securitylinkindia

OSH & SAFE South India: India’s Bid for Global Manufacturing Leadership in Occupational Health & Safety and Security

Informa Markets in India, a leading B2B exhibition organiser is set to host the 7th edition of Occupational Safety & Health (OSH South India) India and the 6th edition of SAFE South India 2022 at the Chennai Trade Centre, Chennai. The two-day co-located shows, slated for 17-18 June 2022, will provide a combined platform addressing a broad range of solutions to occupational hazards and security with preventive technologies, and innovation, to support the growth of both occupational health and safety and the security industries. India represents only about 2% of the manufacturing output, and further India’s manufacturing accounts for only about 16% of the country’s GDP. Safety at the workplace is the key differential that helps boost productivity and hence the manufacturing output. The expos will bring over 200 Plus brands from 100 Plus domestic and international exhibitors. The key exhibitor brands & partners at OSH South India include Mallcom, Venus, Torpedo, LRQA, Venus, ion Science, Marshal, VMEDO, Sure Safety, Red Star Safety, Karam, Udyogi, Joseph Leslie, Midas Safety and Jayco Safety to name a few. Key brands and partners at SAFE South India include Hikvision, Prama, Syrotech, In4, ZkTeco, Biomax, Gtropy, Hiware, Magtech, Picsys, Timewatch, Toshiba, Trueview, TVT and XYZ Digital to name a few. OSH South India is well-supported by reputed associations such as Tamil Nadu Chamber of Commerce, Safety Appliances Manufacturers Association (SAMA), International Power Access Federation ( IPAF ), Indian Technical Textile Association (ITTA), and many other safety consultants. The SAFE Expo is supported by APSA (Asian Professional Security Association), ASIS (American Society for Industrial Security) Bengaluru, New Delhi and Mumbai Chapters, ESAI (Electronic Security Association of India) and OSAC (Overseas Security Advisory Council) Chennai Chapter, IISSM (International Institute of Security and Safety Management), GACS (Global Association for Corporate Services), and Mitkat Advisory. OSH South India gives way to many emerging trends strengthening industrial and workplace safety market share and will witness demonstrations on Personal Protection Equipment’s, Fire & Gas Detection/ Protection, Passive Fire Protection, Safety Signage, Ergonomical Workstation, Safety Training And Consultancy, Safety Software, Medical And Travel Security Services, Lockout Tagout and Machine Guarding, Material Handling, Respiratory Protection, Fall Prevention Accessories & Height Safety Products like Safety Accessories & Uniforms, Electrical Safety, and Transport Safety. SAFE Expo will provide trends and solutions pertaining to products such as Alarm Centres/ Intruder Alarms, Access Control, Biometrics, Building Management Systems, CCTV, Computer Security, Integrated Systems & Networked Security, IT Security, Manned Guarding, Physical Security, Retail Security, Screening/ Anti – Terrorism, Secure Communications, Surveillance and Traffic Monitoring & Valuables in Transit. The Expos aim to improve safety and health at work and security in all forms which will contribute to the sound socio-economic development of India. Speaking on the announcement of OSH South India and SAFE Expo 2022, Yogesh Mudras, Managing Director, Informa Markets India said, “India has a population exceeding 1.4 billion out of which, 63.6% form the working age group. Similarly, in the security industry, several trends have even accelerated that go beyond the traditional ‘physical security,’ such as a host of frontiers like AI, cloud computing, IoT, and cybersecurity are being rapidly pioneered by entities big and small in our industry. India’s Video Surveillance Market size is projected to grow with a CAGR of 16.6% during 2020-26. OSH South India and the SAFE Expo 2022 is an attempt to showcase these two industries in a new light giving a much-required boost to the Indian manufacturing industries. The Expos will represent the entire value-added chain of the Occupational health & safety and securities industries to the buyer-seller community in South India. These are industries that bank on newer and improved technological innovations on a constant basis. We see there an immense growth potential along with the learning and networking opportunities for suppliers and service providers at these expos”. OSH South India will be visited by professionals such as Safety Managers, Consultants, personnel from Defence Establishments, Disaster Management Experts, Distributors and Manufacturers Of Health & Safety Products, Electrical Contracting/ Engineers, Facility Managers, Logistics professionals, Municipal Authorities, System Integrators and Town Planners especially from the industrial hubs of Andhra Pradesh, Telangana, Karnataka and Tamil Nadu. Meawhile, the SAFE Expo will be visited by professionals Procurement Managers, Consultants & Specifiers, Electrical Consultants, Fire Consultants, Safety Managers, Security Managers, Floor Managers, Plant Managers, Operation Managers, Estate Managers, Facilities Managers IT Managers, Design & Instrumentation Managers from hospitality, construction, legal, retail to name a few. The expos will be backed by two knowledge based conferences which will bring together government officials, experts, industry associations and evangelists, and technical leaders. Some of the key topics that will be discussed as part of the Conference at OSH South India under the theme – Decoding Occupational Safety & Health Challenges in 2022 include, Workplace safety practices – The leader’s role, Workshop: Industrial Hygiene and Practical Approach, Emerging Fire Risks and Strategies to Life Safety, E-Waste Management – A 360-degree approach including all stakeholders, Protective Devices – Best Practices for Sizing and Selection and many others. Based on the theme ‘New-Age Threats to Security’, the SAFE Expo will conduct a technical seminar and will cover topics like Technology-Enabled Disruptions, ‘Emerging Paradigms in Security Architecture,’ Leading Technologies that have become Ubiquitous in the ‘New Normal’ in Security, Emerging Cyber Threats and their Implications for Corporate Security, How Smarter, Intelligent and Self-Learning Security Systems Make Life Easier for a CSO and many more. Informa Markets creates platforms for industries and specialist markets to trade, innovate and grow. Our portfolio is comprised of more than 550 international B2B events and brands in markets including Healthcare & Pharmaceuticals, Infrastructure, Construction & Real Estate, Fashion & Apparel, Hospitality, Food & Beverage, and Health & Nutrition, among others. We provide customers and partners around the globe with opportunities to engage, experience and do business through face-to-face exhibitions, specialist digital content and actionable data solutions. As the world’s leading exhibitions organiser, we bring a diverse range of specialist markets to life, unlocking opportunities and helping them to thrive 365 days of the…

Read More

Matrix Joins Hands with Intellve Solutions Private Limited as a Technology Partner

Matrix, a leading OEM manufacturer in Telecom and Security Solutions joins hands with Intellve Solutions Private Limited as a technology partner. Intellve Solutions Private Limited is a technology company (OEM) and has developed state-of-theart integrated, intuitive and intelligent operative Command and Control centre applications (Intellve ICCC) for smart cities, large enterprise operational security, and e-surveillance for BFSI and for safety & security of the critical infrastructure. Matrix developed an integrated access control and visitor management solution with Intellve Solutions intelligent command and control centre for Indian Oil Petronas Private Limited, Haldia. The Command and Control Center Platform helps the client successfully manage complex operational environments by giving real-time alerts. Integrated maps, GIS, alarm reporting, rule engine SOPs, integrated real-time dashboards, Pattern & Trend Analysis and other features can help the enterprise to manage its operations better. Speaking on the same topic, Kaushal Kadakia, Marketing Manager, Matrix said, “This interoperability will provide a point of control to the end customers for managing the crowd flow in their premises without any technical glitches. Furthermore, system integrators can suggest both solutions to end customers without worrying about the integration part for a seamless operation.” Likewise, Aayush Agarwal, Co-founder at Intellve said, “Access control systems play a very crucial role in critical infrastructures such as an LPG import terminal and bottling plant. It detects and delays any unauthorised door breach into premises that could disrupt business operations and be life-threatening. At Intellve, we have integrated Matrix ACS onto our Integrated Command & Control (ICCC) platform for this specific purpose of access annunciation. With an integrated approach, the user is now able to visualise this breach in real-time and mitigate the risk. Unauthorised Access (in time domain) and unauthorised credentials (card) are the 2 critical parameters being monitored at the Indian Oil Petronas Pvt. Ltd. (IPPL) plant in Haldia.”  

Read More

Matrix Perimeter Security Solution

Perimeter security is the first line of defense to protect your assets, information, and people using advanced technology. Just as the human skin protects the body against the external environment and infections, the perimeter security system is designed to keep away unauthorized intrusion in your property. Keeping that in mind, Matrix offers their Perimeter Security Solution to deter intrusions from happening by detecting them in real-time. With intelligent video analytics one can detect intruders in real-time and mitigate the threats easily. The system has been designed to work with both Matrix network cameras as well as third-party cameras and ancillary devices such as motion detectors, electric fences, fire alarms, burglar alarms and more. Again, the cognitive analytics ensure that there are no false alarms being detected because of the camera events. Making the system a reliable security solution for your needs. Key features Intrusion detection, tripwire detection. Integration with motion sensors, fire alarms, burglar alarms. Integration with parent and third-party cameras. Real-time notifications. Cognitive analytics – no false notifications.  

Read More

Panoramic Camera Range with ColorVu for Wide Field of View in Vivid Color

Hikvision India has introduced a new range of panoramic cameras that use integrated ColorVu technology to provide vivid and full-color video imaging for a wide field of view in light conditions as low as 0.0005 lux: nearly total darkness. Large areas can be very difficult to secure, often requiring multiple cameras to provide full coverage. With traditional cameras, monitoring these kinds of area can also be difficult in low light conditions, or at night. To address all of these challenges, Hikvision has integrated ColorVu into our industry-leading panoramic cameras, which use the ‘image fusion’ algorithm to stitch together images from two side-byside lenses for a seamless, 180-degree view. The results are reduced equipment requirements (with fewer cameras needed to cover large areas); improved situational awareness based on a single, wide-angle image and no blind spots; and the ability to capture every detail in full color – even in near-total darkness. A super-wide angle view, with no blind spots Hikvision image fusion technologies in the new panoramic cameras provide significant benefits over traditional wide-angle cameras. By using ‘pixel-level’ matching between the images from the left-side and right-side sensors, this prevents any blind spots, or image ‘twisting,’ or ‘distortion.’ Equally importantly, the image fusion process includes both brightness and color processing technologies that ensures consistency across the entire wide-angle image. This is a significant improvement vs. traditional panoramic cameras, which do not compensate for the different lighting conditions experienced by left- and right-side lenses. AI capabilities that further boost security All models in the new panoramic camera range use Hikvision AcuSense AI technology to differentiate between real security threats and other moving objects such as animals, falling leaves, and heavy rain. This helps security teams to focus on real security incidents, and to minimize costly false alarms. Additionally, the devices can be equipped with Hikvision Live Guard sound and light alarms, which deter would-be trespassers from entering sites or buildings – preventing losses or damage to property and improving safety. Ideal for multiple scenarios and locations The new panoramic cameras provide reliable 24×7 security in a wide range of expansive indoor and outdoor locations. These include parking lots, parks, scenic areas, farms, stadiums, and traffic intersections.  

Read More

Retention Marketing

Retention marketing has taken the e-commerce world by storm. This school of marketing aims to maximize the value of existing customers and retain them. It varies from the traditional methods of acquisition-based marketing as the goal is not to get more customers, but to encourage repeat purchases and increased product usage from existing customers. We can increase the Customer Lifetime Value (CLV) which aids in long-term profitability by delivering engaging and relevant content to the active customers. The customers are plausible to churn if we make customer acquisition our basis which additionally affects revenue and profit margins. For retention marketing in the E-commerce sector, encourage customers to revisit your website, and return to your app (if any) to keep making high-value purchases repeatedly. In the case of Subscription, stimulate users to keep the subscription active or upgrade them to a more advanced/premium plan. Retention marketing strategies are aimed at current, active, or retained customers. Researchers state that 10% of your loyal customers spend 3 times more per order/subscription than the other 90%, and the top 1% of your customers spend 5 times more than the other 99%. Existing customers know your brand well and the chances of selling to them are higher as you’ve already established a relationship with them. The success rate of selling to a new customer is comparatively low. Statistics have repeatedly concluded the nature of retention marketing to be more feasible & profitable. Customer retention can boost revenue. There is a high possibility of spending in the 30+ months of the customer-engaged relationship as compared to the first 6 months. A customer makes multiple purchases than a first-time visitor, in e-commerce alone. The retention marketing strategy also depends upon the nature of the business. For example, a brand selling clothes needs to invest more heavily in retention marketing than a brand selling sanitaryware. Clothes are bought repeatedly but sanitary fittings are once-a-decade things. The retention marketing mix thus will vary from business to business. Retention Marketing Approach Personalization – It is the key to winning a customer. Addressing the customer by their names in emails or messages, sending messages/pop-ups based on their purchase history can delight the customers. According to a survey in the US, UK, and Canada of 3000 consumers, more than 60% of customers expect personalization when being sent special offers, to be a standard procedure. Offers and Discounts – It is a sure-shot way of retaining existing customers and boosting sales. With discounts and offers, customers tend to stick, and their purchase frequency increases. Email Marketing – A newsletter works as a constant reminder and aids in brand recall. The launch of a new range or an upcoming sale can be communicated through the newsletter. Email strategies like welcome mail and cart abandonment help in keeping a customer engaged. Loyalty Program Business Model – This strategy is a mutually beneficial one. It offers valuable rewards and special perks to the customers subscribed under the loyalty program of your choice. These users will be less inclined to switch to competitors, and it adds up to the customer’s lifetime value. These loyalty programs will assure you about the customer’s willingness to stay connected with your brand. Customers tend to leave when they think you’re indifferent to them or the content is not relatable. Customer Progress – Make a customer-friendly UX/UI interface for users to easily slide through. Existing users are familiar with the onboarding process and have built trust around it. In this process, monitor the progress of your customers and notify them about the positive progress they have made on your portal/app. It could be educational, health-centric, crypto news, or as simple as a notification of your shopping cart. Over the past years, the cost of customer acquisition has risen for both B2C and B2B companies. Adobe’s CEO Shantanu Narayen in an Ad News interview said that too many companies are chasing customer acquisition when the real value lies in driving product usage and understanding high-value actions from customers. Customer Retention More reasonable to acquire repeat customers than to find new customers Recurring customers are more loyal to your brand Minimum product onboarding/information required by repeat customers Retention Marketing is the new catalyst for growth. Here’s how. According to Harvard Business Review, it is more expensive to acquire a new customer than it is to retain an existing one. Existing customers understand the value proposition of your organization, so making an advertising pitch to them is not a budget-friendly move. Due to an established relationship with your existing customers, you have a 60-70% chance of selling to them. The success rate is less than 20% in the case of new customers. Money invested on retention is more effective than money disbursed on acquisition. Data shows that improving your lifetime value or retention is more impactful than improving your acquisition. This will ensure a larger return on investment on your marketing budget to engage current customers. Retention fuels acquisition. It is a proven product with the primary goal of retaining and not bringing in new users. The best acquisition strategy to retain your satisfied customers is through referrals and word-of-mouth marketing, something that more than 90% of the consumers trust more than any other form of advertisement. Customers have more chances to give a referral if they return to your business. The average new user may refer your shopping app to 2-3 people. While after regular purchases, the shopper will most expectedly refer it to approx. more than 5 people. According to Neilsen’s Global Consumer Study Report in 2019, customer “disloyalty” is on the rise. Today, nearly half of the global consumers are more likely to try new brands that they’ve never tried before when compared to their willingness five years ago. Consumers can now download new apps in seconds and set up an account in merely 3 simple steps. Brands need a dedicated team of professionals to counteract the fact that customers are in line when shifting costs are inherently low. Retention strategies are no longer pleasant to have for digital businesses. The ability…

Read More

Johnson Controls Acquires SES to Extend Access Control to Critical Infrastructure

Technology includes Bluetooth-enabled locks and mobile applications for the security of assets such as cellular and communication towers and sites The provision of local and off-site access via cellular adds to Johnson Controls robust access control portfolio Johnson Controls, the global company for smart, healthy and sustainable buildings, announced recently that it acquired Security Enhancement Systems LLC (SES), a provider of mobile-based, keyless access control solutions used in critical infrastructure, including telecommunication towers for major providers. “We are committed to providing the best and most complete access control solution to our customers,” said Sanjeev Singh, Vice President, Product Management, Johnson Controls Security Products Business, “This technology allows us to own the entire experience of secure and streamlined access to remote sites and critical infrastructure by service providers. Our customers will benefit from a single, trusted source for security solutions for corporate and other locations.” SES integration of mobile, cloud and on-premise technology provides a complete solution for multi-site security. SES has pioneered highly optimized and versatile locking solutions for remote sites that include diverse security needs for perimeter control, equipment, shelters and other valuable assets for telecommunication, utilities, transportation and data centers. “This combination validates our product realization efforts of the past seven years and we are excited that Johnson Controls will bring our technology into its product portfolio,” said Philip Ufkes, SES President and Founder, “This partnership will further benefit our current and future customers by providing a wide array of cost-effective security and productivity solutions.” SES will add to Johnson Controls’ comprehensive portfolio of security and access control technology available today including security and access controls, video management, security as a service, IP cameras, door controllers and card readers. Raymond James served as the exclusive financial advisor to SES.  

Read More

Entrust Recognized as a Leader in Global Holistic Transport Layer Security (TLS) Certificate Market by Frost & Sullivan

Entrust, a leading provider of trusted identity, payment, and data protection solutions, has been recognized by Frost & Sullivan as a leading TLS/ SSL certificate services provider. In a field of more than 10 global industry participants, Frost & Sullivan independently plotted the Top 7 companies in its analysis. Noting the company’s unwavering focus on high assurance certificates and disruptive innovation, Entrust received the highest score on the growth index, making it the second-largest Certificate Authority (CA) in the global holistic TLS certificate market with a 14.4% market share. As the report notes, it is imperative to maintain the chain of trust in public key infrastructure (PKI), especially as security compromises can lead to loss of credibility among customers. With more than 10,000 enterprise customers using Entrust solutions to enable trusted identities, payments, and data protection, the report highlights the company’s growth pipeline, including product development to address customer pain points. This innovation has delivered new use cases such as PKI as a Service (PKIaaS), Digital Signing as a Service (DSaaS), Verified Mark Certificates (VMCs), certificate lifecycle management and automation, and expansion of partner integrations, which drive TLS certificate usage and customer adoption. The Entrust technology roadmap supports expanded certificate usage, lifecycle automation, and ease of use and control, which will deliver faster time to value for customers. As such, the company has introduced more as-a-service use cases, such as PKIaaS and DSaaS. Additionally, the report highlights how Entrust product development is aligned with industry trends such as growing PKI adoption and proliferation of IoT devices, certificate management automation, and enterprise cloud adoption. “Entrust has secured the second-highest market share in the global holistic TLS certificate market. The CA has recorded consistent growth in the last three years, powered by a strong vision to keep the world moving safely by enabling seamless and secure transactions,” said Swetha Krishnamoorthi, Senior Industry Analyst, Frost & Sullivan’s Security Practice, “The growing volume and variety of devices deployed in organizations demand a correspondingly large number and types of certificates. Therefore, organizations prefer to have a single-stop destination for all types of certificates to reduce the complexity of certificate lifecycle management. Entrust offers an extensive portfolio that includes certificates such as DV, OV, EV, S/MIME, digital signatures, qualified certificates, code signing certificates, and IoT certificates. In addition, Entrust Certificate Services (ECS) platform is CA-agnostic. It offers a seamless and single-pane-of-glass user interface to manage multiple certificate types across both on-prem and cloud-based environments. Entrust has consistently demonstrated its commitment to innovation, thereby recording a high score on the innovation index of the Frost Radar.” Frost & Sullivan also pointed out that Entrust is the only vendor in its study to offer a Cryptographic Center of Excellence to accelerate PKI and cryptography discovery, strategy, and management efforts. Entrust is also one of the two vendors reviewed offering Verified Mark Certificates to support strong identity in email. “With over 50 years of experience in providing solutions for high-trust environments, it’s pleasing to see this report acknowledge that our offerings are built on top of a robust infrastructure and that highly security-conscious organizations such as Microsoft, Visa, Mastercard, VMware, and more rely on Entrust for their PKI needs demonstrates the reliability we offer,” said Jay Schiavo, Vice President of Products for Certificate Solutions, Entrust, “This recognition from Frost & Sullivan reinforces the fact that our TLS/ SSL encryption protection goes beyond the certificate. Rather, we continue to innovate an advanced certificate management solution to provide security beyond the certificate.”  

Read More

Dahua Technology Launches Thermal Monocular Camera Series to Make Outdoor Tasks Handier

Dahua Technology, a world-leading video-centric smart IoT solution and service provider, just launched its Thermal Monocular Camera Series – M Series. They are handheld cameras tailored for outdoor scenarios such as hiking, wildlife conservation, search and rescue missions, hunting, etc. M Series provides three model options (M20, M40 and M60) based on the image resolution of the cameras, while each of them includes multiple models with different lenses to meet diverse customer needs. With an industry-leading 12μm Vox sensor, the maximum resolution can reach 640×512. This innovative series could be the handiest high-quality device for thermal imaging-related tasks in the field, and here are the reasons. Reliable under tough outdoor conditions The ergonomic design of the M Series realizes the comfortable handheld experience and convenient operation. These cameras meet the IP67 standard of Ingress Protection Rating, pass the 2 meter drop test, and function under temperatures of -20° to 55°, which means they can work steadily in tough environments. Even under harsh weather, the M Series is able to capture sharp thermal images at a smooth and stable frame rate and produce clear and detailed visuals of running targets and moving vehicles. Thanks to advanced thermal imaging technology, the series can detect animals and objects in complete darkness, haze, or through glaring light. M Series’s weight ranges from 350g to 500g. Its internal lithium battery supports up to 9 hours of battery life (tested at 25°C) and a USB cable power supply. These make the Dahua Thermal Monocular Camera Series ideal for outdoor applications and easy to be recharged in the field. Advanced intelligence to meet various needs M Series offers a choice of four color palettes to meet users’ observation needs in different scenarios. ‘White Hot’ is suitable for observing active targets, ‘Iron Red’ can improve the comfort of long-term observation under night conditions, ‘Rainbow’ is convenient for users to quickly identify targets, and ‘Alarm’ helps to quickly detect the emergence of high-temperature targets. As thermal imaging cameras, the M Series also has a crucial function of automatic fire detection up to 1km (Fire size: 2mx2m). Forest management personnel can use it to conduct inspections to quickly find fires and arrange for firefighters to deal with the fire in time. ghters to deal with the fire in time. In addition, the M Series supports distance measurement. By selecting the measurement target type (e.g., wolf, rabbit, human, custom) and placing the measurement line on the top and bottom of the target, the approximate distance of the target can be obtained. For networking, the M Series is equipped with a builtin Wi-Fi hotspot module. By connecting the cameras to the smartphone via Wi-Fi hotspot, users can transmit real-time images, set up cameras, store pictures and videos, and browse history files on the DH Thermal APP. Moreover, videos and pictures can be exported and shared via a USB cable connected to a computer. Outstanding features for a better user experience With the built-in video recorder and display, Dahua Thermal Monocular Camera Series can present great views to users and take pictures and videos at any time. Apart from the Micro USB ports, the camera series also has CVBS ports for connecting to an external display screen to realize a better visual experience. In addition, the series has an SD card slot that supports a maximum of 256 GB of storage space, which can significantly expand the storage capacity of the cameras. A built-in distance sensor can detect whether the device is being used. If no one is within a certain distance for a set period, the device will automatically turn on to standby mode. The display will be turned off to preserve battery life while other functions are still online. Users can re-start operating by stepping closer to the device or pressing the power button. Dahua never stops innovating for better products, solutions and services to meet customers’ needs. The highlighted functions not only differentiate Dahua’s products from others but also attract consumers around the world.  

Read More

Cross-Border Ecommerce to Account for 38% of All Ecommerce Transactions Globally by Value in 2023, Juniper Research Study Finds

A new study from Juniper Research has found that the value of cross-border eCommerce will exceed $2.1 trillion in 2023, from $1.9 trillion in 2022. This growth of over 13% in a single year reflects the increasing success of marketplaces which offer goods across borders, as well as the rising viability of cross-border sales as an eCommerce model. The new research, Cross-border eCommerce – Emerging Opportunities, Future Challenges & Market Forecasts 2022-2026, found that as eCommerce models diversify, including models such as buy now pay later and click and collect, cross-border options must also keep pace, by agreeing local distribution and payment partnerships. The research recommends that cross-border eCommerce vendors offer localised eCommerce models, or they will lose out to options that better serve consumer appetites. Marketplace model critical to cross-border growth The research found that the marketplace model, where large vendors, such as Amazon or Wish.com, sell goods to users on behalf of cross-border vendors, will be critical to growth. This model represents an easy way to access a large audience, while ensuring that accepting payments and other logistical issues are seamlessly handled. Research co-author Nick Maynard elaborated, “The marketplace model within eCommerce takes the complexity away, meaning that cross-border merchants can provide a localised service. As such, marketplaces are an excellent way to gain immediate access to an existing user base, albeit one that can be restrictive compared with having a direct-to-consumer relationship.” Physical goods dominating cross-border eCommerce spend The research found that physical goods will account for over 97% of cross-border eCommerce spend in 2023, with digital goods making up the remainder. It identified the maturity of cross border export of physical goods as a business model as a major factor in this difference, as well as increasingly cost conscious end users. The research recommends that payments vendors support a wide range of local payment methods, in order to capitalise on this sizeable opportunity. Juniper Research provides research and analytical services to the global hitech communications sector, providing consultancy, analyst reports and industry commentary.  

Read More

NIST Requests Public Comment on Draft Guidance for 5G Cybersecurity

As wireless networks transition to 5G technology, they could enable a host of new capabilities ranging from autonomous vehicles to surgery performed at a distance – but they also will place new cybersecurity demands on industry. A new draft publication from the National Institute of Standards and Technology (NIST) is designed to help network operators navigate the demands while delivering the new features 5G is designed to provide. The publication describes a standalone 5G network that NIST’s National Cybersecurity Center of Excellence (NCCoE) is constructing, largely for the purpose of demonstrating 5G cybersecurity capabilities in different situations. The network, which the NCCoE team is constructing from off-theshelf commercial technology, is currently being deployed, and the team is seeking comments on the publication in part to ensure the finished network will allow the researchers to develop practical guidance that the wireless security community will find useful. The publication, titled 5G Cybersecurity Volume B: Approach, Architecture and Security Characteristics (NIST Special Publication 1800-33B), describes the cybersecurity capabilities that their example 5G network will enable. It also provides a risk analysis for the security capabilities that the network will demonstrate. Its authors, who characterize it as a preliminary draft, plan to develop it to include actionable guidance on using standards and recommended practices for multiple use case scenarios. “The information contained in the document highlights security features that 5G offers,” said Jeff Cichonski, a NIST Information Technology Specialist and one of the publication’s authors, “Understanding what’s available can be critical to help operators and users of 5G understand and manage their cybersecurity risk when it comes to 5G.” One advantage of 5G will be greater customization of a network to fit its purpose. A large company might want its own 5G network for communication at its headquarters building, while a hospital might want one to enable telemedicine. These different use cases might well have varied cybersecurity demands that the network can be configured to provide appropriately – by activating some available security features rather than others, for example. A potential issue, however, is the current lack of 5G standards that specify how to deploy cybersecurity protections onto the underlying components that support and operate the 5G system. One difference between 5G and previous-generation cellular networks is 5G’s use of cloud-based technology, which is similar to that used for many internet applications. 5G systems can leverage the robust security features available in cloud computing architectures to protect 5G data and communications. As these features may be unfamiliar to some in the industry, Cichonski said, the publication is designed to help clarify how the cloud-infrastructure-focused security capabilities can help secure a 5G network. “The first phase of the project will also showcase how 5G can help address known security challenges that existed in previous-generation networks,” Cichonski said, “If we identify gaps in 5G cybersecurity standards, we will let standards development organizations know what we learn. We are hoping this project will help the entire wireless security community.” The publication is intended primarily for commercial mobile network and private 5G network operators, as well as for organizations using and managing 5G-enabled technology. Once completed, the approach will offer several benefits to organizations that implement it, including reduced susceptibility of a 5G network to cyberattack, better protection of 5G communications against eavesdropping and tampering, and increased privacy protections for 5G users. To develop the draft further, the authors are requesting comments that focus on the security capabilities their example 5G solution implements. “We’d like to know if the guide accurately describes technical security capabilities and related threats and vulnerabilities,” Cichonski said, “One major goal is to assist organizations in understanding and managing the cybersecurity capabilities available in 5G and the supporting IT infrastructure, so we want the community to let us know what we can add to make the information more relevant to their organizations.”  

Read More