securitylinkindia

Secure and Smart Office: Renovation in the Style of MacPaw

Ukrainian product company that has been creating and distributing apps for macOS and iOS since 2008. MacPaw products include CleanMyMac X, Setapp, The Unarchiver, and others. The company’s flagship product – CleanMyMac – has more than 25 million downloads and users in more than 180 countries around the world and even in Antarctica. Various MacPaw apps are installed on every fifth Mac in the world. MacPaw started with one man’s passion for Apple technology. The founder of MacPaw, Oleksandr Kosovan, wrote the first version of the CleanMyMac app that has already been downloaded 25 million times and has 12 language localisations. MacPaw started in a dorm room as befits a startup and quickly grew into an office space of over 3,000 m². Today, the MacPaw office space is a model for many IT companies – renovation in style, numerous meeting rooms, a terrace, a gym, a room for relaxation and meditation, an amphitheater area for presentations, two cats, and one of the largest displays of rare Apple equipment in the world. And indeed, a state-of-the-art office requires a state-ofthe-art security system. Challenge Upgrade security and integrate it into the smart office system The office space developed and grew, and more and more equipment from various manufacturers appeared in it, as well as self-developed solutions. Eventually, one part of the space was protected by the old wired system, and the other was controlled by the very first Ajax wireless detectors connected to the wired alarm system via the ocBridge integration module. The technical heritage included devices of different generations and capabilities: Outdated wired alarm system; Ajax wireless detectors of the first product lineup; Modern access control system; Smart system to control lighting and roller shutters. All this variety of technologies had to be expanded with an anti-flood system and then integrated with an app that every team member will have on their iPhone. Solution Outdated wired security system renovation and software integration of an Ajax system via API MacPaw made a balanced decision to integrate the outdated wired detectors into the cutting-edge Ajax system. This approach provides an opportunity to immediately use the benefits of Ajax and eventually expand the horizon of possibilities for further improvement. In general, the solution for MacPaw consists of hardware and software parts. First, the renovation of the security system was carried out, which made it possible to integrate new functions into the company’s app for the office. Let’s walk through the process step by step. The hardware part: Transition to Ajax equipment The first step was to replace the outdated control panel with Hub 2 Plus. The company decided to gradually switch to Ajax security equipment. Hub 2 Plus supports 200 devices and users. Photo verification and constant software updates make this hub future-proof. Hub 2 Plus has four independent communication channels – the security system is always online thanks to the Ajax Cloud server, which opens up vast software integration opportunities. The previously installed Ajax wireless detectors were simply added to Hub 2 Plus. Installers and the MacPaw security team immediately saw complete information about the devices: signal level, battery level, and temperature. The security team can now remotely change the sensitivity level or deactivate the detector. With the old control panel such capabilities would have been unthinkable. For example: Previously, the security team could not see the exact charge level of each detector because the detectors were not connected to the Ajax hub. The team had to check each detector manually to know which one needed a battery change. From now on, the company receives the notification and knows when the battery change is required in advance. The second step is to connect third-party wired alarm system to Ajax via the MultiTransmitter integration module. The module has 18 wired zones for connecting devices and tampers that support four contact types: NO, NC (without resistor), EOL (NC with resistor), EOL (NO with resistor). Three Multi Transmitter modules were required for the part of the MacPaw office with the third-party wired detectors installed. More than 50 wired detectors were integrated with Ajax. The old wired system got a second life. MacPaw office certainly has its specific, such as long narrow rooms and non-standard interior solutions made of various materials. In addition, there are many devices generating electromagnetic fields in the office. All this affects the radio signal. Two ReX radio signal range extenders were installed to ensure stable communication between the Ajax detectors and the hub. Due to the office layout, the range was not as crucial as the radio signal strength. From now on, the entire MacPaw security system is connected to the Ajax control panel. This opens the potential for further security system development and closer integration with the MacPaw smart office. The Ajax system is connected to a security company monitoring station. The third step was to build a flooding prevention system. After updating the security system, it’s time to add new detectors – LeaksProtect. The LeaksProtect wireless leak detector is active 24/7. The detector does not require installation – it is enough to place it in the spots of potential water leakage. Relay was added to the system – in case of water leak, the relay sends a signal to the smart office system that sends a command to shut off the water. This linkage creates an office anti-flood system. In the app, the admin of the system will see exactly where the water leak occurred. The event log shows the time when LeaksProtect has triggered and the room. The software part: New options to control the office space MacPaw has a smart office system, and every team member can access its app. This app is MacPaw’s custom solution for the company usage. The app controls the level of light, doors opening, or, for example, roller shutter in the amphitheater area, allows booking meeting rooms, etc. At the same time, the integration with the old security system did not give sufficient flexibility and restrained the app and the smart office…

Read More

Low-light Imaging Being Applied to More Types of Cameras, and Integrated with AI Capabilities

Low-light imaging technology goes much further in protecting worksites, people, and assets during night time and off-duty hours. This critical technology is now applied to a much more diverse range of security products and getting integrated with AI capabilities. With that integration comes the benefits of cameras that ‘see in the dark in full color,’ reaching more kinds of security settings and scenarios Video security cameras need to maintain image clarity and capture details in any weather and in various conditions. More crucially, they need to do so both in day light and at night. For this reason, cameras with low light imaging technology that render high-definition and full-color images in nearly completely dark environments have become increasingly sought-after in the security industry, and customers have shown a preference toward cameras with 24/7 color imaging. But different security scenarios require different points of view, various angles, and AI capabilities, and that means that just one type of camera can never provide the one-of-a-kind security and safety application that organizations need. As a result, low-light, full-color imaging capabilities are now being built into a much wider range of security cameras, to meet more video security requirements and scenarios. More types of cameras being featured with low-light imaging Large, wide open areas can be very difficult to secure, especially at night. Now we see that panoramic cameras with low-light imaging technology, which can provide a seamless 180-degree view in full color at night, have become available in the market. The application provides reliable 24/7 security in expansive indoor and outdoor locations such as parks, scenic areas, farms, stadiums, and traffic intersections that require wide-angle views, along with vivid color images to fully present the details of an event and inform an appropriate response. Integrating low-light imaging with vari-focal cameras has been another practical approach that is in demand. When a security event is detected, vari-focal cameras with low-light imaging enable users to zoom in to get a close-up view in color, which is very helpful for situational awareness. Customers who require the absolute highest resolution for incident detection and video evidence collection choose cameras equipped for 4K or higher resolution. However, these cameras must be equipped with low-light, full-color imaging technology to ensure that the clear, crisp imaging that characterizes 4K is not degraded, even in dark areas or at night. This application can be applied across a wide range of scenarios including parking lots, airports, harbors, and stadiums, where clear and high-resolution images are necessary. Automating security at night with AI capabilities Ensuring that cameras are equipped with lowlight imaging and AI can be extremely useful. Color images at night provided by low light imaging can be better analyzed by AI technology, enabling customers to automatically detect certain types of targets or security events. This allows security teams to focus on incidents that matter at night by automatically distinguishing people and vehicles from other moving targets such as rain, leaves and animals. Alarms only get triggered when real threats are detected, allowing security teams to respond faster and more effectively. Low-light imaging technology evolving into two-sensor design As the popularity of low-light imaging applications in the video security industry evolves, the technology itself is also evolving. For many years, cameras with IR illumination that only produced black-and-white images at night used to dominate the market. Then we come to the era of low-light imaging with full-color images, using a larger sensor with a larger aperture in the camera, pulling in more light compared to a conventional camera to maintain daytime-like color images in low-light conditions. Now we are seeing a dual-sensor design for low-light imaging emerge. Inspired by the process human eyes use to perceive color and brightness, this innovative design employs two sensors – one for IR imaging, guaranteeing brightness and sharpness, and the other for visible light, guaranteeing vivid color reproduction. Signals from the two sensors then are combined to create one bright, full-color image in low-light conditions. Driven by strong market demands, we expect to see low-light, full-color imaging applied in ever wider ranges of cameras and scenarios. And from a technology perspective, we believe that the dual-sensor technology approach will become the trend in this arena of imaging in the coming years.  

Read More

FortiGuard Labs Reports Ransomware Variants Almost Double in Six Months

Fortinet®, a global company in broad, integrated, and automated cybersecurity solutions, recently announced the latest semiannual FortiGuard Labs Global Threat Landscape Report. For a detailed view of the report, as well as some important takeaways, read the blog. Highlights of the 1H 2022 report follow: The ransomware threat continues to adapt with more variants enabled by Ransomware-as-a-Service (RaaS). Work-from-anywhere (WFA) endpoints remain targets for cyber adversaries to gain access to corporate networks. Operational technology (OT) and information technology (IT) environments are both attractive targets as cyber adversaries search for opportunities in the growing attack surface and IT/ OT convergence. Destructive threat trends continue to evolve, as evidenced by the spread of wiper malware as part of adversary toolkits. Cyber adversaries are embracing more reconnaissance and defense evasion techniques to increase precision and destructive weaponization across the cyber-attack chain. Ransomware Variant Growth Shows Evolution of Crime Ecosystems Ransomware remains a top threat and cyber adversaries continue to invest significant resources into new attack techniques. In the past six months, FortiGuard Labs has seen a total of 10,666 ransomware variants, compared to just 5,400 in the previous six-month period. That is nearly 100% growth in ransomware variants in half a year. RaaS, with its popularity on the dark web, continues to fuel an industry of criminals forcing organizations to consider ransomware settlements. To protect against ransomware, organizations, regardless of industry or size, need a proactive approach. Real-time visibility, protection, and remediation coupled with zero-trust network access (ZTNA) and advanced endpoint detection and response (EDR) are critical. Exploit Trends Show OT and the Endpoint Are Still Irresistible Targets The digital convergence of IT and OT and the endpoints enabling WFA remain key vectors of attack as adversaries continue to target the growing attack surface. Many exploits of vulnerabilities at the endpoint involve unauthorized users gaining access to a system with a goal of lateral movement to get deeper into corporate networks. For example, a spoofing vulnerability (CVE 2022-26925) placed high in volume, as well as a remote code execution (RCE) vulnerability (CVE 2022-26937). Also, analyzing endpoint vulnerabilities by volume and detections reveals the relentless path of cyber adversaries attempting to gain access by maximizing both old and new vulnerabilities. In addition, when looking specifically at OT vulnerability trends, the sector was not spared. A wide range of devices and platforms experienced in-the-wild exploits, demonstrating the cybersecurity reality of increased IT and OT convergence and the disruptive goals of adversaries. Advanced endpoint technology can help mitigate and effectively remediate infected devices at an early stage of an attack. In addition, services such as a digital risk protection service (DRPS) can be used to do external surface threat assessments, find and remediate security issues, and help gain contextual insights on current and imminent threats. Destructive Threat Trends Continue With Wipers Widening Wiper malware trends reveal a disturbing evolution of more destructive and sophisticated attack techniques continuing with malicious software that destroys data by wiping it clean. The war in Ukraine fueled a substantial increase in disk wiping malware among threat actors primarily targeting critical infrastructure. FortiGuard Labs identified at least seven major new wiper variants in the first six months of 2022 that were used in various campaigns against government, military, and private organizations. This number is significant because it is close to the number of wiper variants that have been publicly detected since 2012. Additionally, the wipers did not stay in one geographical location but were detected in 24 countries besides Ukraine. To minimize the impact of wiper attacks, network detection and response (NDR) with self-learning artificial intelligence (AI) is helpful to better detect intrusions. Also backups must be stored off-site and offline. Defense Evasion Remains Top Attack Tactic Globally Examining adversarial strategies reveals takeaways about how attack techniques and tactics are evolving. FortiGuard Labs analyzed the functionality of detected malware to track the most prevalent approaches over the last six months. Among the top eight tactics and techniques focused on the endpoint, defense evasion was the most employed tactic by malware developers. They are often using system binary proxy execution to do so. Hiding malicious intentions is one of the most important things for adversaries. Therefore, they are attempting to evade defenses by masking them and attempting to hide commands using a legitimate certificate to execute a trusted process and carry out malicious intent. In addition, the second most popular technique was process injection, where criminals work to inject code into the address space of another process to evade defenses and improve stealth. Organizations will be better positioned to secure against the broad toolkits of adversaries armed with this actionable intelligence. Integrated, AI and ML-driven cybersecurity platforms with advanced detection and response capabilities powered by actionable threat intelligence are important to protect across all edges of hybrid networks. AI-powered Security Across the Extended Attack Surface When organizations gain a deeper understanding of the goals and tactics used by adversaries through actionable threat intelligence, they can better align defenses to adapt and react to quickly changing attack techniques proactively. Threat insights are critical to help prioritize patching strategies to better secure environments. Cybersecurity awareness and training are also important as the threat landscape changes to keep employees and security teams up-to-date. Organizations need security operations that can function at machine speed to keep up with the volume, sophistication, and rate of today’s cyber threats. AI and ML-powered prevention, detection, and response strategies based on a cybersecurity mesh architecture allow for much tighter integration, increased automation, as well as a more rapid, coordinated, and effective response to threats across the extended network. Vishak Raman, Vice President of Sales, India, SAARC & Southeast Asia at Fortinet said, “Cyber adversaries are advancing their playbooks to thwart defense and scale their criminal affiliate networks. They are using aggressive execution strategies such as extortion or wiping data as well as focusing on reconnaissance tactics pre-attack to ensure better return on threat investment. To combat advanced and sophisticated attacks, organizations need integrated security solutions that can ingest real-time threat…

Read More

Tata Tele Business Services Honoured at the 8th Edition of National Awards for Leadership & Excellence

Tata Tele Business Services (TTBS), a leading enabler of connectivity and cloud solutions for businesses in India has won prestigious awards at the 8th Edition of National Awards for Leadership & Excellence. TTBS won the awards for the following three categories: Award for Best New Brand, Product or Service Launch, Award for Marketing Communications Business to Business, and Award for Marketing Excellence in Telecom Services Sector. TTBS has always endeavoured to collaborate with businesses as technology enablers, providing smart solutions that enable businesses to be resilient, increase productivity and deliver better customer experience. “We are honoured to receive this prestigious recognition at the 8th National Awards for Leadership & Excellence. As one of the leading players in enterprise-tech space, TTBS has been supporting enterprises with seamless networks for business connectivity, cloud solutions and their overall digital transformation by democratising technology. Such industry recognitions underscore our passion for innovation and customer service and encourages us to deliver advance digital capabilities to enterprises” Vishal Rally Sr. Vice President – Product and Marketing, Tata Teleservices The National Awards is a premium forum bringing elite marketers, brand custodians, advertising, departmental heads, retailers, real estate professionals, shopping mall owners and creative honchos together under one roof from across India. The platform offers top marketing professionals, agencies, and consultants an intimate environment for recognizing & rewarding excellence. The Awards brings the best industry professionals who have made the outstanding contributions in the Industry and aims to reward the best in the industry and enhance reputations. Tata Teleservices Limited along-with its subsidiary Tata Teleservices is a growing market leader in the Enterprise space. It offers a comprehensive portfolio of voice, data and managed services to enterprises and carriers in the country under the brand name Tata Tele Business Services (TTBS). Tata Teleservices has an extensive, high quality and robust wireline network and offers its products and services in more than 60 cities across India. Tata Teleservices has one of the largest enterprise focused teams in the industry with deep customer engagement and technology orientation offering focused sales and service experience to customers. Tata Teleservices (Maharashtra) Limited is listed on BSE and NSE in India.  

Read More