technology allows us to own the entire experience of secure and streamlined access to remote sites and critical infrastructure by service providers. Our customers will benefit from a single, trusted source for security solutions for corporate and other locations.” SES integration of mobile, cloud and on-premise technology provides a complete solution for multi-site security. SES has pioneered highly optimized and versatile locking solutions for remote sites that include diverse security needs for perimeter control, equipment, shelters and other valuable assets for telecommunication, utilities, transportation and data centers. “This combination validates our product realization efforts of the past seven years and we are excited that Johnson Controls will bring our technology into its product portfolio,” said Philip Ufkes, SES President and Founder, “This partnership will further benefit our current and future customers by providing a wide array of cost-effective security and productivity solutions.” SES will add to Johnson Controls’ comprehensive portfolio of security and access control technology available today including security and access controls, video management, security as a service, IP cameras, door controllers and card readers. Raymond James served as the exclusive financial advisor to SES.  

Read More

Entrust Recognized as a Leader in Global Holistic Transport Layer Security (TLS) Certificate Market by Frost & Sullivan

Entrust, a leading provider of trusted identity, payment, and data protection solutions, has been recognized by Frost & Sullivan as a leading TLS/ SSL certificate services provider. In a field of more than 10 global industry participants, Frost & Sullivan independently plotted the Top 7 companies in its analysis. Noting the company’s unwavering focus on high assurance certificates and disruptive innovation, Entrust received the highest score on the growth index, making it the second-largest Certificate Authority (CA) in the global holistic TLS certificate market with a 14.4% market share. As the report notes, it is imperative to maintain the chain of trust in public key infrastructure (PKI), especially as security compromises can lead to loss of credibility among customers. With more than 10,000 enterprise customers using Entrust solutions to enable trusted identities, payments, and data protection, the report highlights the company’s growth pipeline, including product development to address customer pain points. This innovation has delivered new use cases such as PKI as a Service (PKIaaS), Digital Signing as a Service (DSaaS), Verified Mark Certificates (VMCs), certificate lifecycle management and automation, and expansion of partner integrations, which drive TLS certificate usage and customer adoption. The Entrust technology roadmap supports expanded certificate usage, lifecycle automation, and ease of use and control, which will deliver faster time to value for customers. As such, the company has introduced more as-a-service use cases, such as PKIaaS and DSaaS. Additionally, the report highlights how Entrust product development is aligned with industry trends such as growing PKI adoption and proliferation of IoT devices, certificate management automation, and enterprise cloud adoption. “Entrust has secured the second-highest market share in the global holistic TLS certificate market. The CA has recorded consistent growth in the last three years, powered by a strong vision to keep the world moving safely by enabling seamless and secure transactions,” said Swetha Krishnamoorthi, Senior Industry Analyst, Frost & Sullivan’s Security Practice, “The growing volume and variety of devices deployed in organizations demand a correspondingly large number and types of certificates. Therefore, organizations prefer to have a single-stop destination for all types of certificates to reduce the complexity of certificate lifecycle management. Entrust offers an extensive portfolio that includes certificates such as DV, OV, EV, S/MIME, digital signatures, qualified certificates, code signing certificates, and IoT certificates. In addition, Entrust Certificate Services (ECS) platform is CA-agnostic. It offers a seamless and single-pane-of-glass user interface to manage multiple certificate types across both on-prem and cloud-based environments. Entrust has consistently demonstrated its commitment to innovation, thereby recording a high score on the innovation index of the Frost Radar.” Frost & Sullivan also pointed out that Entrust is the only vendor in its study to offer a Cryptographic Center of Excellence to accelerate PKI and cryptography discovery, strategy, and management efforts. Entrust is also one of the two vendors reviewed offering Verified Mark Certificates to support strong identity in email. “With over 50 years of experience in providing solutions for high-trust environments, it’s pleasing to see this report acknowledge that our offerings are built on top of a robust infrastructure and that highly security-conscious organizations such as Microsoft, Visa, Mastercard, VMware, and more rely on Entrust for their PKI needs demonstrates the reliability we offer,” said Jay Schiavo, Vice President of Products for Certificate Solutions, Entrust, “This recognition from Frost & Sullivan reinforces the fact that our TLS/ SSL encryption protection goes beyond the certificate. Rather, we continue to innovate an advanced certificate management solution to provide security beyond the certificate.”  

Read More

Dahua Technology Launches Thermal Monocular Camera Series to Make Outdoor Tasks Handier

Dahua Technology, a world-leading video-centric smart IoT solution and service provider, just launched its Thermal Monocular Camera Series – M Series. They are handheld cameras tailored for outdoor scenarios such as hiking, wildlife conservation, search and rescue missions, hunting, etc. M Series provides three model options (M20, M40 and M60) based on the image resolution of the cameras, while each of them includes multiple models with different lenses to meet diverse customer needs. With an industry-leading 12μm Vox sensor, the maximum resolution can reach 640×512. This innovative series could be the handiest high-quality device for thermal imaging-related tasks in the field, and here are the reasons. Reliable under tough outdoor conditions The ergonomic design of the M Series realizes the comfortable handheld experience and convenient operation. These cameras meet the IP67 standard of Ingress Protection Rating, pass the 2 meter drop test, and function under temperatures of -20° to 55°, which means they can work steadily in tough environments. Even under harsh weather, the M Series is able to capture sharp thermal images at a smooth and stable frame rate and produce clear and detailed visuals of running targets and moving vehicles. Thanks to advanced thermal imaging technology, the series can detect animals and objects in complete darkness, haze, or through glaring light. M Series’s weight ranges from 350g to 500g. Its internal lithium battery supports up to 9 hours of battery life (tested at 25°C) and a USB cable power supply. These make the Dahua Thermal Monocular Camera Series ideal for outdoor applications and easy to be recharged in the field. Advanced intelligence to meet various needs M Series offers a choice of four color palettes to meet users’ observation needs in different scenarios. ‘White Hot’ is suitable for observing active targets, ‘Iron Red’ can improve the comfort of long-term observation under night conditions, ‘Rainbow’ is convenient for users to quickly identify targets, and ‘Alarm’ helps to quickly detect the emergence of high-temperature targets. As thermal imaging cameras, the M Series also has a crucial function of automatic fire detection up to 1km (Fire size: 2mx2m). Forest management personnel can use it to conduct inspections to quickly find fires and arrange for firefighters to deal with the fire in time. ghters to deal with the fire in time. In addition, the M Series supports distance measurement. By selecting the measurement target type (e.g., wolf, rabbit, human, custom) and placing the measurement line on the top and bottom of the target, the approximate distance of the target can be obtained. For networking, the M Series is equipped with a builtin Wi-Fi hotspot module. By connecting the cameras to the smartphone via Wi-Fi hotspot, users can transmit real-time images, set up cameras, store pictures and videos, and browse history files on the DH Thermal APP. Moreover, videos and pictures can be exported and shared via a USB cable connected to a computer. Outstanding features for a better user experience With the built-in video recorder and display, Dahua Thermal Monocular Camera Series can present great views to users and take pictures and videos at any time. Apart from the Micro USB ports, the camera series also has CVBS ports for connecting to an external display screen to realize a better visual experience. In addition, the series has an SD card slot that supports a maximum of 256 GB of storage space, which can significantly expand the storage capacity of the cameras. A built-in distance sensor can detect whether the device is being used. If no one is within a certain distance for a set period, the device will automatically turn on to standby mode. The display will be turned off to preserve battery life while other functions are still online. Users can re-start operating by stepping closer to the device or pressing the power button. Dahua never stops innovating for better products, solutions and services to meet customers’ needs. The highlighted functions not only differentiate Dahua’s products from others but also attract consumers around the world.  

Read More

Cross-Border Ecommerce to Account for 38% of All Ecommerce Transactions Globally by Value in 2023, Juniper Research Study Finds

A new study from Juniper Research has found that the value of cross-border eCommerce will exceed $2.1 trillion in 2023, from $1.9 trillion in 2022. This growth of over 13% in a single year reflects the increasing success of marketplaces which offer goods across borders, as well as the rising viability of cross-border sales as an eCommerce model. The new research, Cross-border eCommerce – Emerging Opportunities, Future Challenges & Market Forecasts 2022-2026, found that as eCommerce models diversify, including models such as buy now pay later and click and collect, cross-border options must also keep pace, by agreeing local distribution and payment partnerships. The research recommends that cross-border eCommerce vendors offer localised eCommerce models, or they will lose out to options that better serve consumer appetites. Marketplace model critical to cross-border growth The research found that the marketplace model, where large vendors, such as Amazon or Wish.com, sell goods to users on behalf of cross-border vendors, will be critical to growth. This model represents an easy way to access a large audience, while ensuring that accepting payments and other logistical issues are seamlessly handled. Research co-author Nick Maynard elaborated, “The marketplace model within eCommerce takes the complexity away, meaning that cross-border merchants can provide a localised service. As such, marketplaces are an excellent way to gain immediate access to an existing user base, albeit one that can be restrictive compared with having a direct-to-consumer relationship.” Physical goods dominating cross-border eCommerce spend The research found that physical goods will account for over 97% of cross-border eCommerce spend in 2023, with digital goods making up the remainder. It identified the maturity of cross border export of physical goods as a business model as a major factor in this difference, as well as increasingly cost conscious end users. The research recommends that payments vendors support a wide range of local payment methods, in order to capitalise on this sizeable opportunity. Juniper Research provides research and analytical services to the global hitech communications sector, providing consultancy, analyst reports and industry commentary.  

Read More

NIST Requests Public Comment on Draft Guidance for 5G Cybersecurity

As wireless networks transition to 5G technology, they could enable a host of new capabilities ranging from autonomous vehicles to surgery performed at a distance – but they also will place new cybersecurity demands on industry. A new draft publication from the National Institute of Standards and Technology (NIST) is designed to help network operators navigate the demands while delivering the new features 5G is designed to provide. The publication describes a standalone 5G network that NIST’s National Cybersecurity Center of Excellence (NCCoE) is constructing, largely for the purpose of demonstrating 5G cybersecurity capabilities in different situations. The network, which the NCCoE team is constructing from off-theshelf commercial technology, is currently being deployed, and the team is seeking comments on the publication in part to ensure the finished network will allow the researchers to develop practical guidance that the wireless security community will find useful. The publication, titled 5G Cybersecurity Volume B: Approach, Architecture and Security Characteristics (NIST Special Publication 1800-33B), describes the cybersecurity capabilities that their example 5G network will enable. It also provides a risk analysis for the security capabilities that the network will demonstrate. Its authors, who characterize it as a preliminary draft, plan to develop it to include actionable guidance on using standards and recommended practices for multiple use case scenarios. “The information contained in the document highlights security features that 5G offers,” said Jeff Cichonski, a NIST Information Technology Specialist and one of the publication’s authors, “Understanding what’s available can be critical to help operators and users of 5G understand and manage their cybersecurity risk when it comes to 5G.” One advantage of 5G will be greater customization of a network to fit its purpose. A large company might want its own 5G network for communication at its headquarters building, while a hospital might want one to enable telemedicine. These different use cases might well have varied cybersecurity demands that the network can be configured to provide appropriately – by activating some available security features rather than others, for example. A potential issue, however, is the current lack of 5G standards that specify how to deploy cybersecurity protections onto the underlying components that support and operate the 5G system. One difference between 5G and previous-generation cellular networks is 5G’s use of cloud-based technology, which is similar to that used for many internet applications. 5G systems can leverage the robust security features available in cloud computing architectures to protect 5G data and communications. As these features may be unfamiliar to some in the industry, Cichonski said, the publication is designed to help clarify how the cloud-infrastructure-focused security capabilities can help secure a 5G network. “The first phase of the project will also showcase how 5G can help address known security challenges that existed in previous-generation networks,” Cichonski said, “If we identify gaps in 5G cybersecurity standards, we will let standards development organizations know what we learn. We are hoping this project will help the entire wireless security community.” The publication is intended primarily for commercial mobile network and private 5G network operators, as well as for organizations using and managing 5G-enabled technology. Once completed, the approach will offer several benefits to organizations that implement it, including reduced susceptibility of a 5G network to cyberattack, better protection of 5G communications against eavesdropping and tampering, and increased privacy protections for 5G users. To develop the draft further, the authors are requesting comments that focus on the security capabilities their example 5G solution implements. “We’d like to know if the guide accurately describes technical security capabilities and related threats and vulnerabilities,” Cichonski said, “One major goal is to assist organizations in understanding and managing the cybersecurity capabilities available in 5G and the supporting IT infrastructure, so we want the community to let us know what we can add to make the information more relevant to their organizations.”  

Read More

Top 4 Cybersecurity Trends for APAC Companies in 2022

Ramesh Umashankar, CEO – International Business, iValue InfoSolutions In recent years, the Asia-Pacific (APAC) region has become increasingly attractive to cybercriminals. According to IBM X-Force Threat Intelligence Index 2022, Asia was the most attacked region in 2021, receiving 26 percent of the global attacks. India tops the list of the most attacked country in Asia. Various reports highlight a significant shift in cyberattacks from North America and Europe to Asia. The rise in cyberattacks in APAC is credited to the region’s rapid digitalization coupled with low cybersecurity awareness, training, and regulations. This regional focus marks an emerging opportunity for business leaders in the APAC to consider how they can improve their cybersecurity postures and be aware of the latest cybersecurity trends. Here are the top 4 cybersecurity trends for APAC companies in 2022: 1. A renewed focus on data privacy and security The impact of GDPR laws on data protection has inspired APAC governments to introduce cybersecurity bills on data protection. Bangladesh is well on its path to introducing the first of its kind draft cybersecurity strategy that aims at creating safer cyberspace. While India is inching toward the final approval for its Personal Data Protection (PDP) bill. But the biggest impact for companies in APAC is the widespread introduction of mandatory data breach notification laws. For instance, Singapore’s new Cybersecurity Act requires organizations from 11 key industry sectors to report any breach of critical information infrastructures to the Singapore Cyber Security Agency. Under its Personal Data Protection Commission (PDPC), organizations are to notify of any cyber incident within three days of the event. The shift from voluntary to mandatory reporting, in a time-limited setting, would require companies to focus on improving their privacy compliance and security strategies or risk paying hefty fines. iValue Recommends: Set up an incident response team and create a template data breach notification. Your team would be responsible for planning a response to a breach and notifying employees, partners, vendors, regulatory bodies, and other stakeholders. 2. Combating Ransomware-as-aService According to the 2022 Thales Data Threat Report, 1 in 5 businesses have paid or would pay a ransom for their data. Organizations in APAC are attacked 51 times per week on average. Indian companies are prime targets for ransomware, with 1 in 4 companies reporting a ransomware attack in 2021. Adding to the alarming statistics are reports that APAC organizations are more likely to pay the ransom sometimes as high as $USD 1 million. APAC’s vulnerability to ransomware, fuelled by Ransomware-as-a-Service (RaaS), is a push for leaders to devise ransomware defense plans. The aim is to prioritize building cyber resilience by implementing new technologies and providing cybersecurity training to employees. iValue recommends: The biggest element for cyberattacks is human error. Invest in training your staff in best practices of cybersecurity and maintaining basic security hygiene. Have advanced threat hunting solutions in place to weed out trojans (Trickbot, Emotet, Dridex, CobaltStrik) and ransomware infections from your network. 3. Rise in collaborative cybersecurity efforts Given that threat actors target companies with multiple locations, there is a need for an increased collaborative effort between governments, companies, vendors to strengthen the cybersecurity landscape. In light of the increasing threats and challenges, many companies and governments are working together to share information and best practices and develop new cybersecurity solutions. Through initiatives such as information sharing platforms and incident response exercises, organizations in the Asia Pacific region are working together to address cyber threats and accelerate public-private partnerships in cybersecurity. For example, Philippine bankers are learning cybersecurity best practices from the United Kingdom. According to FIT Country Director Richard Colley, the initiative aims to help forge relationships and build connections between the UK and the Philippines and work together in addressing cyber security risks. Meanwhile, Microsoft is on a mission to unite APAC governments and state agencies with the cybersecurity council. The Asia-pacific Public Sector Cyber Security Executive Council is a growing group of government leaders, policymakers, regulators, and industry stakeholders from Singapore, Indonesia, South Korea, Malaysia, Thailand, Brunei, and the Philippines. The council meets every quarter to maintain a continuous exchange of information on cyber threats and cybersecurity solutions. iValue recommends: Look for security management platforms that offer automation at scale, customized threat intelligence, and leverage AI. 4. Cybersecurity Education A dearth of cybersecurity experts and skillsets is the bane of the cybersecurity industry. Despite reskilling and up skilling efforts, organizations are finding it increasingly difficult to find and retain qualified talent. According to the 2021 World Economic Forum (WEF) report, the APAC region accounts for 66 percent or 2.045 million of the global cybersecurity talent shortage. To address the cybersecurity workforce gap, organizations, institutions, and governments are working on specialized cybersecurity training programs. For instance, The Asia Pacific University of Technology and Innovation (APU) in Malaysia offers specialized graduate courses in collaboration with industry experts, a state-of-the-art infrastructure learning space (CyberSecurity Talent Zone), a full-fledged Cyber Threats Simulation and Response Center (or Cyber Range), and a Security Operations Center (SOC) with military-grade real-time cybersecurity monitoring systems, research centers, and simulation infrastructure. Whereas, giant tech corporations like IBM and Microsoft are investing in cybersecurity hubs in APAC regions to deliver immersive training programs. iValue recommends: Cybersecurity is a necessity for every company. Organizations must recognize that investing in skilled cybersecurity professionals and building a team is essential for long-term success. Expand your team’s capabilities, skillsets, and geographies by hiring remote workers across the globe.  

Read More

Why do Enterprises Need a Zero Trust Model?

Satish Kumar V, CEO, EverestIMS Technologies Losing credibility is equivalent to losing your standing in the increasingly competitive market, and it will directly impact your business. Therefore, it is essential to adopt a robust security strategy to maintain its sterling reputation as a reliable and trustworthy enterprise. Enterprises that adopt a Zero Trust philosophy can confidently offer new business models and enhanced and secure user experience to their customers. Evolved business models and satisfying customer experience impact the bottom line empowering businesses to be future-ready without fear of security threats. From an enterprises standpoint a Zero Trust Network Access (ZTNA) perspective has to be embedded within the access and security layers that they adopt. What is Zero Trust? At its core, Zero Trust is about verifying every user, validating every device, and limiting access intelligently. Instead of relying on Single-Sign-on (SSO) and multi-factor authentication alone, AI/ ML helps enterprises with behaviour-based access i.e. tracking user behaviour patterns and detecting any deviation from that baseline. It enables the verify-first practice. Almost all our devices are linked. Therefore, we need to employ device management solutions with the context and policies to ensure safer access. Access to the workforce in any enterprise is based on their roles and tasks. Unfortunately, changes in roles do not always change access rights soon enough. Therefore, privileges need to change as quickly as changing roles or employees leave the enterprise. It can only be done through integrated real-time applications that cause zero delays on access-based decisions. Zero Trust Network Access (ZTNA) offers a model where trust is never implicit and enforces policies that are granular, adaptive, and context-aware. A ZTNA strategy for enterprises Enterprises committed to adopting Zero Trust must keep in mind the following key factors: Micro-segmentation: Enterprise security will use granular controls to handle user controls over networks, data usage, SaaS applications, and endpoint applications. Enforced policies everywhere: Security must be persistent and not limited to a file-access approach. It must involve uncompromising security at all times from everywhere – across different applications and file types. Greater visibility through automation: Log all behaviour, suspicious or not. Enterprises can detect potential threats while ensuring compliance through frequent audits. Benefits of ZTNA implementation Enterprises en route to digital transformation aim to be future-ready. But, as businesses grow, so do cyber threats. The ZTNA (zero trust network access) ensures controlled access to the network. And the Zero Trust advantage for network security is that it reduces surface area from cyber-attacks. This control prevents direct exposure of your applications to the internet. With the advent of ZTNA, enterprises can phase out their previous dependence on VPNs for remote access. While access to applications was through intermediaries such as VPNs before, it is a cloud service now, either self-hosted or from a third party. ZTNA technologies enable application access without going through the network. It starts with Zero Trust, even before allowing connectivity, and is purely based on identities and devices, with authorization coming first and foremost. Typically, enterprises are challenged by certain limitations i.e., they have not been able to limit the incident to one identity without compromising others or contain the incident before it turns into a data breach. The Zero Trust model offers intelligent responses with more authentication methods and controls to ward off cyber threats. Moreover, zero trust enables risk-adaptive security control and customizes enforcement based on user actions. Working from anywhere on any device has altered the way businesses operate irrevocably. It is estimated that over 50% of the workforce will continue to work remotely in the next few years. The new working model means vast amounts of data flow through various devices and out of a secure office facility. Moreover, employees log in and out between office laptops and personal devices or use a public Wi-Fi network or a shared family system. Hackers find enterprises in these circumstances an easy target. Clearly defined policies and stipulations of the devices, data access, and data encryption in a Zero Trust model alone can ensure total compliance. A word to the wise It is vital that enterprises, small, medium, or large, understand the evolving cyber landscape, risk perceptions, and the connection between them to prioritize risk mitigation based on threat analysis. With ZTNA, enterprises control data usage, with unified data security policies across the board – cloud, networks, endpoints, and SaaS applications. Therefore, the time to implement ZTNA is now.  

Read More