securitylinkindia

Fortinet Introduces Self-Learning AI Capabilities in New Network Detection and Response Offering

Fortinet®, a global provider in broad, integrated, and automated cybersecurity solutions, recently announced FortiNDR, a new network detection and response offering that leverages powerful artificial intelligence and pragmatic analytics to enable faster incident detection and an accelerated threat response. SecOps Teams Must Leverage AI to Stay Ahead of Threats Security operations teams are faced with advanced, persistent cybercrime that is more destructive and less predictable than ever before, an attack surface that continues to expand with hybrid IT architectures, and ongoing staff shortages due to the cybersecurity skills gap. Those using legacy security solutions are also challenged with overwhelming and tedious manual alert triage that pulls important resources away from high-priority tasks such as mitigating threats. As cybercriminals become more sophisticated, so too must an organization’s security tools. FortiNDR Accelerates Threat Detection with Artificial Intelligence With the introduction of FortiNDR, Fortinet is delivering full-lifecycle network protection, detection, and response powered by AI to: Detect signs of sophisticated cyberattacks: With self-learning AI capabilities, machine learning, and advanced analytics, FortiNDR establishes sophisticated baselines of normal network activity for an organization and identifies deviations that may indicate cyber campaigns in progress. Profiling can be based on IP/ port, protocol/ behavior, destination, packet size, geography, device type and more. Taken togeth er, this means earlier detection as organizations no longer need to rely on generic threat feeds, which depend on threats or components to become globally known in order to identify indications of compromise. Offload intensive human analyst functions with a Virtual Security Analyst: FortiNDR includes a Virtual Security Analyst (VSATM), which employs Deep Neural Networks – the next-generation of AI, and is designed to offload human security analysts by analyzing code generated by malicious traffic and determine its spread. VSATM comes pre-trained with more than 6 million malicious and safe features that can identify IT- and OT-based malware and classify it into threat categories. These features can accurately pinpoint patient zero and the lateral spread of multi-variant malware by analyzing the entire malware movement. VSATM is also capable of identifying encrypted attacks, malicious web campaigns, weak cipher/ protocols and classifying malware. Identify compromised users and agentless devices: Not all devices in an organization (for example, personal, third party, IoT, or OT devices) can have an endpoint detection and response agent installed to detect a compromise. FortiNDR addresses this by deploying a dedicated network sensor to analyze traffic originating from all devices. Coordinated Response with Security Fabric Integration FortiNDR also features native integrations with the Fortinet Security Fabric as well as API integrations with third-party solutions for a coordinated response to discovered threats to minimize their impact. Common automations to speed response include quarantining devices generating anomalous traffic, enforcement with third party devices via an API framework, triggering an orchestrated process guided by SOAR, and more. As the industry’s highest performing cybersecurity mesh platform powered by FortiOS everywhere and a common management framework, the Fortinet Security Fabric enables broad visibility, seamless integration and interoperability between critical security elements, and granular control and automation. Fortinet’s Robust Portfolio of Detection and Response Solutions FortiNDR rounds out Fortinet’s existing portfolio of detection and response solutions, including managed detection and response (MDR), endpoint detection and response (EDR), and extended detection and response (XDR) solutions. Organizations looking to add detection and response capabilities to their traditional prevention-oriented security controls can choose from: FortiGuard MDR Service: For smaller organizations with a single IT/ Security team (or larger organizations looking to offload first line alert monitoring and triage), managed detection and response (MDR) is a good option to add security monitoring capabilities without needing the specialized expertise to run it effectively. FortiEDR: For mid-size to mainstream organizations with dedicated (but small) security teams, endpoint detection and response (EDR) is a good option to add deep, host-level analysis that is necessary to identify the signs of ransomware activity on the endpoint. FortiNDR: For larger organizations or robust security teams who have already implemented EDR, network detection and response adds broader analytics and anomaly detection across network segments or even the entire organization, insight into activity from devices without agents (whether IoT or unmanaged devices), and faster deployment with zero impact to production systems. FortiXDR: For organizations with multiple Fortinet security controls, extended detection and response adds curated detection analytics, AI-powered alert investigation and automatable incident response. Vishak Raman, Vice President of Sales, India, SAARC & Southeast Asia at Fortinet said, “With the introduction of FortiNDR, we’re adding robust network detection and response to the Fortinet Security Fabric. Powered by purpose-built machine learning, deep learning, pragmatic analytics, and advanced AI capabilities, FortiNDR automatically detects and responds to abnormal network activity to thwart security incidents. Fortinet’s full suite of detection and response offerings feature native integration for a coordinated response to empower security teams to move from a reactive to a proactive security posture.” “As our trusted security vendor, we’re pleased to see Fortinet continue to deliver cutting-edge technology as an integrated extension of what we have already deployed in our network. The addition of artificial intelligence for malware analysis in FortiNDR will give us a huge advantage in defending against cybercrime, and we are excited to expand this capability to our network activity. This is the latest example of our ability to gain even more value out of our initial investment in the Fortinet Security Fabric.” said Carolina Masso S., CEO, Gamma Ingenieros SAS “As enterprises struggle to coordinate threat detection and response across individual point products, the ability for them to leverage a complete set of integrated SOC capabilities as part of a cybersecurity platform promises significant improvement in the effectiveness and efficiency of discovering and mitigating threats. Fortinet’s portfolio of detection and response products such as FortiNDR, FortiEDR, FortiXDR, and more, which are all integrated as part of a platform, should be considered for any organization looking to improve their security operations function.” said John Grady, Senior Analyst, Cybersecurity at ESG.  

Read More

A Systems Thinking Approach to Digital Transformation

Vikas Bhonsle, CEO Crayon Software Experts India The digital age is also interpreted as the age of networked intelligence. As data becomes more easily accessible, in the right format, and at the right time – organizations gain new capabilities to re-engineer business operations for faster and more efficient service delivery. Throughout the lifecycle, a comprehensive system thinking approach addresses not only the complex product and its diverse subsystems but also the wider systems of which it is a part. At the systems level, users, the environment, other products, and processes impact the product throughout its lifespan. Organizations who design considering these factors excel in their operation The concept of systems thinking is not new. The principle of “the whole being greater than the sum of its parts” can be traced back to Ancient Greece. Systems thinking is a comprehensive approach to modern business operations that focuses on how a system’s main constituents correlate and how they work overtime and within the framework of bigger systems. Applying this approach to the current technology stack will demonstrate its utility. No division in an organization is an island; how else does each section of the business communicate and merge? And, how do the systems that each department employs interact and integrate? It is the combinations of different processes that make a huge difference. Interactions result in new, more efficient actions, which streamline and facilitate efficiency. An Era of System Thinking Today digital transformation is about connecting various devices and systems that can provide value. It is about building a network of intelligence through the use of technology. It is not solely concerned with meeting customer demand but also with restructuring organizations and how they are managed to increase capital and value creation through process efficiency and effectiveness in a broad sense. In other words, the current era has taken a proactive approach to changing the entire system rather than a specific aspect, as businesses do not have a dedicated digital department and instead incorporate digitalisation into their organizational culture and strategy. System thinking allows people to use their awareness of modern systems to improve a situation. Unlike the traditional system, which focuses on separating individual pieces of what is being studied, systems thinking focuses on how the subject of study interacts with other elements of the entire system. In today’s world, digital transformation is a synthesis of customer demand, technology, and overall business goals. Employing Systems Thinking to Your Digital Roadmap Building a digital roadmap starts with a set of objectives. It starts with bringing key stakeholders from each department to compile a list of needs, differentiating between those that affect the entire business and those specific to one department. Broad goals are to be considered rather than specific ones. After creating a list of business-wide and department-specific needs that must be met by systems thinking of digital transformation, one must discuss how the department needs to intersect. This is significant for two reasons. The first is the interconnected nature of system thinking advancements. The second benefit is that it sets the tone for the solution; from the start, the company should focus on discussing connected solutions and collaborative thinking. It’s critical to start on the same page, and ensuring company-wide buy-in will lead to better development and adoption. With a clear understanding of what the business and each department want to accomplish, it is time to define the solutions that business intends to implement in the coming months and years. Collaborating with a digital transformation partner can help the business see what is possible and the range of options available. The goal is to demonstrate that digital transformation is a journey, not a race. Take a crawl, walk, run approach; always consider the potential cross-business impact of a particular solution. In the short term, the organization should aim to implement a series of digital proof points, each of which addresses a key business goal. The digital roadmap is not fixed. The company will have compiled data on each of the digital solutions implemented; they should learn from the insights and adapt its own approach. It is especially important to put in place a system that shares this insight, allowing both department decision-makers and automated programmes to learn from cross-business actions. Systems Thinking is essential for the design of complex systems as well as the execution of a company’s long-term digital strategy. Whilst using the systems thinking approach, the organizations will almost certainly be swimming in seemingly disparate data, making quick and simple modelling critical to ensuring the digital roadmap is on track.  

Read More

What the Recent CERTIn Directives Mean for Businesses in India

By Shrikant Shitole, Chief Executive Officer, iValue InfoSolutions As of July 1, businesses in India must comply with new regulations set forth by the country’s Computer Emergency Response Team of India (CERT-In) organization and the Ministry of Electronics and Information Technology (MeitY). These new directives require businesses to report any cyber incident within 6 hours – one of the shortest cybersecurity incident reporting windows. The recent directives from the Computer Emergency Response Team of India (CERT-In) have caused quite a stir in the security community. Apart from mandatory reporting of cybersecurity-related events, organizations must sync server time stamps, maintain 180 days log back-up, and customer details of virtual private network (VPN) services for a period of five years. The rules [PDF] mention 20 cyber incidents to be reported, including data breaches, ransomware, and fake mobile apps. The new guidelines will come into effect from June end and will also be applicable to cloud service providers and virtual private server providers. What does it mean for businesses? CERT-In’s directive is a cause for concern for businesses in India. Domestic and global industry bodies like ITI are voicing their concern and the potential impact on every business. Impact on VPN providers During the pandemic, a paramount cybersecurity tool has been a Virtual Private Network (VPN). According to a report by Atlas VPN, VPN usage in India exploded with a growth of 671% in 2020, totalling 348.7 million users by the first quarter of 2021. The growth is mainly attributed to the Indian governments growing restrictions on internet usage. India joins a handful of countries, like Belarus, China, Iraq, North Korea, Oman, Russia, and the United Arab Emirates, that heavily regulate or outright ban VPN services. The new guidelines are a severe pushback to VPN providers in India. For many, it goes against their core USP of privacy, strict no-log policies, and their main selling point of anonymity. Companies like NordVPN and SurfShark are considering moving out in light of the guidelines. While CERT-In is said to issue a clarification on the April 28 directives, we are yet to see any shift in their stance on VPN privacy. Impact on crypto wallets Joining the league of financial service regulators, CERT-In now requires virtual asset service, exchange, and wallet providers to maintain Know Your Customer (KYC) and financial transactions for five years. Experts suggest that these directives will form the foundation for crypto regulation in India. This follows the recent Union Budget announcement of a flat 30 percent tax on gains from cryptocurrencies and a 1 percent TDS on all crypto transactions. Organizations must start syncing their system clocks with ICT systems and connect to the Network Time Protocol (NTP) server of the National Informatics Centre (NIC) or National Physical Laboratory (NPL). Syncing timestamps with distant servers raises latency issues. Large data centres would prefer a server that is nearby and trustworthy public NTP servers (like Google) over time sync servers of NIC and NPL. How will CERT-In create dedicated server time? We are yet to get clarification. The cost, time, and resources to implement the change Making changes in organizational security in just 60 days is challenging. The number of resources required to sustain the new changes is questionable on either side. Would CERT-In be able to handle the load? Organizations must maintain logs of ICT systems for a rolling period of 180 days and retain personal data such as names, addresses, phone numbers, emails, and IP addresses of subscribers for a minimum of five years. This could be a potential violation of GDPR norms. Companies would also need to maintain log servers or invest in services of Security Information and Event Management (SIEM). While SIEM is a valued option, the cost of implementing these changes would be hefty for small to medium organizations. The failure to comply with CERT-in directives would attract a fine of up to Rs.1,00,000 or imprisonment for up to a year under Section 70-B(7) of the IT Act. The bottom line? We are eagerly anticipating clarity in certain places, especially whether additional infrastructure has to be created to store the data. Or whether they are allowed to outsource the storage of data to third-party data storage, retention, and localization service providers. While India’s move to strengthen the digital ecosystem is a welcome initiate, in the long run a pragmatic approach would gain better coverage, keeping a fine balance between national security, public surveillance, business priorities, and netizen’s privacy.  

Read More

Relooking at Hospital Security

In a new world where healthcare systems need to be of the highest order, the processes have taken a strong momentum to improve infrastructure and amenities following the pandemic years. The policies are rapidly resurfacing as they have become crucial for the citizens of a country. Hospital Security involves securing patients, staff, visitors, and physical infrastructure. Hospitals have multiple access points and witness huge crowds daily. Most hospitals are considered ‘soft targets’ as they are high-density locations including crowded areas such as schools, shopping malls, and schools. They commonly have many access points with limited security guards. Even the threats of theft, violence and other crimes are real risks for hospitals. These are some of the common reasons why we may be more vulnerable to certain types of security risks in the coming future if left unattended. In the face of a pandemic, risks are heightened, and the need for stricter security norms looms large. The role of hospital security is to ensure the safety, security, and welfare of all patients, staff, and visitors to their full capacity. Apart from people, it is also important to secure medical equipment, operating rooms, facilities, and sensitive information. Without adequate safety and security measures, hospitals can become easy targets for intrusion and unwarranted activities. Statistics There are a total of 18,99,228 hospital beds in India, out of which 11,85,242 are in the private sector, and the remaining 7,13,986 are in the government sector. 59,262 ICU beds are in the private sector and 35,699 beds in the public sector. (April 2020, analysis by the Center for Disease Dynamics, Economics & Policy). The Union Budget of 2022-23 allocated INR86,200 Cr. to the Ministry of Health and Family Welfare, a nearly 16% increase in comparison to FY 2020-21. By 2036, the population of India is expected to increase to 151.8 crores (approx.) at the rate of 1.0 percent annually. Calls for better infrastructural facilities. Types of Hospital Safety Patient and child safety, emergency services, contract staff, catering establishments, parking traffic, pharmacy control, clinical safety, equipment protection, fire safety, and evacuation. Risks & Security Threats The healthcare industry is widely regarded as having a weak security system. The main challenges that arise in hospital security are: Deficiency in manpower and infrastructure. Unchecked visitors due to heavy traffic at the entry and exit gates is one of the probable risks. The parking area is a hot spot that needs immediate attention for threat control, as the damages may result in an expensive disaster. Healthcare data breaches and cyber-attacks expose highly sensitive and valuable information of patients. In 2016, a kidney trafficking racket was wedged in Mumbai’s hospital meanwhile Delhi faced an incident that includes the swapping of newborn babies due to gender biases in 2017. The year 2022 recorded an unpleasant episode where some of the relatives ransacked a private hospital in Nagpur and further assaulted a doctor after the patient’s death. These are some of the issues that are confronted by hospitals every day, and the number of such incidents per year is increasing. If we tighten our security systems, it may reduce the scope of these cases significantly. Together with manned guarding, vigilance, surveillance, and electronic security can such threats be addressed better. Safety Measures Maintenance of the records and medical history of all patients as credible National Health Data is important for the govt, and stakeholders, and to also maintain transparency with the democratic citizens of this country. Provisions by regulatory authorities, planned strategy, patrolling and reporting, quick response teams (QRTs), protection of high-value laboratories, allotting of investigation officers, more organized and categorically strict ‘entry & exit’ systems, easing out language barriers, and reduction of cues, monitoring, and checking of cue reduction besides registration of all visitors. Electronic access systems for physical security needs like printing photo ID access cards and face recognition systems for the authorized staff, and visitors. Biometric authentication such as fingerprints, upgraded software integrations, high-speed internet access, 24×7 control room regulation, and automatic door controllers with a magnetic locking system. Disease control/ prevention, administrative security, and safeguarding of dormitories having high-risk equipment and inflammable tools. Reliable and latest information on healthcare resources and their deployment can address problems with real-time solutions. To further ensure a district-level electronic database of information on health system components. Hospital staff & security coordination training, fire training, and security guards training to counter any mishaps for real-time action control. Verification of IDs and badges to make sure the doctors, patients, and visitors are at their assigned wards. Furthermore, contactless access card readers for easy access. Effective communication amongst security officers, quick monitorization of strategically positioned CCTV cameras. Metal detectors and screening tests of all visitors. Handling the patient’s and their relative’s emotions in cases of serious medical issues. Besides the doctor, a skilled healthcare security officer can maintain composure and tactically handle the emotions of the deceased/ injured. Patrolling by the trained security officers for potential fire threats due to sparks generated via electrical equipment or combustible materials. Regularly examine the expiration dates of the fire extinguishers. Further reporting the issue to the firefighters. Abduction of infants, inmate escapes, drug theft, and even gun violence are some of the crimes committed in hospitals. These crimes can be avoided by a strong and effective security system to avoid these crimes. Establish integrated health information Exchanges, architecture, and national health information networks. The year 2020 recorded the concentration of most ventilators and hospital beds in India and found seven states that topped the charts. Uttar Pradesh, Karnataka, Maharashtra, Tamil Nadu, West Bengal, Telangana, and Kerala. Amongst which the highest number was recorded in UP (as shown in the previous page). Although the dynamics have changed now with an increase in the number of hospital beds and ventilators over the years. Besides taking these necessary steps; the latest tools and technology are the requirement of the emerging healthcare sector. To detect and protect people from waste, and acquired infections, systematic management systems, information systems, establishing hospital committees, planned…

Read More

CP PLUS Expands with State-of-the-Art, Futuristic Manufacturing Facility in Andhra Pradesh

CP PLUS, India’s leading CCTV brand, began producing surveillance devices locally in India in its Manufacturing facility in Tirupati, Andhra Pradesh 5 years ago. And since then, the brand has enhanced its manufacturing capabilities to reach the plant’s maximum production capacity of 1Mn units a month. Now to meet the growing demand, CP PLUS has put up another manufacturing unit in Kadapa District, Andhra Pradesh. With the production commencing in Q2, 2022-23, this new facility will have 3 times the production capability vis-à-vis the existing capacity i.e., 3Mn surveillance units per month, which will make it the world’s largest manufacturing unit for surveillance products, outside China and 3rd largest in the entire world when including China. The CP PLUS manufacturing facility Kadappa in the state of Andhra Pradesh has been integrated with the world’s latest Fuji made state-of-the-art technology SMT lines and semi-robotic assembly & packaging lines. All production area has been designed with ESD flooring, dust-free and air-conditioned environment to achieve world’s best quality of products. This manufacturing facility has a wide range of Reliability Test Equipment to ensure High quality of products manufactured and also to qualify for various certifications required in Tenders and by Govt. of India organizations like RDSO, AAI, PWD, Indian Navy etc. Aditya Khemka, Managing Director of CP PLUS expressed his intentions to further expand the production capacities manifolds in the future. “Backed by our R&D proficiency, we have plans in action to further augment our capabilities and become many times larger than the current size to produce 6 Mn units per month in near future to make our brand more and more Atmanirbhar in order to accomplish our PM’s dream and to make India truly self-reliant,” he said. “In addition, we have 10 acres of additional land for which we have firm plans to develop facilities for Backward Integration in the CCTV domain. CCTV & Recorders’ components like Housing, Cables, and Adapters among the others are placed in the first phase of manufacturing which will lead to an actual increase in Local Content in manufacturing and go another mile in the localization and indigenization process of CCTV manufacturing in India,” he continued, “With visible Govt. support, we do foresee Exports of Surveillance products in near future from this stupendous production facility.” All these areas of high-volume production, Backward Integration & Exports will attribute to a larger employment generation for the country, especially for Women as the brand’s current workforce consists of 90% of female workers. Manufacturing for other domestic and international brands, CP Plus has also become the largest Indian OEM and ODM as well, giving strong competition to Chinese companies and reaching the leading spot in the entire surveillance industry. CP PLUS is a pioneer Indian brand responsible for leading the security and surveillance industry in the country for many years now. Since its very beginning, CP PLUS has dominated the CCTV industry by introducing affordable solutions and a reliable sense of security to the general public and creating awareness about enhancing public safety. Now, the brand’s name itself has become a synonym for CCTV in many parts of the country. Being a leading brand in the surveillance industry, CP PLUS has successfully conducted hundreds of government projects, securing railway and police stations, air and sea ports, government institutions, public roads, and even entire smart cities. Currently, CP PLUS is also in talks with the Government of India to introduce the PLI scheme for the surveillance industry and also about amendments to the Public Safety Act to further improve Electronics Security for India and its public. The growth and popularity CP PLUS has witnessed every step of the way successfully placed the brand at the forefront of the surveillance industry, so much so that now CP PLUS is not just India’s No. 1 surveillance equipment manufacturer but also has the largest production facility for security and surveillance products anywhere outside of China in the whole world.  

Read More

Integration Streamlines in-Home Peace of Mind

The advances of technology have meant a dramatic rise in the amount of devices we use in our homes. In fact, the European smart home market is expected to grow to USD39.6 billion by 2025. This ranges from entertainment to practical everyday tasks like drawing curtains and dimming lights. But perhaps the most useful are those that allay our base fears around security in the home. Alarms, security cameras, and access systems are becoming increasingly popular as people strive to make their homes a secure and comforting haven – even within the context of their busy lives. Hikvison has a range of smart devices to provide that in-home peace of mind – and they can all be controlled from one place. Too much of a good thing With multiple devices comes a variety of different controlling mechanisms – usually one for each device separately. Remember the days when you had only one remote control for your TV, for example? Now you could conceivably have four or five for your entertainment system – TV, sound system, DVD player, satellite box etc. This is a kind of ‘tipping point’ – when technology advancement can cause frustration, rather than making your life easier. It’s this frustration that’s led to the popularity of systems that bring various elements of the home together. These range from smart speakers that allow the family to play music in different rooms, to apps that control lighting. And then there are the ‘digital assistants’ that can bring a number of IoT devices together all over the home. Imagine being able to do this for your security. A central indoor station can provide access to all your alarms and security cameras. And this can also be available on an app, so you can verify alarm alerts even remotely. Add to this the ability to control your access point – i.e., front door – and you start to see how an integrated security system can provide great peace of mind, rather than adding multiple ‘interfaces’ to your daily life. All-in-one indoor station Hikvision’s All-in-one Indoor Station provides a central device to be able to manage a homeowners CCTV, access control, alarm and intercom technologies. It has a range of functions allowing the user to keep an eye on all of these devices, giving them a holistic overview of their home security. If an intruder sets off an alarm, the system can provide a video ‘footage’ clip from an adjacent camera, thanks to smart linkages. They can see this on the pre-installed HikConnect app too, with added functionality of zooming in and out on the image, and fisheye mode for relevant cameras. The front door is usually where the home starts – and where the peace of mind also needs to begin. The All-in-one Indoor Station allows users to see who is at their door, and even let them in with the click of a button below the screen. This works too if they are using the app – so they can let someone in remotely once they have been able to verify their identity using the door intercom camera. Intercoms can also be fitted with two way intercom – which means the user can have a conversation with the visitor, either through the Indoor Station or their app. This is particularly useful in a world of multiple deliveries encroaching on busy lives. Open and simple to install The story for installers is great too. The Android (v10) base of the device means its open architecture, so adaptions and 3rd party software can easily be integrated. The user experience is continually being improved, making it intuitive – both for users and installers. The fact that this means they don’t have to install multiple devices to manage an in-home solution saves them a lot of time and cost. Alongside the HikConnect app is Hik-ProConnect – an app designed for installers to be able to manage and configure devices remotely. This also streamlines their aftercare efforts, with a wide range of activities being possible remotely, once they have their customer’s approval to do so. While technology enters our lives an increasing levels, the smart money is on the methods of bringing disparate technologies together. Open platform architectures and platforms mean more and more devices will be able to talk to each other. This is the beginning of the world of advanced IoT, where we start to really see the benefits of smart connected technologies in our homes. No more scrabbling behind the sofa for a remote!  

Read More

CISF & PSI: Working in Tandem will be a Great Opportunity

Anil Puri CMD, APS group A first generation serial entrepreneur, thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, an innovator and a strategic thinker. He has used this combination to innovate and implement on-ground many new business ideas. His rich experience in various businesses has enabled him to nurture & mentor innovative ideas and scale them up. Background Home Minister Mr. Amit Shah while addressing the CISF 53rd Raising Day at Ghaziabad stated the CISF should work out a ‘hybrid arrangement’ with the private security agencies under which CISF can prepare the security framework for guarding the vital installations. He further stated that role of private security agencies is expanding very rapidly in keeping with the pace of national economy moving from $2.5 trillion economy to $5 trillion economy and CISF should take on the responsibility of training the personnel of PSAs. The necessity to enhance the efficiency of the private security agencies arises from the fact that the CISF alone cannot ensure the security of the industrial sector of the entire country and PSI who specializes in handling similar security domain can easily be coopted to fill in the void with ease. Certain key takeaways from his speech are: CISF should work out a ‘hybrid arrangement’ with the PSAs under which CISF can prepare the security framework for guarding the vital installations. CISF should develop some training modules possibly based on the size of the work force employed by the production units or keeping in mind the need of the selected areas/ units to facilitate training of PSAs security personnel. Once PSI is fully ready with such hand holding by CISF, the later should hand over full responsibility to the private security personnel. Security of air ports and metro offers huge scope for employability of the women personnel to change the gender ratio of 94:6 (94 men to 6 women) to at least 80:20. The above intention of the GoI itself is an expression of the immense confidence and trust on the capabilities of the PSI in the nation building to relieve the CISF for more vital and critical role elsewhere. Roles and Responsibilities of the CISF It is very vital and essential to understand the roles and responsibilities of CISF when we the PSI decide to step into their shoes. The role and responsibilities of CISF are summarized below: To provide integrated security cover to certain sensitive public sector undertakings including security of important government buildings, iconic heritage monuments and the Delhi Metro. To provide round the clock security to certain VVIPs/ protectees through its specialized VIP security vertical. Post Mumbai terror attack in Nov 2008, the mandate of CISF was broadened to provide security cover to private corporate establishments also. Commonality the key to Compatibility Let us identify as to what is mutually common between both the CISF and PSI in their role and responsibilities. These common features will best be identified to be the key ingredients of the compatibility. The nature of the security spectrum in which both the entities operate is significantly akin to each other which is characterized by the following: Both inherit the legacy of same parentage (MHA). Operate in common security domain through principle of detect, deter, delay, degrade and destroy. Only the degree of threat differs because of size and quality of asset. Security domain is centric to people, property and information. Security survey and security audit are tools of RA and RM applied by both. Prevention of intrusion in the premises through physical presence, sensors and detectors. Patrolling, observation & surveillance of the area are inclusive in tasks of both. Electronic surveillance through CCTV has become main stay of deterrence & crime prevention. Access control, visitor management, vehicle movement & parking control. Baggage scanning at Air Ports and Metro Rail is widely used for detection & prevention of illegal transaction of drugs, narcotics, weapons and explosives. Prevention of smuggling of diamond, gold, silver and other precious metals like uranium and plutonium is again done on similar format. Security of public places with huge footfalls like airports, metro rails, shopping malls and events like trade fairs etc has similar applications of security. Handling of hostage situation/ rescue and active shooter situation is common to air ports and Shopping Malls. Handling of fire incidents and medical emergencies is regular feature in the corporate and industrial complexes. Prevention of terrorist attacks in vital installations is more aligned to CISF than PSAs. Prevention of sabotage in power plants again common to both. Ensuring women safety and POSH is integral to responsibility of both. Salient features of the CISF as a force CISF functions under MHA of GOI and HQ of CISF. Further divided into range/ region, sectors and battalions etc. Functioning is well structured, streamlined, planned, facilitated by provisioning of wherewithal for administration, training, logistics and operations since being integral part of the Govt. Recruitment and training is configured to suit the role and responsibilities. CISF personnel are armed, trained in the use of fire arms and legally authorized to open fire in self-defense and to protect the assets in its jurisdiction. CISF has training facilities to cater for specialized courses on industrial security, IED detection, bomb disposal, X-ray scanning, forensic analysis, fire safety, anti-hijacking, handling of hostage situation, first aid, public speaking, QRT for airport, soft skill, computer awareness and intelligence and weapon handling courses. Challenges Any change in the role and responsibilities of a well-established organization is bound to face myriad of external & internal challenges and resistance. CISF since its inception has shouldered its role and responsibilities in a defined space as a very efficient organization. Since proposed change do not alter the primary function but will be an add on to its existing role, the change may not cause any turbulence or disruption, however, following points need due diligence and application of mind: Sudden and abrupt shift in toto is likely to create opportunities for anti-national elements to…

Read More

How Enterprises Can Protect Their Digital Assets in 2022

Prashanth G J, CEO of TechnoBind Today, almost everything you need to run and manage in an organization is stored online. From digitally preserved company processes, customer, client and partnership data, to your website, login credentials, company emails, team messages, saved conference calls, social media accounts, advertising campaigns, product and service manuals, and every other byte of data that is generated within your organization is your digital asset. Investors value digital assets because they increase a company’s overall worth. Companies can claim expenses and tax deductions against their digital assets because they can be sold separately. They are just as valuable to a company as physical assets, and businesses must take the same precautions to protect digital assets as they would for physical assets. Client and partnership information, login details, business emails, digital chat messages, recorded conference calls, email lists, social media profiles, website content, and more are all considered as digital assets. By 2024, the worldwide digital asset management industry will have grown to $8.1 billion. To preserve their critical information and brand, businesses must ensure that their digital assets are safe and secure. Where to start Protecting digital assets starts by studying the company and creating a thorough inventory of what they possess – and what they might have – they should not ignore something that could be a valuable asset! Start by identifying all of the digital assets the company owns. This stage is crucial because many business owners are unaware of what their company’s digital assets include. Organizations will be able to develop a robust system to secure their digital assets after going through all of these processes and having a comprehensive grasp of their company’s digital assets and intrinsic value. Here are a few steps and practices that enterprises can adopt to protect their digital assets: Locate and list: Although not all forms of data are vital. Organizations need to segregate and prioritize their data. A data asset is something that a business can use to create revenue in the future. Images, digital content, social media, apps, proprietary processes, customer databases, proprietary information, and any organization material or intellectual property protected by copyright, trademark, or patent are all examples of digital assets. Among these digital properties such as customer databases, proprietary information, transactions and interactions etc. are crucial and the ones which help a company to generate income. Organizations can begin by making a comprehensive list of all of these assets. Segregating the data assets on the basis of which would you want or consider valuable if you were buying this company? For example, think of anything that the company has online or on its business’ server that could be valuable. They should be looking for things that are proprietary things that are important for the company to run. Consider these digital assets as crucial items. Protect your network and stay updated: Most firms today rely heavily on their networks. To secure the safety of the company’s digital assets, you must adopt professional network security measures. The most prevalent approach for hackers to obtain access to a company’s digital assets is through security flaws and vulnerabilities. Ensure that the firewall is turned on and that the firmware and software are up to date. Companies should make a habit of updating their operating system and other programmes. Limit access and use secure authentication: Not everyone in an organization requires complete access to all digital assets and applications. Limit application access to only those team members who require it. Organizations can also choose who can see, edit, or download digital assets by setting permissions in certain programmes. For remote workforces, organizations can use a password manager programme to store encrypted passwords online to keep such applications secure. Organizations can use secure authentication, such as two-factor authentication, to offer an extra degree of security in addition to limiting and restricting access (2FA). If a hacker gains access to an employee’s password, the hacker will be unable to access the company’s digital assets. After entering the password, the user is asked to answer a question or enter a second one-time password, which is often given by text message, to validate the user’s identity. Educating employees: Employee education is also important for safeguarding your company’s digital assets. Ensure your employees are familiar with cybersecurity best practices, such as what to do and what not to do when using public Wi-Fi, utilizing their devices, and accessing specific applications. Data backup & data encryption: Copying files and data to a secondary location is known as data backup. A robust disaster recovery plan relies heavily on data backup. Companies who do not take data backup are often at jeopardy from software or hardware errors, data corruption, malicious hacking, user negligence, natural disasters, or other unpredictable circumstances. Backups allow you to recover files that have been lost, erased, or rewritten. Backups can be archived locally on hard drives or storage devices, remotely at another physical location, or on the cloud. This cloud infrastructure could be public, private, or hybrid. Irrespective of the state whether the data is in transit or at rest, it is always vulnerable. To keep data safe while in transit, encrypt it before uploading it. Authenticate the endpoints before decrypting and verifying them at their destination. You must use security access policies to secure data at rest. Control who has access to the data, what data is accessible, and where it is stored safely. Taking cyber insurance into consideration: Cyber insurance can help businesses safeguard their digital assets from cyber threats. It can help companies cover the cost of disaster management and legal expenses, along with the amount spent retrieving the network on the occasion of ransomware attacks. When it comes to recovering from a hack, cyber insurance might make all the difference. When it comes to recovering from a hack, cyber insurance might make all the difference. Addressing the bottom-line Knowing how to safeguard digital assets in the short and long term is critical to your company’s overall value…

Read More

Cybersecurity Research: 76% of Organizations Admit to Paying Ransomware Criminals, with One-Third Still Unable to Recover Data

Businesses are losing the battle when it comes to defending against ransomware attacks, according to the Veeam® 2022 Ransomware Trends Report, which found that 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability to recover data without paying the ransom. Veeam Software, the leading company in backup, recovery and data management solutions that deliver Modern Data Protection, found that 80% of successful attacks targeted known vulnerabilities – reinforcing the importance of patching and upgrading software. Almost all attackers attempted to destroy backup repositories to disable the victim’s ability to recover without paying the ransom. The Veeam 2022 Ransomware Trends Report reveals the results of an independent research firm that surveyed 1,000 IT leaders whose organizations had been successfully attacked by ransomware at least once during the past 12 months, making it one of the largest reports of its kind. The first of its kind study examines the key learnings from these incidents, their impact on IT environments and the steps taken to implement Modern Data Protection strategies that ensure business continuity moving forward. The research project specifically surveyed four IT persona (CISOs, Security Professionals, Backup Administrators and IT Operations) to understand cyber-preparedness alignment across organizations. “Ransomware has democratized data theft and requires a collaborative doubling down from organizations across every industry to maximize their ability to remediate and recover without paying the ransom,” said Danny Allan, CTO at Veeam, “Paying cybercriminals to restore data is not a data protection strategy. There is no guarantee of recovering data, the risks of reputational damage and loss of customer confidence are high, and most importantly, this feeds a self-fulfilling prophecy that rewards criminal activity.” Paying the ransom is not a recovery strategy Of the organizations surveyed, the majority (76%) of cyber-victims paid the ransom to end an attack and recover data. Unfortunately, while 52% paid the ransom and were able to recover data, 24% paid the ransom but were still not able to recover data – resulting in a one out of three chance that paying the ransom still leads to no data. It is notable that 19% of organizations did not pay the ransom because they were able to recover their own data. This is what the remaining 81% of cyber-victims must aspire to – recovering data without paying the ransom. “One of the hallmarks of a strong Modern Data Protection strategy is a commitment to a clear policy that the organization will never pay the ransom, but do everything in its power to prevent, remediate and recover from attacks,” added Allan, “Despite the pervasive and inevitable threat of ransomware, the narrative that businesses are helpless in the face of it is not an accurate one. Educate employees and ensure they practice impeccable digital hygiene; regularly conduct rigorous tests of your data protection solutions and protocols; and create detailed business continuity plans that prepare key stakeholders for worst-case scenarios.” Prevention requires diligence from both IT and users The ‘attack surface’ for criminals is diverse. Cyber-villains most often first gained access to production environments through errant users clicking malicious links, visiting unsecure websites or engaging with phishing emails – again exposing the avoidable nature of many incidents. After having successfully gained access to the environment, there was very little difference in the infection rates between data center servers, remote office platforms and cloud-hosted servers. In most cases, the intruders took advantage of known vulnerabilities, including common operating systems and hypervisors, as well as NAS platforms and database servers, leaving no stone unturned and exploiting any unpatched or outdated software that they can find. It is notable that significantly higher infection rates were reported by Security Professionals and Backup Administrators, compared with IT Operations or CISOs, implying that “those closer to the problem see even more of the issues.” Remediation starts with immutability Respondents to the survey confirmed that 94% of attackers attempted to destroy backup repositories and in 72% of cases this strategy was at least partially successful. This removal of an organization’s recovery lifeline is a popular attack strategy as it increases the likelihood that victims would have no other choice than to pay the ransom. The only way to protect against this scenario is to have at least one immutable or air-gapped tier within the data protection framework – which 95% of those we surveyed stated they now have. In fact, many organizations reported having some level of immutability or air-gap media in more than one tier of their disk, cloud and tape strategy. Other key findings from the Veeam 2022 Ransomware Trends Report include: Orchestration matters: To proactively ensure recoverability of their systems, one in six (16%) IT teams automate the validation and recoverability of their backups to ensure their servers are restorable. Then, during remediation of a ransomware attack, 46% of respondents use an isolated ‘sandbox’ or staging/ test area to ensure their restored data is clean prior to reintroducing the systems into production. Organization alignment must unify: 81% believe their organizations’ cyber and business continuity/disaster recovery strategies are aligned. However, 52% of respondents believe the interactions between these teams requires improvement. Diversifying the repositories holds the key: Nearly all (95%) organizations have at least one immutable or air-gapped data protection tier, 74% use cloud repositories that offer immutability; 67% use on-premises disk repositories with immutability or locking; and 22% use tape that is air-gapped. Immutable or not, organizations noted that in addition to disk repositories, 45% of production data is still stored on tape and 62% goes into a cloud at some point in their data lifecycle.  

Read More

Experience New Possibilities when Hikvision ColorVu Meet other Technologies

To help customers maximize security at night and in other low-light environments, Hikvision has taken ColorVu technology further, combining it with other advanced technologies, like panoramic, varifocal, 4K, AI and more. As a result, homeowners, business owners, security teams, and ARCs can make smarter decisions, react faster to security events, reduce false alarms, and take their security capabilities to the next level. When it comes to ensuring security and safety, seeing every detail is critical – especially in low light conditions. Hikvision developed its ColorVu technology – which provides high-resolution, full-color video imaging in light conditions down to 0.0005 lux, to help homeowners, business owners, and security teams to see exactly what’s happening. But different security scenarios require different points of view, various angles, and AI capabilities. That’s why Hikvision has now combined ColorVu with other technologies – panoramic, varifocal, 4K, AI – which we call ‘ColorVu + X,’ for a broad range of security needs and scenarios – from apartment buildings, residences, offices, and warehouses, to large outdoor spaces such as parking lots. Five ColorVu + X offerings for improved security, safety, and efficiency In the following sections, we outline how ‘ColorVu + X’ works to help customers take their site security and safety to the next level. ColorVu + Panoramic: The whole scene in vivid color Large areas can be very difficult to secure, often requiring multiple cameras to provide full coverage. With traditional cameras, monitoring these kinds of areas can also be difficult, or even impossible in low light conditions, or at night. To address all of these challenges, Hikvision has integrated ColorVu into its industry-leading panoramic cameras, which use the image fusion technologies to stitch together images from two side-by-side lenses for a seamless, 180-degree view. The results are reduced equipment requirements (with fewer cameras needed to cover large areas); improved situational awareness based on a single, wide-angle image and no blind spots; and the ability to capture every detail in full color – even in the dark. ColorVu + Varifocal: Zoom in with vivid color Cameras with zoom capabilities are more flexible to adapt to various installation environments, making product selection and installation easier. The challenge here is that this process can reduce the amount of light entering the lens, reducing the clarity or color of images. Hikvision has addressed this by integrating ColorVu technology into its varifocal (zoom) cameras. By combining ColorVu with a fixed F1.0 large aperture in the camera, Hikvision guarantees image brightness and full color as the camera zooms in and out. ColorVu + 4K: Capture richer, more colorful details Traditional cameras may lack the resolution to provide clear, full-color video images in lower light conditions. Hikvision overcame this challenge by integrating ColorVu technology into advanced 4K cameras. The results are clear, crisp imaging, fluid footage previews and playback, and enhanced color imaging in low light conditions, or at night. ColorVu + Live Guard: Deter trespassers and intruders from causing harm While most security systems can detect intrusions and other security incidents, goods and property can still be lost or damaged before teams can respond. Hikvision tackles this issue by integrating ColorVu technology and Live Guard sound and light alarms into selected camera ranges. While ColorVu technology captures detailed video footage of security incidents in high resolution and full color, Live Guard sirens and strobe light alarms let trespassers know they have been detected, deterring them from entering a site or building. Notifications of intrusions and other events can also be sent to homeowners, business owners, or security teams in real time, supporting faster, more effective responses. ColorVu + Deep Learning: Smarter security detection 24×7 Often, security systems are unable to differentiate between moving objects – such as falling leaves, heavy rain, and moving animals, and real security threats – such as people breaching a site perimeter. To overcome this, Hikvision has integrated ColorVu into its AI-powered cameras with AcuSense. These reliably identify real security threats, such as people and vehicles, and send alerts to security teams in real time. At the same time, false alarms are minimized, reducing workloads and costs, and increasing efficiency. With ColorVu and AcuSense together, customers get intelligent, proactive security, with high-resolution, full-color video imaging.  

Read More