securitylinkindia

Eventus Launches Managed XDR Services, Powered by Trend Micro Threat Defense Platform

Eventus Techsol Private Limited, the global cybersecurity managed security services provider, announced the launch of Managed Extended Detection and Response (MXDR) services for the Indian market to maximize security threat detection and response capabilities for enterprises, leveraging the strength of Trend Micro’s unified cybersecurity platform. Powered by Trend Micro’s threat defense platform, Vision One™, Eventus will provide great value to enterprises that have limited resources and lack of expertise to regularly monitor detection alerts. Moreover, it will drive unparalleled improvements in security teams’ time-to-detect and time-to-respond, while minimizing the risks and impact of threats. In order to improve the visibility of threats across multiple points in an enterprise network and break the silos created by fragmented threat information, there is no denying that solutions like XDR are the need of the hour. However, to derive the maximum benefit out of XDR solutions and to bridge the prevalent skillset shortage gap, managed services cover around it is equally imperative. Keeping this in view, Eventus has launched MXDR services based on Trend Micro’s market leading threat defense platform, Vision One™ to provide 24/7 alert monitoring and prioritization, incident investigation, and threat hunting to customers. “With today’s ever-evolving threat landscape, enterprises need to have an integrated platform that can detect and respond timely. As industry leaders, we have always ensured to build purpose-driven solutions for all our customers to enable them to tackle threats. Advanced threat detection tools, like extended detection and response, are extremely effective methods for identifying and responding to attacker behaviour. At Eventus, we have built a game changing MXDR service powered by Trend Micro’s most advanced and powerful solutions that help enterprises with round-the-clock alert monitoring thereby reducing MTTD, MTTR” Sunil Sapra, CRO, Eventus   “We are using Trend Micro’s comprehensive platform and leverage its native security stack to offer an integrated managed service across email, endpoints, servers, cloud workloads, and networks” Manish Chasta Co-Founder and CTO, Eventus This service provides teams with efficient alert monitoring, in-depth investigations into advanced threats and threat hunting via proprietary techniques. Threat investigators can initiate respective product response options to contain threats, while providing a step-by-step response plan on actions needed to remediate, along with custom clean-up tools, where applicable, to help recover from the threat. Eventus is launching a series of initiatives to educate their customers on the impact and advantages of Managed XDR. Their current focus is on delivering unified cybersecurity services that enable the organizations to be resilient, freeing them to go further and do more. Eventus excels in next-gen cyber security services and custom-tailored business solutions, establishing and evaluating proof of value over time to ensure customer success. Their stack of cybersecurity services comes with a unique blend of offerings in the fields of Managed XDR and SoC, Cyber Resilience, Incident Response and Cloud Security. Eventus offers its services to its clients based on their requirements and enables them in developing cyber resilience to identify, prioritize, imitate, and remove threats more proficiently. A strong team of highly qualified professionals with domain expertise works round the clock to serve the continuously expanding customer base of 100+ enterprises across sectors. Eventus is the preferred partner for Trend Micro and Picus.  

Read More

Quantum Expands India Presence with New Office in Bengaluru

Quantum Corporation, the provider of solutions for video and unstructured data, recently inaugurated its new office in Bengaluru. The new workplace supports the company’s mission for growth and expansion of the India market, to have local support for Indian customers, and to aid in recruitment, particularly as the company continues to expand software innovation for hyperscale and webscale cloud storage and archiving solutions, data security, and enterprise unstructured data management. Inaugurated by Jamie Lerner, Chairman and CEO, Quantum Corp. and Choon-Seng Tan, Senior Director of Engineering, Quantum Corp., the new office is the fourth in India and second in Bengaluru for the company. The office has been established in Bellandur to expand Quantum’s research and development capabilities and will open with nearly 40 employees working from this location. It is located near several academic institutions, providing access to future talent for all areas of the business. “The new location will provide access to some of the best minds and talent in academia, will be an outreach for partners and customers, and provide an opportunity to accelerate our growth in India and expand our geographical reach. It also underscores our commitment to drive software innovation for data security, enterprise unstructured data management, and hyperscale cloud storage and archiving solutions. Five of the top 5 hyperscalers already rely on Quantum solutions, and we look forward to expanding our innovation to that market with the power of our talented team in the Bengaluru office” Jamie Lerner Chairman and CEO, Quantum Corp. In India, key Quantum customers include: ISRO for data archive. Bharat Electronics Limited for video imaging retention. Famous Studios for 4K post-production. Kalaignar TV for broadcast media. IHMCL for video surveillance retention. NICSI for data protection. With over 40 years of innovation, Quantum’s end-to-end solutions are uniquely equipped to store, manage, protect, and enrich data across its lifecycle, providing enhanced intelligence and actionable insights. Quantum is currently seeking new team members for careers in software engineering, product marketing, and IT systems, among more. Quantum technology, software, and services provide the solutions that today’s organizations need to make video and other unstructured data smarter – so their data works for them and not the other way around. With over 40 years of innovation, Quantum’s end-to-end platform is uniquely equipped to orchestrate, protect, and enrich data across its lifecycle, providing enhanced intelligence and actionable insights. Leading organizations in cloud services, entertainment, government, research, education, transportation, and enterprise IT trust Quantum to bring their data to life, because data makes life better, safer, and smarter. Quantum is listed on Nasdaq (QMCO) and the Russell 2000® Index.  

Read More

New State of Access Control Report Underscores Growing Demand for Future-Proof Mobile Solutions

HID Global, a worldwide provider of trusted identity solutions, announced the 2022 State of Access Control Report, providing insightful perspectives of the market’s current state and trends. Who: Produced by IFSEC Global in partnership with HID Global, the report surveyed just over 1,000 respondents from across North America (56%), EMEA (29%) and Asia Pacific (15%) to detail trends in the procurement, installation, specification and operation of physical access control solutions. What: The report describes the current state of the market, the technology being used, and trends that security and IT professionals are witnessing and foreseeing in the years to come, including: Convenience: Ease of use is the most crucial reason to upgrade to a new access control system, according to 60% of the respondents. This means that in addition to securing premises, a new system must provide a smooth and straightforward process for both users (employees, residents or visitors) and administrators (security, facilities and IT teams).   “Globally, physical access control solutions have undergone tremendous change in the last few years, with the pandemic adding several layers of complexity. At HID Global, we have always believed in actively mapping and anticipating market changes and needs. Our aim of producing this report with IFSEC is to shed light on dynamic trends, challenges, regional disparities, tech demands, and opportunities that we foresee within the physical access control industry. We are glad to have this opportunity to share these timely insights with a larger community for the fourth year running. With a stronger and deeper understanding of the market, we can better equip ourselves to meet rapidly changing market expectations” Prabhuraj Patil Commercial Director, Physical Access Control Solutions, South Asia, HID Global Mobile Access and Touchless Capabilities It’s no surprise then, that demand for mobile access is showing an uptick, with 42% of respondents planning to upgrade to mobile-ready systems. While security system administrators benefit from increased operational efficiency, employees and visitors may find mobile access more convenient and secure since they are more likely to have their mobile devices at hand than their access cards. The pandemic also played a role in the demand for touchless physical access control. About 32% of respondents cited they would upgrade systems to introduce touchless solutions in response to the pandemic, with contactless biometrics also being considered among them. System Interoperability Future-proof support is also a growing concern as users are pushing for long-term convenience while achieving cost savings. In fact, almost half of the respondents (49%) selected the ability to support new tech in the future as one of the top three features in a new access control solution, and 33% included integration with existing security platforms as being important. As a result, consultants and integrators are moving away from proprietary models and embracing open standards-based technology, where software upgrades can be securely managed through the cloud. One in five respondents added that interoperability and open standards will be one of the top trends set to shape the industry in the near future. Sustainability Organizations across all regions are making a clear effort to understand how new purchases and upgrades in access control technology can have an impact on sustainable practices, with about 28% of respondents having consulted their sustainability departments about their buying decisions. Access control readers that have Environmental Product Declarations and intelligent power management, for example, support green building ratings such as LEED. Additionally, deploying mobile access and virtual credentials removes the need for plastic cards and so spares the carbon footprint associated with their lifecycle. When integrated with a building management platform, it is possible to maintain for continuous adjustment of building resources based on occupancy.  

Read More

Security and Fire Expo (SAFE)

SAFE West India: 18-20 May 2023 IFSEC India Expo, South Asia’s leading security, civil protection and fire safety show by Informa Markets in India, is set to expand its footprints with yet another expo, SAFE West India in Mumbai. After the grand success of SAFE South India in the last six years, the three-day SAFE West India expo slated for 18-20 May 2023 is gearing up to provide a platform addressing a broad range of solutions to commercial security with preventive technologies and innovation, with a focus on the western India market. Given the nature of external security threats, State Governments, especially in the Western region, are increasingly adopting video surveillance to improve security and safety. For instance, the Maharashtra government is primarily focusing on enhancing surveillance on the streets to upgrade Mumbai’s safety. Small and big enterprises, public sector companies and gated communities, shopping malls etc., across various cities in the Western Region of India are adopting video surveillance technology. More than 10 lakh IP cameras are expected to be installed across the western region of India in the coming five years. The rapid transition from analogue cameras to IP cameras has revolutionised the adoption of video surveillance solutions, including sharper, high-definition digital images and advancements in video analytics and neuro networks. The rise in production has also led to a decrease in prices and increasingly widespread adoption. With the integration of software solutions into video surveillance, it is now possible to detect unexpected and unattended objects or packages, line crossing, path tracking etc. Speaking on the launch of SAFE West India, Yogesh Mudras, Managing Director, Informa Markets in India said, “Currently estimated to be a $2.5 billion industry, the surveillance market which largely comprises video surveillance is expected to grow at 25- 30% annually. There is a huge demand for safe city projects in India to ensure public safety. The government has taken various initiatives to increase security services revenue which will benefit the citizens as well as the security and surveillance services industry. This is particularly true for the western region of India, which has a number of smart cities and also offers strategic vantage points from a security perspective. A modern civil city should be able to showcase seamlessly safe, smart, energy-efficient and technologically advanced features.” “Our foray into Mumbai with SAFE West India is a strategy to get the show closer to the end users across the several key cities in and around Maharashtra, Gujarat, Goa and parts of North & Coastal Karnataka and Madhya Pradesh. SAFE West India will provide an exclusive platform much needed for the leading players in the commercial, industrial and homeland security domains to tap into the growing Western market in India by forging joint ventures, partnerships, sourcing, dealerships and networks.” he added. According to Pankaj Jain, Sr Group Director, Informa Markets in India, “In our endeavour to reach out to the western Indian security market, we are happy to launch Security and Fire Expo (SAFE) West India in Mumbai. The show aims to showcase solutions to tackle the security challenges in industrial & commercial spaces, critical urban infrastructure and peoples’ lives across Western India. The platform will bring together all stakeholders in the western region, and I welcome you to support our launch show from 18-20 May 2023 in Hall 2 at NESCO.” SAFE West India will be a launch pad for leading security companies to introduce products in an emerging market whilst establishing relationships with key decision makers. The congregation will see professionals from across the industry, including security and safety managers from Hospitality, IT/ BPO & Service Industry, Real Estate, Port Authorities, Power Plants, Logistics, Construction, Architecture, Automobile, Manufacturing, Industrial, Retail, Jewellery, Health, Education, IT, Networking, Telecoms, Automation, BFSI etc. The expo will comprise rich content-led knowledge forums bringing together eminent speakers from the security industry, an exclusive first look at security products and services as they hit the market, Industry experts showcasing best practices and know-how that are vital for a safer work environment, in-person meetings with suppliers, manufacturers, distributors, key government, officials, key association, officials, and thought leaders from the security industry. Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd., spoke on the theme of the newly launched show SAFE West India Expo 2022, “Security Industry is fast evolving to the next level of growth in India. The demand for security products and vertical-specific solutions is growing across the region. In hindsight, it’s a breakthrough idea to bring the Security and Fire Expo experience to the western Indian market. The SAFE West India Expo is being conceptualised at the right time and place. “This event is expected to be the convergence point for the security professionals, System Integrators end-users and security business representatives in the western Indian region. We are sure it would help to grow awareness about security products, solutions and technologies. We extend our best wishes to the Informa Markets in India team for coming up with the SAFE West India Expo with innovative fringe programs. We wish the organisers team and the key stakeholders all the success in their endeavour.” Ms Kiran Dham, CEO of Globus Infocomm Private Limited said, “IFSEC has been proven the perfect platform to connect with the right partners, customers & industry professionals. It is the trusted name with one of the most intense & unique visitor bases coming from all geographies of India. We also appreciate the support & supervision of Team IFSEC in extracting the maximum benefit out of its shows for the participants. Our best wishes for the Mumbai show and may the show in this metro city be highly successful. We hope the exhibitors and visitors get the maximum information on the most innovative and state-of-the-art solutions in the industry.” S M Kumar, Co-founder & MD, MitKat Advisory Services Pvt. Ltd. added, “SAFE West India Expo 2023 in India’s financial capital of Mumbai shall bring together government, industry professionals and companies particularly from West India, who have an abiding interest…

Read More

PRAMA Opens Brand Stores in Kolkata and Mumbai to Give Big Boost to Security Market

India’s premier indigenous security and surveillance product manufacturing company, Prama India has opened brand stores in Kolkata and Mumbai to give big boost to the Indian security market. These two inaugural events were concluded in Kolkata and Mumbai in the month of July. Prama India in association with trusted partner CRM Audio Video has opened its brand store on July 1, in Kolkata. PRAMA Brand Store was inaugurated by Namroz Ahmed Khan, Deputy Commissioner of Police (II) Central division, Kolkata at Ganesh Chandra Avenue. The inauguration ceremony was attended by the leading dignitaries including Debjit Bhattacharya, Office In-Charge Bowbazar Police Station, Gopal Chandra Saha and respected social worker Md. Showkat Khan. The newly opened PRAMA brand store will help make latest PRAMA security products available in Kolkata and West Bengal region. CRM Audio Video Pvt. Ltd. is a trusted partner of Prama India, it has carved a niche in the security industry by setting a new benchmark. PRAMA’s brand store is aimed at showcasing and bringing high quality, state-of-the-art security and surveillance products closer to the potential consumers and end-users. The company has planned a pan-India phased rollout of PRAMA brand stores and aims to open multiple stores spread across Tier-I, TierII and Tier-III cities over the next 12-months. “We are happy to be an integral part of PRAMA brand store launch in Kolkata. We are inviting all the stakeholders of the security industry in the Eastern India region to experience the wide range of indigenously manufactured PRAMA security products at our brand store. We will be happy to serve your product requirements by providing it promptly,” said Chandan Malakar, Director, CRM Audio Video Pvt. Ltd. Commenting on this momentous occasion, Ashish P. Dhakan, MD & CEO, Prama India Pvt. Ltd. said, “This grand store opening event signifies our focus on the Eastern India region. It is a glorious moment for all the security professionals associated with Prama India. PRAMA brand store is dedicated to serve the security requirements in and around Kolkata. This is just the auspicious beginning of a journey, we will strive for exponential growth and expansion of the brand at a pan-India level. Our store is strategically designed to showcase best-in-class products and solutions. He further added, “We are hopeful that the store in Kolkata will be able to serve the security professionals in the West Bengal region (Asansol, Durgapur and Siliguri) to source the latest PRAMA security and video surveillance products. We extend our best wishes to Chandan Malakar, Director, CRM Audio Video Pvt. Ltd. We hope that this initiative will help to create a new success story with PRAMA ecosystem partners.” PRAMA Brand Store Opening in Mumbai Prama India in association with trusted partner Mahadev Computers has opened its first flagship brand store on July 9, with big fanfare in Mumbai. PRAMA Brand Store was inaugurated at Lamington Road, Mumbai in the presence of the leading dignitaries including, eminent personalities and professionals from the security industry. The newly opened PRAMA brand store will help to make latest PRAMA security products available in Mumbai region. Mahadev Computers is a trusted partner of Prama India, it has carved a niche in the security industry by setting a new benchmark. “We are happy to be an integral part of PRAMA brand store launch in Mumbai. We are inviting all the stakeholders of the security industry in the Mumbai region to experience the wide range of indigenously manufactured PRAMA security products at our brand store. We will be happy to serve your product requirements by providing it promptly,” said Ganpatsingh Rathore, Partner, Mahadev Computers. “We are welcoming the security industry stakeholders to our newly opened PRAMA Brand Store. The store will one-stop-shop for the latest products for the local requirements. It is a historic moment, we invite all the security ecosystem partners, system integrators and consultants to witness best-in-class products,” said Narayansingh Rathore, Partner, Mahadev Computers. Commenting on this momentous occasion, Ashish P. Dhakan, MD & CEO, Prama India Pvt. Ltd. said, “This grand store opening event signifies our focus to reach out to the Lamington Road – a buzzing hub of India’s electronic security industry. It is a glorious moment for all the security professionals associated with Prama India. PRAMA brand store is dedicated to serve the security product requirements in the western India region. This is just the auspicious beginning of a journey, we will strive for exponential growth and expansion of the brand at a pan-India level. Our store is strategically designed to showcase best-in-class products and solutions.” He further added, “We are hopeful that the store in Mumbai will be able to serve the security professionals in the Mumbai region to source the latest PRAMA Security and Video Surveillance Products. We extend our best wishes to Ganpatsingh Rathore and Narayansingh Rathore of Mahadev Computers. We hope that this initiative will help to create a new success story with PRAMA ecosystem partners.”  

Read More

Five Tips For Hardening your Security Devices and Networks

Several landmark ransomware attacks on enterprises in energy and food industries last year remind us that we are living in a world with constant cyber threats. Every industry has now been prompted to reinforce their network security and strengthen their online protections. The security industry is no exception, as cybersecurity is also an on-going challenge for us, too. Here, we would like to offer some basic tips and practices to harden your network and keep your security devices protected. Create strong passwords and change them regularly You have heard it all before – almost every cybersecurity guidebook tells you that you need to create strong passwords. It is indeed a common instruction, but one of the most efficient methods to improve the protection of your network and devices. Passwords are just like lock on your front door, and if they are not strong enough, unwelcome visitors can easily crack them and ‘walk right in’ to your network. Creating strong passwords is a very important first step in the process of hardening the security of your network and devices. For setting strong passwords, the following list provides some good principles to follow: Include numbers, symbols, uppercase letters, and lowercase letters. Passwords should be more than eight characters long. Avoid any password based on repetition, dictionary words, letter or number sequences, usernames, relatives or pet names, or biographical information (birthdays, anniversary etc.). Change your passwords on a regular schedule. Set only the firewall rules you actually need A firewall intercepts all communications between you and the Internet, and decides if the information is allowed to pass through to your devices. Most firewalls, by default, will block all traffic both in and out. This is what we call ‘deny all by default.’ In this default state, it is as if your devices are not even connected to the Internet. While this is a very safe state to be in, it is not very useful. So, we must create a set of rules to tell the firewall what we consider safe. Everything else is, by default, considered not safe. As you create rules to allow traffic in and out, you are creating tiny holes in your firewall for the traffic to flow through. The more rules you create in your firewall, the less secure your network becomes. You should only create minimum rules that you need, which can reduce risks of cyber threats through the firewall system. Update your firmware in a timely manner Firmware is the component that enables and controls the functionality of your network devices. It is a software program or set of instructions programmed right onto your network devices. It provides the necessary instructions for how your devices communicate with other computer hardware. Firmware updates are not just for bringing additional new features, but also often provide important security patches. It is recommended that you always use the latest firmware so that you get the best possible security updates and most recent bug fixes. Encrypt your data Another key way to safeguard your network and data includes using encryptions. This is the process of encoding your data in a way that can only be accessed through a corresponding decryption process. Data encryption is encouraged, as it keeps your data privacy safe from unauthorized hands – especially in the event of a data breach. Normally, it is not necessary to encrypt all of your data; you could make an encryption strategy to classify and assess risks of your data. Be sure to choose the right encryption tools for sensitive, non-public, and confidential data. Define clear access permission policies for all users The right users need to have access to the right applications and data for organizations to function. It’s necessary to make clear access permission polices for all users. You need first to define possible users who may access your network and security devices, and then set permission levels for each user to limit unnecessary access privileges and reduce the risk of cyber breaches.  

Read More

Interview with Pankaj Jain

Pankaj Jain Sr. Group Director & Digital Head, Informa Markets We spoke to Pankaj Jain, Sr. Group Director & Digital Head, Informa Markets in India to understand the new initiatives for IFSEC India Expo, new pavilions and exhibition showcases this year, the IFSEC India Awards and the conference for CSOs to be held in parallel at the venue. The 15th edition of IFSEC India Expo this year promises to be the biggest ever in terms of both technology showcase and end-user participation SecurityLinkIndia: The 15th edition of IFSEC India Expo is scheduled to be held from Dec 1st – 3rd this year at Pragati Maidan, New Delhi. How enthusiastic you are about this edition? Pankaj Jain: The physical expos have returned with a bang this year post the decline in COVID-19 infections globally. This is the trend with international shows as well and this is what we have experienced in our previously concluded shows across industry verticals organised this year. IFSEC India in the last 14 editions has majorly been held at Pragati Maidan and last year we organized it in the swanky new Hall 5. This year for the 15th edition we are once again pleased to be back in Hall 5 which provides all new, modern facilities and easy access for both exhibitors and visitors. There is a renewed enthusiasm among all stake holders to come together in big numbers and we are making all arrangements for their confluence at the venue. Some of the big brands that have confirmed their participation till date include Prama, Hikvision, ZKTeco, Godrej, Matrix Comsec, TVT, Mantra, Globus Infocom, MARKON, TimeWatch and TrueView. I have no doubt that this 15th edition of IFSEC India Expo is going to be the biggest ever security expo in the entire South Asian region. SLI: What new initiatives should we expect at IFSEC India Expo 2022? PJ: Each year IFSEC India showcases cutting edge products and solutions such as CCTVs, video surveillance, biometrics & RFID, access control, AI, IoT, Safe Cities, information security, GPS systems, video analytics, and intelligent building systems. While we continue to exhibit these solutions in ever greater numbers, there is growing interest among the Commercial Security professionals about Drones and UAVs, so we will have special focus and attractive packages for the Drones and UAVs community. Home and Building Automation is another segment which has gained increasing interest among urban dwellers and architects as well as in the commercial space, where some of these technologies are being used for Building Management Systems. We welcome these communities to be part of the biggest security congregation and experience the best in the world of technology. Also, we would organize a hosted buyer program for CSOs as part of the IFSEC India Expo. This would enable a direct contact between the key vendors of security solutions and CSOs of very large organisations to help each other understand the security challenges and solutions available to mitigate those better. SLI: What makes IFSEC India the No. 1 security show held in the South Asian region? PJ: Being part of the IFSEC Global portfolio which includes shows such IFSEC International UK, FIREX International, IFSEC Philippines, IFSEC Bangladesh, IFSEC South-East Asia and SECON; IFSEC India not only draws on the expertise of these blockbuster security shows from across the globe but also builds on its connects with all key stakeholders and experts within the global security community. On the regional front, IFSEC India over the last 14 years has brought the community together through roadshows, hosted programs and conferences in India, Sri Lanka, and Bangladesh. On the digital front, IFSEC eConnect, the fortnightly newsletter has in the past five years brought the community together through interviews with brand owners, key influencers and CSOs. The newsletter also highlights the latest product launches & Industry news. SLI: Tell us about the IFSEC India Awards which are back this year after a COVID-19 induced hiatus of two years. PJ: IFSEC India Awards is a unique initiative intended to recognize industry end-users who implement path-breaking security solutions across various industry verticals. This year, in the fifth edition of the Awards, we will be soliciting nominations from Security Heads, entrepreneurs & companies who have continuously helped build awareness around security solutions, implemented new ideas, and created a robust security system for their organisations. IFSEC India Awards provides them an industry-acclaimed platform to showcase their finesse in the implementation of best security practices. To give you an idea of the scale of the awards, we received 219 nominations in the last edition in 2019 and aim to surpass this number for this year’s awards. The pre-jury advisory meet to deliberate on the various categories has already been held virtually on 25th July wherein valuable inputs were assimilated from key influencers and veterans in the security fraternity. The final jury meet to select the winners will be held during the month of November. Ernst & Young (E&Y) are once again the process advisors for these awards and the winners will be announced at a glittering ceremony on 1st December 2022 at the Hotel Lalit in New Delhi. To increase our outreach, we are also going to telecast the ceremony on CNBC-TV18. SLI: IFSEC India Expo also has a colocated conference that witnesses participation from CSOs from across industry verticals in large numbers each year. What value the security fraternity can draw from their deliberations? PJ: The world is increasingly moving towards an era of Artificial Intelligence and Machine Learning in security and surveillance systems. Deep Learning takes it a step further with by enabling even more powerful analytics to recognise suspicious activity without much human supervision. So, as ICT gets tightly embedded into security and surveillance systems, the conference dwells on the new-age security challenges faced by large organisations, the changing role of the CSO in light of technological advances, the need for CSOs to keep themselves abreast with the latest technology, as well as case studies that showcase the benefits they are drawing through…

Read More

Better Safeguarding of Schools

The subject of safeguarding in schools is challenging. It has an equal effect on teachers, parents, and administrations in addition to having a negative impression on the children. While ensuring school safety is everyone’s duty, schools should periodically remind the appropriate stakeholders of their duties. These days, children spend most of their time in school, thus it is crucial for all parties involved to assure that each student is always safe both on the school property and during daily commutes to and from it. Listed below are a few recommendations that can assist to improve school safety and transform them into safe spaces. Surveillance system As an aspect of their school security system, most schools have CCTV cameras. A school’s security policy requires a little more than installing CCTV cameras in every area of the building to record activity. When deployed exclusively, CCTV cameras cannot guarantee the entire safety of students on the school grounds. However, they can be used in conjunction with the most recent security measures to track the students and raise an alarm when the youngster is in danger. Such approaches assist schools in stepping up their security procedures. Vigilance Each student should be watched while on school property since it helps schools stop them from engaging in any dubious or improper behavior. While CCTVs can be used to keep an eye on student behavior, a smart, sensor-based security system can be quite beneficial. Schools can use real-time tracking to ensure that students are in the right place & time and out of harm’s way. When the system detects an unexpected activity in a pupil, an alarm is sent to security, safeguarding their safety. By emphasizing the value of school safety and security, school management can also teach students to inform the appropriate party of any questionable activity. Fencing the premises Most of the schools, frequently take care of this as well. Schools can make use of technology, which alerts security whenever a legitimate person enters a restricted area using sensors. After their shift, employees are not permitted to enter the classroom or even remain on the property. Students are not allowed to hang out in the building after school hours or disturb other students while they are in class. Any security infringement can be corrected right away. Smart ID Cards Every student in the school is given an identity card because it enables the administration to accurately account for all the members of the school by maintaining attendance. A Smart-ID Card, which has an integrated sensor that helps track moments, modern technologies can be linked with clever algorithms. The teachers can individually mark attendance for each student during his/ her class. The use of such technology can also assist in keeping track of instances when a student is on the school’s campus but not in class. Crisis management team & plan The school administration should form a school safety team. The safety team prepares plans for unforeseen events like fire, natural disasters, and more that could potentially pose a threat to the lives of the occupants. School ID card All the student’s smart id cards should have the names of the parent/ guardian responsible to pick them up after dismissal from the school and to be contacted in case of an emergency. This practice would assist the school in taking care of the students. First-aid The school safety plan includes first aid treatment as well as registration with the nearest hospital to stay prepared for an emergency. In addition to this, school staff, Bus attendants should be trained on basic first aid techniques. Bus lady marshals All the buses must have a lady marshal to look after the safety & well-being of the children. Lady marshals to be provided with a walkie-talkie for smoother communication in case of a mishap. The lady marshal will be responsible for handing over the kid to the parent/ guardian and maintaining the record by scanning the smart ID issued to the parent/ guardian. Fire safety plan The school safety team is responsible to develop a fire safety plan and getting it approved by the police and fire department. In addition to this schools to have necessary firefighting equipment installed in the building such as smoke detectors, automatic water sprinklers, and correct types of fire extinguishers as a backup. Emergency contacts Each classroom shall be equipped with an emergency intercom and should display all the emergency contact numbers to respond to an emergency at the earliest. This could play a major role in saving lives. Inspection There have been cases when the accidents occurred due to ignorance of a threat at a site, for example, potholes on the playground. Inspections play a vital role as they eliminate risks. This routine inspection should cover aspects like damage as well as hygiene. Restrooms Many times, kids get locked in the restroom especially when there is no attendant, periodic checks facilitate in maintaining the mishaps in this scenario. Installing an emergency button, and installation of smoke detectors are just some measures to increase safety levels concerning restrooms. Elevators Lift maintenance should be done periodically as children being stuck in the lift is the most common scenario seen nowadays. Children below the age group 10 years, should not be allowed to board the elevator alone. A lift attendant must be always present, and a glass lift can be installed. Counsellor Mental health of today’s youth is sensitive, to make them feel heard and seen, schools should consider a department dedicated to student-teacher welfare. Fixed timings included in the timetable for an easy approach for students as well as teachers. A lady counsellor to be available and offer advice to help students come out of any trauma if needed. One in three students at Indian schools, according to a report published in February 2022 by the Child Fund Alliance, an international network of 11 child-focused development organizations feels dangerous. According to the findings of a global survey carried out in 41 nations, children in India…

Read More

Who Are Corporate Spies, How to Identify & Neutralize Them?

Sergey Ozhegov, CEO, SearchInform Information security expert’s recommendations Each company possesses valuable information assets, which are of high interest for market competitors and other organizations, groups or individuals. In the first company, it may be a VIP-client database, in the second – drawings or technological maps, the third company has created a breakthrough business-strategy, the fourth company possesses crucial financial information. And there is no guarantee for any company or organization, that a spy won’t start operating within it’s framework. The spy may be motivated by plenty of prerequisites, which include, but aren’t limited to – greed, revenge, financial interest, ideological issues. Why employees become corporate spies First of all let’s figure out, which employees may become corporate spies. There are a few categories of employees, which pose the biggest threat for an organization. First category – ‘infiltrator’. In order to ensure, that you won’t be able to unmask him or her for a long time, an employee should be a qualified specialist. Such an expert easily passes interviews, has significant work experience and seems to be a ‘priceless asset’ for a company. That’s why it’s very important to be very attentive to recently hired staff members. Usually, such infiltrators apply for positions, which require work with commercial data or with databases. Case study: the information security department of one company paid special attention to a new sales manager. Vigilance was not in vain. It was revealed, that the manager worked for market competitors and his main aim was to get access to the company’s accounting system. Gaining of such access by the manager may have led to a loss of approximately 215000$ and to a reduction in the number of clients. The second group includes those employees, who start spying because of financial problems. Such employees may had been law-abiding specialists, who began to commit illegal actions only because of financial issues. The third category – risk group employees. This group includes those, who work with critical and top secret data. Thus, such employees may be blackmailed and recruited by your competitors and detractors. Another group – resentful employees. Revenge is in fact one of the most common motives for becoming a corporate spy. Case study: an employee of a large company wanted to take a revenge, as he didn’t get the desired promotion. A resentful employee decided to leak data, revealing very precisely the amount of securities, possessed by each stockholder. The employee intended to transmit the data on securities to mass media. The employee’s actions may have led to the origin and further escalation of a conflict. Such an unpleasant situation would have helped company’s market rivals. However, information security officers revealed the threat just in time and managed to prevent the leak. The damage due to the leak, in case it had happened, would be estimated at $1,241.379. How do spies gather data? There are plenty of ways for employees to steal data: to print it on a paper or save on a device; to take a photo of confidential documents; to deliberately leak data by uploading it to a cloud; to provide third party with the access to database etc. Nevertheless, there are some typical channels for data transmitting, which are the most popular ones for organizing data leaks as well. Thus, they have to be controlled more strictly. According to SearchInform annual research, email stands for the most popular channel for illegal data transmitting, as a bit less than 50% of leaks in 2021 happened via email. So, corporate spies usually take the path of least resistance and don’t create complicated schemes for a data leak. This may be illustrated with a ridiculous case of AMD. AMD’s officials filled the claim against company’s four former top-managers, who lately joined Nvidia. Former employees took away 100.000 files, containing sensitive data on AMD’s business activities. Data volume was so tremendous, that copying of files would have taken too much time. The internal investigation revealed, that one of these employees even googled how to download this tremendous amount of data. He did it during the worktime. Nonetheless, some spies act in a very creative manner. Case study: an infiltrator joined one big manufacturing company. A river flew through the area, where the company’s plant was located, so the spy built a small raft, tied papers to the raft and floated the raft with top-secret documents of the company. How to identify corporate spies Screening check helps to detect spies, who deliberately applied a vacancy in order to leak secrets to competitors. You may test candidate the following ways: By addressing to various bases in order to obtain any mismatches in person’s autobiography; By examination of person’s letter of recommendations; By assessing the results of the interview; By the implementation of the OSINT (open source intelligence) methods. It’s a bit more complicated to identify spies of other categories. Even if a specialist has been working for many years, and no problem has occurred during this period, there isn’t a guarantee, that specific critical circumstances, such as financial problems or willingness of revenge won’t stimulate this employee to commit illegal actions. That’s why it’s important for security services to cooperate permanently with top-managers. If a team isn’t big, then it’s easier to reveal problems by examination of consequential attributes, for example, disproportionate between payment ratio and expenditures or a sudden change in behavior. If the team is quite big, than assistance of special protective software – DLP system – is required. Such systems prevent data leaks. Their functionality enables to trace suspicious messages and other activities, which can indicate employee’s motives. Advanced DLP systems’ functionality also includes behavior analytics (digital profiling, UEBA and other tools). The main advantage of this ‘computer psychologist’ is that it permanently traces behavior changes and that it can’t be treated. Prevention is very important too. It’s crucial to educate your employees in the information security related issues and to present the probable outcomes of a data leak. We also recommend to sign a…

Read More

Biometric Technologies and Counter-Terrorism

Colonel-B-S-Nagial The world is coping-up with various problems such as document fraud, identity theft, terrorism, cybercrimes etc. There are new global regulations in place to use the emerging technologies. But there is a need to strike a balance between biometrics security tools and adherence to human rights while dealing with terrorism. One of the tools to counter the threat of terrorism is the use of emerging biometrics technology carefully. Biometrics uses a person’s physical features or personality traits like fingerprints, faces, voices, or handwritten signatures to identify and verify the antecedents. Biometric systems offer automatic, almost immediate identification of a person by translating the biometric into the digital form and then collating and verifying it against a computerised database.1 The biometric tools include fingerprints, facial recognition, vein pattern, eyes, iris print, DNA, blood, voice, gait, signature etc. The United Nations Security Council (UNSC) resolutions 2322 (2016) and 2396 (2017) dwell on the use of biometrics for counter-terrorism purposes, particularly in the context of border management and homeland security. Resolution 2322 (2016) calls on the member countries to share information about Foreign Terrorist Fighters (FTFs) and other lone wolf terrorists and terrorist organisations, including biometric and biographic information.2 Further in its resolution 2396 (2017), the UNSC resolves that all member nations will evolve and put in practice various systems to gather biometric data, including fingerprints, photographs, facial recognition, and other appropriate recognising biometric data, to responsibly and adequately identify terrorists, including FTFs, as per the policies on the subject while duly complying with the domestic law as well as international law on human rights. The UNSC also encourages the nations to share this data among other nations and with appropriate worldwide organisations, together with the International Criminal Police Organisation (INTERPOL). While implementing the resolutions passed by the UNSC, various countries have encountered gaps and challenges while using biometric technologies for counter-terrorism operations. Therefore I will reconnoitre tendencies in using these types of technologies in counter-terrorism, main challenges, and guidance developed to safeguard the use of technology for its intended purpose. Various critical trends emerging in biometric technologies Using biometrics in counter-terrorism operations is a fast escalating range of counter-terrorism-related applications for biometric systems, including authentication and verification equipment such as biometric passports (e-passports), biometric smart gates, and passport readers and digital forensics.3 The COVID-19 pandemic posed unprecedented challenges concerning biometrics to facilitate domestic and international travel. The extensive use of masks and fear of transmitting the disease via touch limited the efficacy of traditional credentials checks, including facial recognition and fingerprint scanners. As a result, many countries introduced touchless devices and iris scanners to authenticate identity while masks were worn. Biometrics has become more predominant in detecting offenders, terrorists, and inimical elements in public places, with facial identification systems combined with CCTV video surveillance systems. Technology for identification has also been combined with Unmanned Aircraft Systems (UAS) in a law enforcement and border control scenario, helping control many people by channelling and identifying them. The use of biometrics in counter-terrorism operations is often linked to evolving and using emerging technologies. These techniques are used to identify individuals of interest such as high-definition cameras, matching algorithms, and Artificial Intelligence (AI), occasionally in combination with a linked database e.g., terrorist watchlists. And also use biometrics to protect critical infrastructure sites and facilities and soft targets from terrorist attacks. Biometric technologies may also help stop terrorism financing, facilitating augmentations to know-your-client (KYC) and customer due diligence (CDD) procedures and substitutions to financial institutions’ monitoring and keeping track of associated banking operations. “The world is coping-up with various problems such as document fraud, identity theft, terrorism, cybercrimes etc. There are new global regulations in place to use the emerging technologies. But there is a need to strike a balance between biometrics security tools and adherence to human rights while dealing with terrorism. One of the tools to counter the threat of terrorism is the use of emerging biometrics technology carefully” Many countries have made some progress in introducing biometrics for counter-terrorism purposes. There are strong local trends in this practice. Half of the European countries extensively use biometrics, but only a few countries have put it into practice in the Middle East region. In Africa, only fifty per cent of countries are using biometrics systems. How biometric technologies are used for counter-terrorism could be summarised as under: Countries are intensifying the array of physical spaces, from border crossings to public spaces and digital spaces, across social media, biometric data is being validated. Countries use state-of-the-art technologies to capture, collect, process, and analyse biometric data to Counter-Terrorism. Many government officials such as intelligence agencies, national and local police forces, border guards, immigration officers and some private-sector actors e.g., contractors and suppliers, have been authorised to use biometric data. Some nations have taken initiatives to hasten the sharing of biometric data as part of counter-terrorism collaboration and sharing of information methods. Countries have more developed terrorist watch lists and databases linked with biometric databases, with biometric checks against INTERPOL notices and databases to recognise and spot inimical elements and terrorists. “Many countries have made some progress in introducing biometrics for counter-terrorism purposes. There are strong local trends in this practice. Half of the European countries extensively use biometrics, but only a few countries have put it into practice in the Middle East region. In Africa, only fifty per cent of countries are using biometrics systems” Challenges concerning the optimal use of biometric technologies in counter-terrorism could be summarised as under: Technologies has shortcomings and restrictions. Inadequate capabilities. Inadequate legal and administrative contexts. Due to an oversight of safeguarding the privacy and data duration of the data retention period. Strengthening of prevailing inequalities and disparities. Likely misappropriation of freedom rights of religion, expression, and association. Restrictions on distribution of biometric data and information to others. Non-availability of efficient solutions in the event of violations. There is a risk of scams and misuse of biometric information. Though biometric technology has notably advanced its precision and steadfastness, technological shortfalls…

Read More