securitylinkindia

AI Powered Unified Video Computing Platform is Now ONVIF S, G, T, M Compliant

Videonetics announces that its patented and state-of-the-art Unified Video Computing Platform (UVCP™) is now ONVIF S, G, T, M Compliant. Powered by AI and DL framework, Videonetics Unified Video Computing Platform encompasses Intelligent VMS, Video Analytics, Intelligent Traffic Management System, Facial Recognition, and Video Computing Platform as a Service (VCPaaS™). Today, Videonetics has secured more than 145 cities, 80+ airports, 18000+ traffic lanes and 100+ large enterprises across many geographies. Videonetics has always been at the forefront of innovation and developing strong relationships with their partners. Profile S allows the common functionalities shared by ONVIF conformant video management systems and devices such as IP cameras or encoders that sends, configures, requests or controls the streaming of media data over an IP network. The profile includes specific features such as pan, tilt, zoom control, audio streaming and relay outputs. “Receiving ONVIF ‘S, G, T, M’ conformance for our AI enabled Unified Video Computing Platform is a benchmark and achievement for us. Achieving ONVIF compliance empowers our partners and customers to integrate a wide range of IP based video surveillance devices that are best suited for their projects while ensuring flexibility and integrity. Videonetics is committed to continue adopting open standards for better interoperability and openness” Tuhin Bose VP & CTO, Videonetics Profile G specifications allow software and hardware products from different vendors to be compatible with one another, when it comes to the recording, search and replay of video on board a network video product. Profile T supports video streaming features such as the use of H.265 over and above H.264, MPEG-4 and MJPEG encoding formats, imaging settings, and alarm events such as motion and tampering detection. These encoding formats ensure high compression efficiency which results in less disk storage space and less bandwidth usage for streaming, reducing overall costs of system ownership. Conformance to Profile M enables easier integration of metadata and events with ONVIF Profile M conformant clients like video management software and services. It has interfaces for generic object classification, and specified metadata for geolocation, vehicle, license plate, human face and human body.  

Read More

Combating Financing Terrorism in India

By Colonel B. S. Nagial (Retd.) On 11 September 2001, terrorism crossed all the boundaries and became faceless yet a lethal weapon after it struck the US. The magnitude of the attack, the targets chosen, planning and infrastructure involved were beyond the imagination of scholars, security analysts and the policy makers. Since then, it has stimulated new national and international endeavours to track the ways and means of terrorist funding to clog them effectively. Nevertheless, evidence on terrorist sustenance edifices is challenging to stumble upon and even if it comes out, it is vague and mostly unreliable. Maybe only the intelligence and security agencies have a specific inkling of the roots and extent of financing terrorism. For example, investigators in the US believe that terrorists had spent about US$5,00,000 to carry out their 9/11 attacks. However, it will likely cost the US at least $100 billion to repair the damage. Terrorist organisations require funds to survive, thrive and carry out terror and violent actions. The financing of terrorism involves the resources of revenue and methods undertaken by terrorist organisations to fund their nefarious activities. The required funds could be generated through permissible sources such as profits from businesses and charitable organisations. But generally, terrorist organisations get the money from illegal resources such as the smuggling of arms, ammunition, logistic stores, drugs, etc. or kidnapping for payoff. Combating the financing of terrorism is an extremely intricate venture which involves multifaceted activities and players. It requires both legislation and ground-level operations involving different agencies. Taking a stride in the direction of combating terrorist financing, the United Nations Office of Drugs and Crime (UNoDC) issued the guidelines through the International Convention for the Suppression of the Financing of Terrorism in 1999. By implementing these conventions, the member nations could develop capacities of criminal justice and law enforcement agencies to investigate, prosecute and adjudicate terror financing. To track the financing of terrorism in India, a Terror Funding and Fake Currency (TFFC) cell has been set up under the supervision of the National Investigation Agency (NIA). It focuses on terror funding as well as fake currency notes. India has also strengthened the provisions enumerated in the Unlawful Activities (Prevention) Act 1967 to combat terror funding. It is the responsibility of all States and Union Territories to prevent the financing terrorist networks. The main aim of persons or entities involved in terror funding is to conceal the sources of money and funding activities. Money laundering is the process of concealment and camouflage of illegal origins and proceeds of criminal activities dealing with money. In both cases, the illicit use of the financial sector is involved. The most disturbing fact is that money laundering equips corruption and organised crime. The techniques used in money laundering and financing terrorism are similar, identical, and somewhat overlapping. Therefore, anti-money-laundering/ countering terror financing must address both these risks. Today, the world is technology driven. Swift developments in financial information, technology, and communication permit money to travel worldwide easily and quickly. This makes the job of anti-money laundering/ combating terror financing more dynamic and challenging. Terrorists frequently change their methods and means of raising and moving funds & other assets to hide their activities from the agencies involved in countering them. Thus, it is imperative to identify correctly, assess and understand the mechanism of funding terrorism. This is very crucial for the disruption and dismantling of terror funding networks. Modus Operandi of terror funding Terrorists need funds to function as an organisation. With the money, they buy arms, ammunition, and other warlike stores. Their sources of funding could be both legal and illegal. Funding generally takes place in small amounts. Terror financing is a worldwide phenomenon threatening the world community’s peace and security and weakening economic development and market stability. Therefore, it is essential to curb the flow of funds to terrorist organisations. Though terrorist organisations and their tactics have evolved, yet the primary requirement of the terrorists to raise, move and utilise funds has not changed over a period. The funds are mobilised in numerous ways, such as exploiting legitimate commercial ventures and natural resources, abuse of non-profit organizations, non-governmental organisations, and crowdfunding sites. Terrorist organisations might also be directly or indirectly associated with organised inimical groups/ people. They might involve them in felonious actions, such as drugs, arms trafficking, human trafficking, blackmailing, and kidnapping for money. Nations are always worried about terrorists’ ill use of the Internet and other emerging technologies to garner and move funds, including through virtual currencies. Tracing measures and scrutiny of financial intelligence provide critical information on terrorist networks and their links with individual terrorists and Foreign Terrorist Fighters. Terrorism in India Terrorism in India could be divided into four major categories as Terrorism in Jammu and Kashmir, Terrorism in the hinterland, Left-Wing Extremism (LWE) and Insurgency in Northeast states of India. Their activities include terrorism, secession, smuggling, production and circulation of Fake Indian Currency Notes, terror funding, etc. According to the accessible intelligence reports, terrorists who are in action in India are frequently reinforced and financed by their parent organisations located outside, predominantly in Pakistan, in the forms of shelter, training, weapons and finance. Countering terror funding and anti-money laundering in India There are four components of the financial market in India – banking companies, financial institutions, the securities sector, and insurance companies. A fully functional Financial Intelligence Unit (FIU) was established in the country in 2006 as a chief national agency in charge of receiving, processing, analysing and disseminating information relating to suspect financial transactions to enforcement agencies and foreign FIUs. It reports directly to the Economic Intelligence Council (EIC) under the Finance Minister of India. The other members of the EIC are heads of all the intelligence agencies, the Governor RBI, and the Chairman of SEBI. Agencies involved in the AML/ CFT system The Ministry of Finance is accountable for fiscal policies in India, including revenue and tax collection, budgeting, and expenditure of the Govt of India. Department of Revenue oversees monitoring…

Read More

PRAMA opens brand stores in Chennai and Kochi to expand its footprint in South Market

India’s premier indigenous security and surveillance product manufacturing company, Prama India has opened brand stores in Chennai and Kochi to expand its footprint in the South market region. Prama India in association with a trusted partner Pelikan Office Automation has launched its brand store on October 7, in Chennai. The inauguration of Prama Brand Store was attended by the leading dignitaries and security business community. The newly opened PRAMA brand store will help to make latest PRAMA security products available for partners in the Chennai region. Pelikan Office Automation Pvt. Ltd. is a trusted partner of Prama India, it has carved a niche in the security industry by setting a new benchmark. “We are happy to be an integral part of PRAMA brand store launch in Chennai. We are inviting all the stakeholders of the security industry in the South region to experience the wide range of indigenously manufactured PRAMA security products at our brand store. We will be happy to serve your product requirements by providing it promptly,” said S. Harish, CEO, Pelikan Office Automation Pvt. Ltd. Commenting on this momentous occasion, Ashish P. Dhakan, MD & CEO, Prama India Pvt. Ltd. said, “This grand store opening event signify our focus on the South region. It is a glorious moment for all the security professionals associated with Prama India. PRAMA brand store is dedicated to serve the security requirements in and around the Chennai. This is just the auspicious beginning of a journey, we will strive for exponential growth and expansion of the brand at a pan-India level. Our store is specially designed to showcase best-in-class products and solutions. He further added, “We are hopeful that the store in Chennai will be able to serve the security professionals in the Tamil Nadu region to source the latest PRAMA Security        and Video Surveillance Products. We extend our best wishes to Mr. S. Harish, Director, Pelikan Office Automation Pvt. Ltd. We hope that this initiative will help to create a new success story with PRAMA ecosystem partners.” Prama Opens Brand Store in Kochi Prama India has opened its brand store in Kochi to expand its footprint in the Kerala region.The first-of-its-kind store, located in Kochi, features PRAMA’s wide range of Video Security Products and Solutions. Prama India in association with a trusted partner OXOLAB has launched its brand store on October 18, in Kochi. The Prama Brand Store was inaugurated by Mr. Ashish P. Dhakan, MD & CEO, Prama India Pvt. Ltd.  and Mr. Abdulla Khan, CEO, OXOLAB. The event was attended by the leading dignitaries and security business community. The newly opened PRAMA brand store at Kochi will help to showcase the latest PRAMA security products in the Kerala region. OXOLAB is a trusted partner of Prama India, it has carved a niche in the security industry by setting a new benchmark in the distribution business. “We are happy to launch the Kerala’s first PRAMA brand store in Kochi in association with Prama India. All prospective partners are welcome to experience the wide range of indigenously manufactured PRAMA security products at our brand store. We will be glad to serve your product requirements by providing it promptly,” said Abdulla Khan, CEO, OXOLAB. Commenting on this momentous occasion, Ashish P. Dhakan, MD & CEO, Prama India Pvt. Ltd. said, “PRAMA Brand Store is a significant step in the direction of creating new, and holistic product experiences for all the stakeholders of the security industry in the Kerala region. This grand store opening event signifies our long term focus and commitment to the partners. It is a glorious moment for all the security professionals associated with Prama India. PRAMA brand store is dedicated to serve the security requirements in and around the Kochi. This is just the auspicious beginning of a journey, we will strive for exponential growth and expansion of the brand at a Pan-India level.” He further added, “We are sure that the PRAMA store in Kochi will add value to the security professional community in the Kerala region by providing the latest PRAMA Security        and Video Surveillance Products. We extend our best wishes to Mr. Abdulla khan, CEO, OXOLAB. We hope that this initiative will help to create a new success story with PRAMA ecosystem partners.”  

Read More

Cloud Adoption Measures to Keep in Mind with Increasing Cyber Threats

Amarjeet Singh Manchanda Vice President – Data Centre & Cloud Business, iValue InfoSolutions Majority of the organisations are expanding their network and accelerating their adoption of the cloud. Organisations continue to build new cloud-based applications or migrate current ones. This is because Cloud allows for pervasive, convenient, and on-demand network access to a shared pool of programmable computer resources. According to new Confluera research, the majority of enterprises are speeding up their cloud adoption, with 97 percent of IT leaders admitting that their plan includes expanding cloud installations. In today’s cloud world, the report looks at how IT leaders discover, evaluate, and respond to cybersecurity threats. Although there are numerous advantages of using Cloud, there are also some major concerns. Security is one of the biggest impediments to the adoption of the cloud, followed by concerns about compliance, privacy, and legal challenges. Understanding the Cloud Vulnerabilities Organisations should be aware that the security vulnerabilities associated with cloud migration are constantly evolving. Adopting cloud technology or choosing cloud service providers (CSP)s and applications without understanding the risks involved exposes an organisation to a slew of financial, technical, legal, and compliance risks. Apart from these, it is important that enterprises consider other challenges and risks associated with cloud adoption specific to their processes, systems, data and the ones listed above are far from exhaustive. A company’s cloud journey will be fraught with dangers; all it takes is for them to recognise the risks. The security hazards of cloud computing differ slightly depending on the delivery model, even though most of the hazards apply to all cloud solutions. By taking the time to identify and assess these risks, businesses can ensure that they have the right processes and tools in place to minimise them. Here are five notable threats, risks, and vulnerabilities in cloud environments: Data Breaches & Loss Data breaches are one of the most significant security dangers of cloud computing, with costly ramifications for businesses of all sizes and industries. A data breach may occur when a security breach allows unauthorised access to sensitive information. The other most likely possibility is critical cloud resources would be irreparably corrupted. If you don’t back up your most crucial data, it’s always a possibility that it will be lost. Many significant, high-profile data breaches are caused by preventable cloud security vulnerabilities. A potential Insider Threat Insiders do not have to be malicious to be a security threat. Insiders do not need to break through firewalls, virtual private networks (VPNs), and other security defences as they are on a trusted level, due to which, they can access networks, computer systems, and sensitive data directly. If organisations don’t think carefully about their cloud governance model, their own employees can inadvertently put them at risk. Misconfiguration & Poor Access Management When computing assets are set up incorrectly, they become vulnerable to malevolent activity, which is referred to as misconfiguration. Unsecured data storage elements, excessive permissions, unchanged default credentials and configuration settings, standard security controls left disabled, unencrypted systems, and unrestricted access to ports and services are all examples of misconfiguration. Organisations today are adopting the cloud without a comprehensive plan that integrates their identity access management (IAM) programme with their cloud environment. A Lack of secure cloud architecture and strategy It’s a fallacy to assume that organisations can simply ‘lift and transfer’ their existing internal IT stack and security measures to the cloud. Moving, implementing, and operating in the cloud safely requires the right security architecture and strategy. However, if the cloud-based infrastructure interfaces are not properly secured, this can lead to problems. Insecure Interfaces/ APIs Organisations and clients are frequently provided with a variety of application programming interfaces (APIs) and interfaces by CSPs. These APIs are well-documented in general to make them as easy to use as feasible for CSP clients. If the API is configured incorrectly, it can expose the organisational data to vulnerabilities that will provide anonymous access without authentication which will eventually lead to potential cyberattacks. Factors to consider when choosing Cloud Services Organisations should investigate cloud access and entitlement management systems that enable visibility across all cloud resources as well as uniform enforcement and management of access controls to protect against the security threats of cloud computing. Furthermore, organisations need to consider implementing a cloud governance framework. It is a set of rules and policies that run services in the cloud. The purpose of cloud governance is to improve data security, control risk, and ensure that cloud systems run smoothly. Cloud governance incorporates cloud access and entitlement management into their overall identity management model. Organisations may use their existing identity procedures, workflows, sign-offs, and reporting for their cloud environments by implementing this identity-centric approach to cloud governance, simplifying administration, strengthening security, and facilitating compliance. Some more integration to manage cloud security: Firewalls Firewalls guard the perimeter of a company’s network security as well as its users. Firewalls help keep traffic between cloud-based apps safe. They act as initial shields against potential attacks. Identity and access management (IAM) Enterprises can deploy policy-driven enforcement processes for all users attempting to access both on-premises and cloud-based services using IAM tools and services. Its primary function is to create digital identities for all users so that they may be actively monitored and limited as needed during all data transactions. Data loss prevention (DLP) DLP services provide a range of tools and services that are designed to keep regulated cloud data secure. DLP systems secure all stored data, whether at rest or in motion, using a combination of remediation alerts, data encryption, and other preventative measures. Intrusion Management The advent of virtualisation and enormous multi-tenancy is creating new targets for intrusions, posing many problems about how to implement the same protection in cloud environments. Intrusion management is the process of monitoring and responding to statistically unpredictable events using pattern recognition. This could include real-time reconfiguration of system components to stop or prevent an intrusion. Security Information and Event Management system A SIEM gathers and analyzes data…

Read More

Why Should Businesses Outsource Their Security Operations Center (SOC)

Manish Chasta, Co-Founder and CTO at Eventus The journey towards digitalization and cloud solutions that enhance productivity gains, increase agility, and reduce operational costs has rapidly and continuously expanded security vulnerabilities for most businesses. Businesses must supervise their entire IT infrastructure to comply with security requirements in the current digital environment, and Security Operations Center-as-a-Service (SOCaaS) is the most efficient way to do so. Why is SOCaaS Essential As workplaces become more mobile and remote, cybercriminals are ramping up their attempts to access applications, systems, services, and data both on-premise and in the cloud from outside the company network. Today, most businesses have made significant investments in on-premise and cloud security monitoring systems to secure sensitive data, comply with an increasing surface of data protection regulations, and defend intellectual property and other confidential data. However, this has catapulted in an overwhelming volume of security alerts. It is exceedingly difficult for the majority of these companies, particularly the small and medium-sized ones, to probe and evaluate every alert. SOCaaS enables security analysts to make a coherent effort to cover all cyber security risks and centralized threat surveillance abilities. Another significant driver has been the scarcity of cyber security skills, affecting companies of all sizes. SOCaaS enables you to take advantage of SOC resources without having to worry about employing qualified personnel. SOCaaS also allows for rapid capacity expansion at a much-reduced cost than establishing additional capacity in-house. Why Outsource SOC The Security Operations Center is a team consisting of cybersecurity experts and trained engineers, who are dedicated to performing advanced IT security operations. SOC services are aimed at preventing any threats to cybersecurity by early detection and response to any incident of hacking or data breach. It is a subset of cyber security that keeps a detailed real-time awareness of an organization’s assets in order to avoid threats and attacks. Organizations at times may not have the necessary workforce to be dedicatedly working on thwarting cyber attacks, or their current resources may not be enough or may have other areas to take care of, like IT support. To address this issue, Managed Security Services Providers (MSSP) can be employed to uphold your company’s security. Outsourcing SOC can help an organization enable: Reduced Expenditure: Outsourcing your cyber security monitoring to expert professionals means reducing the cost. To begin with, acquiring an employee with the necessary cyber security skill sets is not simple and at times not feasible. Additionally, having an in-house security team would certainly require you to purchase all necessary security solutions, which may be at times, difficult to choose from, and increasing complications. A dedicated SOC partner will be equipped with all the necessary solutions and resources, and will be entirely responsible for the designated tasks, which is the security of your organization. Ceaseless Support: Outsourcing a SOC implies uninterrupted support. An SOC partner will constantly monitor the company network systems round-the-clock, with real-time support, alerts and reporting, a viable way to ensure continuous support and service. They will also run checks for detecting anomalies in the network, mostly looking for preying malwares or breach attempts. Facilitates Greater Efficiency due to Global Visibility: Outsourcing SOC has the greater edge of broadening the scope of security protocols. While an in-house team is constantly monitoring attacks launched against the parent organization, SOCaaS has direct exposure to a wealth of information from numerous customers around the globe. MSSPs gather and supervise threat intelligence from a wide range of sources, providing them with constant insight into major cyber-attacks and evolving cyber-crime methodologies. This data enables cyber security service providers to work more efficiently against cybercrime. Enhances Business Productivity: Security is critical for every organization, requiring time and attention. When there is a security breach, management must divert their attention to the operations of the SOC. This disrupts the business environment in general and distracts employees’ attention away from their primary duties. With an SOC partner taking care of the affairs, both organizations and employees are completely focused on the core business processes without being distracted by security challenges. Bottom-line Going in-house with security measures may not be an ideal tactic in today’s times, when bad actors are miles ahead in terms of technology and resources required to ambush any business today. Keeping that in view, the most appropriate strategy to rising cybersecurity concerns is to outsource an SOC. Go for a partner who is well updated with all security trends, threat detection and incident response tactics, and collaborated with all leading solution providers best available to ensure your cyber network is with the safest hands.  

Read More

Luxury Casino Selects Idis to Secure High-Stakes Poker Tournament

IDIS has been selected to provide advanced video technology to protect a high-stakes poker tournament in a luxury casino in Northern Cyprus. The Merit Royal Hotel and Casino offers an exciting gaming environment for guests, with the world’s largest roulette table (with a diameter of 20 metres), 950 of the latest slot and gambling machines, 63 live gaming tables and a number of luxurious VIP lounges. To enhance security in preparation for the World Poker Tour’s Texas Hold’em poker tournament, as well as to ensure the safety of VIP guests, a video surveillance upgrade was required within weeks. The casino needed to have comprehensive coverage, not just to secure premises but to also protect against fraud and theft as well as to fulfil legal requirements set by local regulators. Volga Elektronik was awarded the installation contract and deployed a robust, end-to-end IDIS solution. To improve video coverage of gaming tables and the casino floor, Volga’s engineers installed IDIS 5MP dome cameras with motorized lenses, true WDR and IR up to 30 metres, delivering exceptional high-resolution images in varied lighting conditions. Seamless DirectIP® plug-and-play connection of the cameras, 24 PoE switches with 64-channel network video recorders (NVRs), which come pre-installed with IDIS Solution Suite (ISS) VMS, meant cybersecure, yet rapid and hassle-free installation for Volga’s engineers. ISS Expert provides control room staff with an easyto-use VMS designed for mission-critical surveillance operations including administration, video wall monitoring, streaming, and recording services. The rich feature set allows operators to detect, verify, analyse, and rapidly respond to security and safety events and meet the requirements of regulatory gaming integrity. The solution from IDIS, the largest manufacturer of trusted South Korean-made video tech, encourages honest and fair game play and provides operators with complete visual awareness of the gaming tables, casino floor, lounges, and other key areas. Seamless plug-and-play connectivity ensured a rapid installation, completed in time for the high roller tournament. With a transparent, one-off license payment for ISS and no ongoing software or device connection fees, reduced storage costs, and easy and simple maintenance, the casino is benefiting from the IDIS promise of a low total cost of ownership. Malik Oğuz, Director of Security Systems at Merit Royal Hotel and Casino said, “IDIS video technology is providing high performance yet intuitive surveillance operations with exceptional image capture. Our security team can quickly and efficiently respond to incidents and resolve disputes to reduce table stoppages. The result is an enhanced patron’s experience that builds on our reputation as one of Europe’s top gaming destinations. The resort can now benefit from a truly scalable and future-proof solution, with the assurance of a low total cost of ownership.” Muhammet Ali İpek of Volga Elektronik added, “Merit Royal is delighted with the end-to-end IDIS video surveillance solution that meets the complex security demands of worldclass casino gaming to create a safe and welcoming environment for VIP guests. We are looking forward to expanding the system across the resort and other Merit International hotels.” The Merit Royal already has plans to extend the system to cover hotel facilities and spacious outdoor areas, featuring two swimming pools, gardens, and a private beach.  

Read More

AI Eliminates Effects from Water Reflections and Waves

Dallmeier, a leading manufacturer of video security technology, introduces an AI-based video analysis application that reliably detects watercraft on open water surfaces despite wave impact and light reflections. The software application helps, for example, port operators and refineries to protect themselves against unauthorised access from the water side and associated risks (e.g., terrorist attacks, piracy) as well as to comply with legal regulations such as the ISPS Code Developed under real-world conditions The specially developed, AI-based Dallmeier video analytics app ‘SEDOR® AI Ship Detection’ reliably detects large ships and small boats on open water surfaces – even under naturally difficult environmental conditions such as waves and water reflections. The core of the solution is a specially trained neural network that enables powerful AI object recognition of ships and boats. The solution was developed in cooperation with a port customer: Through a multitude of images and videos of real conditions, the neural network was able to consider and learn the specific requirements ‘at sea.’ Thus, the software can deliver reliable results by analysing the defined monitoring area in an adjustable cycle. If a ship or boat enters this area, the software issues a message. The false alarm rate is reduced by up to 99 percent compared to conventional analysis systems. Hazard prevention in real time “ As a refinery with a tanker port, we are at risk of small watercraft entering the transhipment area without permission. The Dallmeier solution notifies us when such watercraft pass our port basin entrance,” said Bernd Birnbacher, Head of Refinery Security at HOLBORN Europa Raffinerie, “This allows us to react immediately to a potential danger and once again significantly increase the level of security towards the water side. The Dallmeier solution also helps us to meet the requirements of the ISPS Code.” André Haack Managing Director Dallmeier Systems GmbH Hamburg Photo Credit: Dallmeier electronic “We developed the video analysis app so that companies located by the sea can further improve their security and protection on the water side. However, application scenarios to improve business processes are also possible, which was entrusted with the implementation of the project, “For example, a container terminal operator can optimise its workflow by receiving automatic notifications when watercraft enter its port facility. Commercial port operators can also think of a variety of possible applications” The SEDOR® AI Ship Detection App is designed for optimal use in combination with Dallmeier network cameras and Panomera® systems.  

Read More

A Gujarat Government Agency Trusts Matrix for Modern and Proactive Communication at its New Gandhinagar Facility

The Gujarat Maritime Board (GMB) was founded in 1982 under the Gujarat Maritime Board Act, 1981. GMB is a government agency of the Government of Gujarat, a state of India. It controls, manages, and operates a total of 44 minor ports of Gujarat including some with private companies and 10 offices. From 3% of the total national port traffic handled by minor ports of Gujarat in 1982-83, they grew to handle 31% of total national port traffic in 2016-17. They also handle 71.3% of all minor port traffic in India. In 2018-19, minor ports of Gujarat handled a total of 542MMT of cargo. They are one of the fastest-growing Gujarat government marine agencies. Challenges As a rapidly and constantly sprouting Gujarat government marine agency, the GMB decided to develop a new corporate space at the Gandhinagar Gift City. On account of the same, they required a strong communication architecture to be installed that fulfills all the needs of a modern corporate enterprise. They required a solution that gives them a single platform unification of numerous business essentials. Their prime demands from the proposed solution can be summed up as: Corporate-grade professional communication. Hassle-free workflow management. Single box solution for multiple networks. Smooth communication without wired connectivity. Secure business connectivity. Unified services for better collaboration. Solution Matrix studied the challenges in-depth and crafted a custom solution by proposing an IP-based UC platform along with IP extensions and gateways. The solution was designed to be well-equipped to manage all business communications from one place. The PRASAR UCS added in the solution suffices the much-needed – Collaboration, Communication, Messaging, and Mobility for any corporate space. Unifying all the communication networks and devices provides users with the flexibility of accessing the calls, messaging, and voicemails from any of the devices irrespective of their location. Matrix also kept in mind the modern enterprises’ search for solutions that are future-proof, long-lasting, and hybrid in certain areas that give them a comprehensive solution. They prefer a system that is cost-effective on multiple fronts. This led the solution to be further developed with the addition of gateways, both VoIP and PRI. Finally, the solution was fully proofed by deploying two different levelled IP extensions as required. The IP extensions were picked with a crisp vision of balancing user convenience and advanced call management. Results Matrix successfully understood their communication requirements and deployed an apt IP solution that exactly take their needs. This helped the GMB by facilitating the following communication features: A modern IP solution that is advanced as well as pocket friendly. Next-generation communication technology for a future-proof investment. Redefined call management with 100+ business calling features. Unified communication on a single universal platform. Workspace collaborations for less time wastage and more productivity. Enhanced ease of management with web-based UI. 24×7 emergency-ready corporate connectivity. Increased employee responsiveness for more efficiency Access to new-age multi-location/ remote communication mobility. Robust and least-maintenance hardware architecture. Minimum-downtime software for consistent communication. Products and Solutions Offered PRASAR UCS hosted on SPARK200 This Matrix IP-based Unified Communication Server is a combination of hardware, SPARK200, and software PRASAR UCS. With IP-at-core, PRASAR forms the basis of a Voice over IP solution for modern-day business enterprises that connects internal and external decision-makers at multiple locations for effective communication and real-time collaboration, while making the most of the existing telecom infrastructure. It is a platform that enables modern enterprises to use a single service for various mediums for communication like SMS, E-mail, Voice-mail, Instant messaging, Presence sharing, Audio-Video calling, and Audio-Video conferencing. It provides high-speed and HD quality audio-video collaboration with multiple units established over various geographies to accelerate organizational growth by bringing employees together anytime, anywhere, and catering smooth reachability to the target business audience. MATRIX Series of IP Extensions SPARSH Series of IP Extensions are elegantly designed to offer reliable performance, quality of business communication, and efficient call management. It provides high-quality speakerphone, programmable features and DSS keys, corporate directory, message wait lamp, voice mail, and an intuitive user interface. SPARSH VP510E: This premium business IP phone sets the benchmark for quality performance with its elegant design and crystal-clear voice. SPARSH VP510E features a vivid LCD Graphical Display, Context-Sensitive Keys, Direct Station Selection (DSS) keys, 32 Keys Expansion Module, Headset Connectivity, High-Quality Full Duplex Speakerphone and High-Definition Audio Quality. SPARSH VP210: This entry-level Gigabit IP Phone SPARSH VP210 redefines the desktop telephony experience and quality of business communications. SPARSH VP210 provides features and functions normally available in high-end such as 128×64 pixel, backlight graphical LCD, 5-line display, context-sensitive keys, Full-duplex Speakerphone, Integrated PoE, Gigabit Ethernet, and a broad array of Call management Features. SPARSH VP210 finds its applications in call centers, enterprises, small businesses, branch offices, and government sectors. MATRIX Range of Gateways The future of business connectivity is encapsulated in this next-gen solution range – Matrix Media Gateways. This advanced network bridging solution offers interfaces for multiple networks. It can be used with any existing PBX without changing their existing telephony infrastructure or in a standalone mode too. It works as an adjunct and supports flexible routing options, providing significant cost savings and round-the-clock connectivity. SETU VTEP: The SETU VTEP Multiport VoIP-PRI gateway supports PRI protocol and adopts standard T1/ E1 trunk interface and provides a smooth transition by enabling direct routing of calls between the fixed-line ISDN and the cost-effective IP networks for capitalizing on low-cost VoIP telephony. By integrating a VoIP-PRI gateway with existing PBX telephone systems, businesses of all sizes can benefit from low-cost voice-over IP calls and achieve substantial cost savings without the high upfront costs associated with communications infrastructure changes related to the migration to VoIP. SETU VFX: SETU VFX series is a range of multi-channel VOIP – FXO and FXS Gateways. VFX series offer 4-8- 16-32 FXO/ FXS Gateways to connect TDM based telephony infrastructure to an IP network. For organizations that have already migrated to IP, SETU VoIP Gateways provides a POTS trunking option. Ideal for legacy TDM phone systems, these Gateways offer access to…

Read More

LED Displays from Hikvision Give a Dubai School Auditorium the ‘Wow Factor’

In order to turn its auditorium into a multi-purpose venue, and to improve the general visual experience, Dubai’s GEMS Modern Academy replaced their legacy projection system with a massive LED wall from Hikvision. The renovated auditorium has become a popular venue for students, staff, and the community. Challenge Turning the school auditorium into a multi-purpose performance venue With the numerous approaches to entertainment available today, and with audiences’ surging demand for rich, high-quality content display and immersive sound and video. As a result, venues such as showrooms, studios, auditoriums, and lecture halls are dabbling in a host of new technologies and applications to achieve the ‘wow factor’ audiences are looking for. GEMS Modern Academy is one of these venues. Offering Curriculum to children from kindergarten to grade 12, GEMS is one of the top ten schools in Dubai. Its large auditorium holds 500 seats for school events and can be rented out for private events on weekends. Originally, the auditorium had a large projection screen on the stage to display presentations, images and videos. However, every element in the environment could take away from the image quality, from sunlight coming in through windows to the whiteness of the screen, the distance from the projector, the age of the system, and more. Ritesh Dhanak, Head of the IT team at GEMS Modern Academy said, “The projector system was not good enough with the ambient lighting. In order to create a better experience in our auditorium, and to pave the way for it to become a community hub, we need to do a complete upgrade to our live audio, stage lighting and visual display systems,” To achieve this, Mr. Dhanak worked with Almoe AV Systems, a renowned distributor and solutions provider of professional audio visual & IT products in the UAE. Almoe helped the school to upgrade the auditorium’s touch control systems, matrix switchers, stage lighting, and speaker systems. For the most crucial part of the solution – the visuals – they worked with Hikvision to install a new LED display. The solution A massive Hikvision LED wall and movable LED side-walls LED displays offer many advantages, including flexibility and modularity. Therefore, the school decided to install a massive LED screen at a width of 12.48 meters, a height of 4.86 meters, and a pixel pitch of 2.5mm at the center of the auditorium stage. The massive LED wall is made up of nine pieces of P2.5 Fine Pixel Pitch LED Display Units (DSD4425FI-CAF). The wall delivers an outstanding color gamut and contrast ratio to create remarkably refined images. For the setup, GEMS Modern Academy preferred to make the two sides of the screen removable to ensure flexibility on the stage, as well as to have multiple videos broadcasted on the screens simultaneously. Four smaller side-screens were designed to be 2 meters wide and 5 meters high, with a pixel pitch of 2.9mm. They were installed on the two sides of the massive center screen. Each side-wall was composed of four P2.9 Indoor Rental LED Displays (DS-D4429RI-CAF). The two side-screens are used as backdrops, and can be easily removed when they are not needed. The LED walls are managed using Hikvision’s Video Wall Controller (DS-C10S-S11T), which supports up to 3840×2160 resolution at 30Hz from multiple signal sources (VGA, DVI, HDMI, SDI, YpbPr, DP and HDBaseT). This enables the school faculty to easily manage multiple video and audio inputs and outputs. The benefits Excellent visual experience for audiences makes the auditorium a popular venue for students, staff, and the community Hikvision’s LED wall has vastly improved the visual performance of lectures and events held at the auditorium. With an extremely bright and clear image displayed, the screen loses none of its sharpness, color, or coherence, even when viewed at an angle or when the auditorium is brightly lit. “The LED wall provides high-quality visuals, and is perfect for our large auditorium,” said Mr. Dhanak, “Unlike with the old system, we don’t have to dim the lights in the auditorium during lectures, presentations, or live performance, and this allows students to take notes, remain more attentive and, for remote viewers joining via web conferencing, see the auditorium clearly.” In the end, the video wall displays excellent visuals, adapts to ambient lighting conditions, and offers unique flexibility with the removable sidewalls. As a result, Hikvision’s LED display solution has turned the auditorium into a venue that fits all kinds of events. Since the LED screens have been installed, the school has hosted a large number of events at the auditorium, such as school lectures, stage plays, and musical performance. In addition, the venue has also been rented out for many private events such as public presentations and speeches. Impressively, the venue has also been used to host a TED Talk, one of the most popular lecture platforms in the world. Mr. Dhanak concluded, “With a large multi-purpose auditorium providing such excellent visual experience to the audience, events at GEMS Modern Academy are now on a different level and our auditorium is a much sought after event space in the community.”  

Read More

Insider Threat Protection: Why Employees Leak Companies’ Data and How to Prevent It

Alexey Parfentiev, Senior Business Analyst, SearchInform The biggest part of data leaks, which have ever been reported in various mass media sources, happened because of affected organizations employees’ fault. Some of them simply made a mistake, some of them acted deliberately. Let’s find out, what is an insider related risk, what factors cause internal data leaks and how to protect company against them. Who are insiders and how they may affect an organization? When it comes to data leaks, financial organizations are among most vulnerable ones. Despite they are usually protected way better than other companies, still, they always remain the focus of both general public and intruders’ attention. News on the leaks, containing thousands and millions of strings, are published regularly. For instance, Spanish branch’s databases of Zurich insurance company were exposed. They contained 4 million strings of data, retrieved from clients’ insurance policies. Such kinds of data leaks usually occur, because employees forget, that a cybercriminal isn’t necessary a mysterious hacker. Instead, any staff member may turn out to be an intruder. An insider is an employee of any organization, who has an access to confidential data. Confidential data include trade secrets, clients’ and employees’ personal data, payment details, intellectual property. Leaks of such data may result into reputational and financial loses, legal claims. According to SearchInform research, most commonly the following groups of specialists turn out to be culprits of data leaks: client managers (41%), supply managers (20%), accountants and financial officers (22%). Most vulnerable links of an organization are the departments, which employees deal with finance and critical data. Due to the peculiarities of the sphere, in financial industry just about every kind of information is critical and practically each employee is a potential insider. Unintended violations Not all data leaks happen because of malicious actions. Vice versa, usually they occur due to employee’s negligence or lack of knowledge in the sphere of information security. What’s more, they often happen accidentally. For instance, because of one insurance company’s employees’ negligence, copies of valid passports, drivers licenses, handwritten statements and some other documents were thrown away at the dump. All the documents weren’t disposed appropriately. Thus, unscrupulous employees threw away copies of valid documents, and didn’t even bother to burn or to shred them. In case this data had been obtained by intruders, document owners would have become victims of social engineering attacks. Also, there was a chance, that intruders could apply for a microloan using victims’ credentials. The most common mistake, which causes unintended data leaks is data access misconfiguration. For example, due to such misconfiguration, excel tables, containing lists of clients and information about their vehicles, were accessible on the website of one insurance company. It was possible to get access to the tables by inputting any client’s surname on the web site. Another attack vector is phishing or BEC-attack, which may also result into accidental leak of critical data. Phishing is a type of fraud, which main aim is to steal confidential info or to force victim to commit some undesirable actions. To achieve the goals, intruders treat victim in order to gain his or her trust. Usually, this type of attack requires usage of the following instruments: email, fake web sources, phone calls and SMS. BEC-attack Corporate e-correspondence compromising, in particular, with the help of phishing. Occasionally, such attack is divided into a few stages. With the help of phishing cybercriminals manage to obtain account data of a staff member, in order to reach out his or her boss later. Most frequently, attackers are driven by financial interest. However, sometimes they search for confidential data, such as client database or know-how documents. Deliberate leaks Such actions may be caused by plenty of different motives. For instance, insiders steal data in order to gain financial benefit, in such case they sell data to competitors or publish it on the darknet. Employees may be offended because of dismissal or deprivation of the bonus. In revenge, they leak data, revealing some information about the organization. What’s more, an insider can make a copy of data (for instance, copy it on a flash drive or upload to a cloud storage and use later, when he or she will change the company). This risk poses a threat not only to big corporations. Small and middle size companies are equally endangered. Case study An employee of our client, which is a reseller company, decided to resign after her request for promotion was denied. But before she quitted, the woman had uploaded a 900 megabytes archive to a cloud. This archive contained all company’s research data on the local market. The estimated price of the research was US$1,670,000. InfoSec officers prevented the data leak just in time and by the way revealed a fact of falsification of accounting documents. How to protect data against a leak In fact, it’s possible to prevent insiders’ violations, but it’s crucial to understand and follow security regulations. First of all, this task refers to InfoSec and IT-department staff. Other department employees should understand that security requirements, set in an organization, are reasonable. Thus, staff mustn’t neglect the rules. That’s why it’s important to implement organizational measures, aimed at increasing the level of employees’ computer literacy. Full list of measures depends on the specific business-process. However, there are some basic rules. Provide your employees with an educational course on the information security rules The most effective way to prevent accidental leaks is to be critical when dealing with data. So, clarify this idea to your employees. Tell your employees, which kinds of links they mustn’t open and in when it’s better to stop messaging with the email sender immediately. Explicate, what is phishing Tell your staff members, how do intruders use data about the recipient, pretending to be a counterparty in order to gain trust. Set the policy of reliable passwords in your organization. Explain employees, why is it crucial to lock the PC, when they leave their workplace. It’s a good idea to…

Read More