securitylinkindia

Honeywell and Nexceris Strengthen Partnership to Improve Safety for Electric Vehicles

Honeywell announced recently it is expanding its strategic alliance with Nexceris, developer of Li-ion Tamer® lithium-ion gas detection solutions, to help make electric vehicles (EVs) safer. Honeywell and Nexceris will offer advanced automotive sensing technology to help prevent conditions leading to thermal runaway in EV batteries, a phenomenon that causes extremely high temperatures within the battery cell and can result in a fire. Global sales of EVs doubled in 2021 from the previous year to nearly 7 million, and India’s electric vehicle market is expected to grow at a CAGR of 90% in this decade to touch $150 billion by 2030. Many of these vehicles today use lithium-ion batteries as an energy source, which can pose safety risks that can impact EV owners. To help mitigate these risks, automobile manufacturers are looking to incorporate technology to provide enhanced safety. Honeywell offers a wide range of lithium-ion battery safety and performance solutions, including sensors used in battery management systems to monitor the health of EV batteries, gas detection solutions used throughout the manufacturing process and electrical safety personal protective equipment, providing protection to workers and allowing them to operate safely in hazardous conditions. Rajesh Rege, President, Honeywell India, mentioned, “As more people switch to electric vehicles, automakers need to supply lithium-ion batteries that are reliable, safe and secure at every point of their lifespan. EV sales are likely to increase exponentially ‘in the coming months and years’ due to the demand incentives provided under FAME II, the launch of state policies, rising fuel prices, tightening emissions laws and increasing awareness of the green environment. Honeywell is assisting this transition to more EVs on the road by providing ready-now solutions to help reduce safety concerns. Honeywell’s collaboration with Nexceris to develop an enhanced suite of battery monitoring sensors will help automotive manufacturers strengthen their battery health monitoring systems with the ability to detect thermal runaway conditions even earlier.” The companies will collaborate with leading global vehicle manufacturers to deliver advanced gas detection solutions in EV battery packs to allow for early intervention, helping avoid costly property damage and safety issues. “Our work with Honeywell will help us empower the global transition to electric vehicles through enhanced battery monitoring,” said Kyle Shen, President and CEO, Nexceris, “Fires from lithium-ion batteries are dangerous and often difficult to contain after they start. By combining our shared expertise in battery sensing and gas detection technology with Honeywell’s extensive manufacturing capabilities, we will be working toward offering our vehicle manufacturing customers a more advanced safety solution and meeting the growing demand for lithium-ion batteries.”  

Read More

PRAMA Displays its Innovative Transportation Security Solutions at TrafficInfraTech Expo 2022

India’s premier indigenous security and surveillance product manufacturing brand, PRAMA displayed its innovative transportation solutions at TrafficInfraTech Expo with a theme ‘Innovation Meets Expectation.’ Prama India had participated in the TrafficInfratech Expo held between 16-18 November at Bombay Exhibition Center (BEC) in Mumbai. The exquisitely designed PRAMA booth got good response from the security professional community. A special commemorative Coffee Table book on PRAMA’s ‘Make-in-India’ mission to boost indigenous manufacturing was inaugurated by S.V.R. Srinivas, Metropolitan Commissioner, MMRDA in the presence of transportation industry leaders, government representatives and delegates. PRAMA booth at the TrafficInfraTech Expo displayed its innovative and indigenously developed transportation security products and solutions, including Highway Control Room Solutions, Toll Plaza Surveillance, Advanced Traffic Management Solution, In Bus Surveillance Solution, Mobile Enforcement Solution, Ai Sense Solution and other solutions. PRAMA booth also displayed Speed Detection Cameras and ANPR Cameras. The three-day Smart Mobility Conference 2022 was concurrently organised along with the TrafficinfraTech Expo event, it covered eclectic mix of contemporary themes on transportation, traffic management, logistics, Mobility, Smart Cities Parking Management. On the first day of the conference, Vinay Mishra, Senior Vice President – Projects, Prama India Pvt. Ltd., gave a detailed presentation on the trendy theme ‘Smart Transportation, Smarter Solutions.’ He also briefed about the latest Transportation security solutions offered by PRAMA India. His presentation got an overwhelming response from the conference delegates. PRAMA’s Transportation Solution enables the promise of advanced video security solutions. It provides mission critical security to the transportation hubs. It has a Command and Control solution to proactively monitor the video data of video security cameras. Its bespoke products and solutions serve the vehicular security needs. PRAMA’s Smart Traffic Solution provides the help to resolve the Traffic Management challenges. It keeps the vehicle traffic moving swiftly while ensuring the security and safety of travelers, vehicles and pedestrians. TTTrafficInfraTech Expo 2022 provided a networking forum for government representatives, experts, project heads, system integrators and service providers to collectively find solutions to urban transport challenges. The event got concluded with relevant insights on latest developments in the India’s transport sector. A large number of dealers, distributors, consultants, system integrators and end-users visited the PRAMA booth to check the latest transportation security solutions on display.  

Read More

Fortinet Secure SD-WAN Delivers 300% RoI Over Three Years and Payback in Eight Months, New Independent Study Finds

Fortinet®, a global company in broad, integrated, and automated cybersecurity solutions, recently announced a business benefit analysis of Fortinet Secure SD-WAN and its ability to support large enterprises by delivering 300% RoI over three years and payback in eight months. As one of the top SD-WAN vendors, Fortinet commissioned a Total Economic Impact™ (TEI) study by Forrester Consulting to analyze the value that Fortinet Secure SDWAN can provide to large enterprises, examining both the network and security impact on customers’ businesses. As part of the independent study, Forrester interviewed business decision-makers with experience across industries and geographies, including retail, healthcare, financial services, and manufacturing. Collectively, the organizations deployed Fortinet Secure SD-WAN and other Fortinet products, such as switches, wireless LAN, and wireless WAN, and have more than $1 billion in annual revenue, up to 8,500 sites, and up to 133,000 employees. Based on customer feedback, Forrester developed a composite model for the study and built out a three-year financial model to reflect the costs and benefits of the investment. Key findings from the study and benefits for customers include: Eight Months Payback and 300% RoI: Customers deploying Fortinet Secure SD-WAN achieved a 300% return on investment over three years with payback in eight months. These benefits include a reduction in communications costs, increased productivity of security and network teams, improved network and security performance, and increased productivity of deployment teams. 65% Reduction in Network Disruption: With enhanced network performance enabled by Fortinet Secure SD-WAN, business users experienced a 65% reduction in the number of network disruptions. 50% Improvement in Resolving Issues: Fortinet offers increased visibility and effective, broad protection, allowing security and network teams to identify and remediate network issues more quickly. Improving time to issue resolution by as much as 50% enabled the composite organization to reassign security and network team resources to higher value activities, resulting in a three-year, risk-adjusted productivity benefit of $1.4 million. Increased Productivity of Deployment Team: Fortinet Secure SD-WAN enabled the composite organization to save time by 75% per new deployment, resulting in significant efficiencies for the deployment team. Fortinet Secure SD-WAN Transforms and Secures WAN Prior to implementing Fortinet Secure SD-WAN, the organizations used a combination of technologies and vendors to manage, maintain, and monitor their networks. These solutions, which relied on MPLS, internet, and assorted hardware, lacked visibility and adequate security coverage, forcing network engineers and administrators to spend excessive time identifying and resolving unanticipated problems on an ad hoc basis. Additionally, scaling and modifying existing solutions became increasingly cost-prohibitive and time-consuming. Vishak Raman, Vice President of Sales, India, SAARC and Southeast Asia at Fortinet, said, “Large enterprises around the world continue to turn to Fortinet to achieve their digital acceleration goals with solutions that converge networking and security. We’re pleased that Forrester has quantified both the network and security benefits of Fortinet Secure SD-WAN, which will advance our commitment to helping customers make informed decisions with validated solutions.”  

Read More

Indian Students Attend Honeywell Leadership Challenge Academy at U.S. Space and Rocket Center

Honeywell announced that 10 Indian students among 172 students from 25 countries attended a once-in-a-lifetime learning experience at the 11th Honeywell Leadership Challenge Academy (HLCA). The unique leadership program took place for two consecutive weeks at the U.S. Space and Rocket Center in Huntsville, Alabama. This year, Honeywell chose eight students from Bangalore and two students from Pune. The HLCA is a scholarship program for children of Honeywell employees worldwide that offers a weeklong immersive, science-oriented leadership experience. It is designed to encourage high school students ages 16-18 years old to pursue careers in science, technology, engineering and math (STEM) through real-world, hands-on activities in computer science, engineering, astronautics and coding. “For more than 10 years, Honeywell has brought together students from around the world to travel to the U.S. Space and Rocket Center to experience Space Camp, helping to build their technical, collaborative and communications skills,” said Jayme Meyer, Honeywell Vice President, Internal Communications and Corporate Social Responsibility, “Today, the 30 fastest-growing occupations globally are in STEM, and Honeywell is proud to partner with the USSRC to empower the next generation of future-shaping innovators and leaders.” Students are selected for the program through a rigorous application and review process based on academic achievement and community involvement. Honeywell and its employees help fund the scholarships, which cover the cost of tuition, meals, accommodations and program materials. Yatharth Nehra, a Participant from Pune said, “It was a great learning and networking experience. I believe there are only very few organizations that provide the advantage and the diverse knowledge as HLCA provides. Honeywell understands that the future is now, and the future is us. I would like to thank Honeywell for providing me with this opportunity.” “Honeywell Leadership Challenge Academy at US Space and Rocket Center was once in a lifetime experience for me. It was a rare combination of technical knowledge, hands-on experience, meeting legends and having loads of fun,” said Bidipta Chatterjee, a Participant from Bengaluru. Bengaluru student Nisha Jain reminisced, “It was a wonderful opportunity to build my leadership qualities, challenge myself across different fields and also meet and learn from my peers from different cultures. We learned how to work as a team with mission control & incident control challenge, build a rocket, code a raspberry pi, train on MATs, use a flight simulator, experience 1/6 gravity, and climbed a 40-foot wall! Proud to have been selected for HLCA.” Since its launch in 2010, Honeywell, in partnership with the USSRC, has sponsored nearly 3,000 students to attend space camps. Participants develop STEM leadership skills through numerous team-building challenges such as building, coding and testing rockets; simulated astronaut training; shuttle missions; and a low-gravity moonwalk. Students also use computational thinking and computer science to deepen their digital skills. “Space camp was one of the most exhilarating and educative experiences for me with the exposure to space programs, leadership, critical thinking and teamwork.” shared Srinidhi Prabhakaran, a Bengaluru Participant. The U.S. Space & Rocket Center, a Smithsonian Affiliate, is home to Space Camp®, Space Camp® Robotics, Aviation Challenge® and U.S. Cyber Camp as well as the Apollo 16 capsule, the National Historic Landmark Saturn V rocket and world-class traveling exhibits. USSRC is the Official Visitor Center for NASA Marshall Space Flight Center and a showcase for national defense technologies developed at the U.S. Army’s Redstone Arsenal.  

Read More

Reinventing Homeland Security Through Emerging Technologies

Former Secretary (Security), Cabinet Secretariat, & Spl. Secy., Internal Security, MHA ASSOCHAM Conducted a National Conference on Homeland Security Finding comprehensive solutions along with the private sector for homeland security, that also serves as a force multiplier, is a crucial concept for Aatmanirbhar and Surakshit Bharat,” stated VSK Kaumudi, IPS (Retd.), Former Secretary (Security), Cab. Sectt., & Spl. Secy., Ministry of Home Affairs, Government of India, at the national conference on ‘Homeland Security: Public-Private Partnership for Managing New Age Challenges.’ The conference was organized by the apex industry body, Associated Chambers of Commerce and Industry of India (ASSOCHAM). In order to protect against criminal activities, terrorism, and other threats to the country, Mr. Kaumudi underlined the significance of advanced security systems. He spoke about the nexus between inimical elements abroad and local terrorists and criminal gangs that affects the well-being of Indian citizens along the borders as well as in the heartland. The Indian government has been encouraging startups and private parties for developing sophisticated technology for weapons and security equipment, skill development of security personnel, and in cyber security through private-public partnership. According to Mr. Kaumudi, India needs private-public partnership to foster the development of start-ups and to adopt the best available technology for robust security architecture. Sanjay Agrawal, Dy Director General (Disaster Management) at the Ministry of Communications of the Government of India, highlighted the importance of establishing a public-private partnership model to enlist industrial partners for commercial use of the network while taking into account geographical areas and designing communication models for nationwide homeland security. He further emphasized the need to utilize modern technologies in tandem with an integrated communication system in order to enhance safety measures. Additionally, he proposed that a well-devised communication strategy is essential in worst-case scenarios. He stressed that a combination of modern technologies and an integrated communication system will bolster safety, and a well-prepared communication strategy is essential in the event of a crisis. Kunwar Vikram Singh, Chairman of the Central Association of Private Security Industry (CAPSI), underscored the responsibility of the government to protect its citizens with the collaboration of all stakeholders. He also highlighted that due to socio-economic conflicts, it is essential to come up with a plan of action to address them. According to him, private security is a major component of the sector and India has the largest security workforce of around 1 crore personnel who safeguard the nation. Jasbir Singh Solanki, CEO of Mahindra Defence System Limited’s Homeland & Cyber Security division, highlighted cyber security as the biggest challenge given the prevalence of cybercrime around the globe. He urged a shift from a trader mentality to a builder mindset and advocated for the allocation of funds towards security protection technology. Alpesh Kankariya, Partner (Homeland Security and Surveillance) at PricewaterhouseCoopers Private Limited (PwC), emphasized the fundamentals of homeland security, which encompasses counter-terrorism initiatives, security from natural disasters and public health hazards, as well as national security from external adversaries. In his closing remarks, Anil Dhawan, Co-Chairman of ASSOCHAM’s National Council on Homeland Security & Disaster Management and MD of DB Secure Solutions Pvt Ltd., offered an insight into home-grown security solutions through the Public-Private Partnership model, as well as increased investment in research and development to meet specific security needs. Among eminent dignitaries, a joint knowledge report titled ‘Cognitive Command and Control Centres-Redefining homeland security with emerging technology’ was released by ASSOCHAM-PwC.  

Read More

Hikvision India Creates a Portfolio of Solutions to Maximize Efficiency and Security of Accessibility

In residential communities, commercial centers, and even industrial parks, ensuring effective site accessibility and security can be a challenge, as people come and go, alone or in crowds. Hikvision India provides a portfolio of solutions to help customers maintain efficient and secure accessibility on site Residents, employees, customers, deliverymen, maintenance personnel, and others create the familiar hustle and bustle at large buildings and facilities. In places like these where people come and go continuously, site operators must become experts in a variety of access control and security systems and products to know which functions are included and which are not. Their choices must ensure that authorized people – like employees, suppliers, visitors, and contractors – can all access sites and facilities quickly and easily. At the same time, on-site personnel must protect the sites and populations by identifying unauthorized people and then denying them access, which is essential in minimizing security events, vandalism, and other security risks. Organizations also risk investing further in access and security functions they already have, or, in other cases, finding gaps that are difficult to fill in a cost-effective way. For these scenarios, Hikvision has created a range of solutions to simplify site accessibility and security management and to give customers clearer access to the specific functions they need. It offers a roadmap to help customers accurately choose and deploy the functions they need to keep everyone safe while also guiding everyone to the right place at the right time at their sites. In this portfolio, key functional solutions can be mixed-andmatched to meet specific needs for all kinds of sites such as residential communities, shopping malls, office towers, airports, industrial parks, and much more. Here are a few of the essentials that Hikvision’s solutions include. Access Control Administrators commonly encounter the challenging task of granting authorized people access to necessary areas. Access control solutions have come a long way from keys, pin codes, and physical cards, but as technology advances, better solutions get introduced regularly. Hikvision Access Control solutions use multiple biometric authentication methods, including face and fingerprint recognition, to ensure that only authorized people enter buildings or sites. These solutions use deep learning algorithms to automate recognition of authorized people and to grant or deny access to sites or restricted areas. ‘Rapid passage solutions’ can be deployed at entrances and exits where many people need to pass in a short timeframe, and ‘extra-high security solutions’ employ multi-factor authentication and other technologies for restricted areas. Vehicle Entrance and Exit Vehicles regularly enter and exit from parking lots at all kinds of locations. Effectively and precisely identifying these vehicles, allowing registered vehicles in and out, and charging parking fees, challenges managers daily. Hikvision’s solutions for Vehicle Entrance and Exit Control help customers ensure that only authorized vehicles enter a site, while also improving on-site navigation and parking. These solutions recognize vehicle license plates (using ANPR cameras) and cross-reference this information with access ‘rules’ at the back end. Multiple parameters Vehicle Entrance and Exit Vehicles regularly enter and exit from parking lots at all kinds of locations. Effectively and precisely identifying these vehicles, allowing registered vehicles in and out, and charging parking fees, challenges managers daily. Hikvision’s solutions for Vehicle Entrance and Exit Control help customers ensure that only authorized vehicles enter a site, while also improving on-site navigation and parking. These solutions recognize vehicle license plates (using ANPR cameras) and cross-reference this information with access ‘rules’ at the back end. Multiple parameters At the enterprise level, finding an easy and efficient way to manage employee attendance is important for management. Using biometric authentication solutions such as face and fingerprint recognition, Hikvision’s solutions help organizations create an accurate, auditable record of employee time and attendance. A wide range of scheduling and attendance reports comes included with each solution as needed, with simple deployment in the cloud. Site managers can set up and deploy Hikvision time and attendance solutions quickly and easily on a single site, or at multiple sites. Visitor Management Visitor management is another headache for accessibility concerns, as both convenience and safety must be considered. Hikvision’s Visitor Management solutions maximize site security while also providing a much faster and better experience for visitors. Visitors can register and make an appointment via a mobile app or online, allowing site staff to grant them quick access to their authorized areas when they arrive. There are options for a receptionist to receive visitors in person as well as for visitors to check in and enter buildings using a self-service terminal. Perimeter Protection Perimeter protection has traditionally been a core component for site security. Here, Hikvision provides highly reliable Perimeter solutions for all kinds of scenarios, whether ‘short’, ‘medium,’ or ‘long.’ Key features of these solutions include real-time alerts and auditory and visual warnings to deter trespassers before they enter buildings or step foot on sites. With AI features to distinguish people and vehicles from other moving objects such as animals or falling leaves, the security team can focus their efforts on real security threats and respond to incidents much faster. Flow Control The ability to accurately count numbers of visitors and customers can be a major advantage for commercial organizations, improving service, safety, and even sales. Using dual-lens cameras with 3D binocular stereo vision and deep learning algorithms, Hikvision provides intuitive notifications and timely alarms when the number of people in a specified area reaches the preset threshold. With the ability to count people in queues and crowds, Hikvision’s Flow Control solutions enable users to respond with, for example, increased staffing at peak times or other actions that improve efficiency and service quality. Users also get a clear view of how many people enter and leave a site for improved security and safety.  

Read More

India has been the Victim of Cyberterrorism

By Colonel B. S. Nagial (Retd.) Cyberterrorism is a global phenomenon but not much recognised in India. However, India ranks second highest user of the Internet after China. It is estimated that about 20% of the Indian population uses Internet facilities. In contrast, in the US and UK, 90% of people use the Internet. And people who use the Internet facilities are also called ‘Netizens.’ The over-dependence on the Internet increases susceptibilities & weaknesses. Sometimes the feelings of aggression are transformed into anger and revenge, which turns them into criminals. Most people in India aren’t sensitive to cyber threats posed by the virtual world. Information Technology (IT) has opened a plethora of opportunities for the world to develop its financial infrastructures and other e-commerce facilities. Cyber crimes are increasing daily. The ‘netizens’ are ignorant and in denial that their activities are safe and secure. We usually share our important & sensitive data & information inadvertently on social media. The momentous growth of the cyber world has further posed the threat of cyberterrorism. Cyber attacks depict lethal and non-lethal psychological problems faced by people. Cyberterrorism is typically considered a tool that only affects the national security system. But in fact, it also affects the psyche of the people. Cyber terrorists have increased the employment of cyber attacks dramatically in the past few years. It has caused mass destruction & damage to various facilities such as health, energy, nuclear, and critical command & control facilities. Cyber professionals are at work to reinforce capacity-building measures to restrain cyber attacks on critical systems in India. What is Cyberterrorism? As per the dictionary, cyber-terrorism is ‘the motivated use of computers and information technology to cause extreme interruption or extensive fear in society.’ Dorothy Denning, a professor of computer science, has given the most notable definition of cyberterrorism. He has put forward an admirably unambiguous definition in numerous articles and in her testimony before the US House Armed Services Committee in May 2000 – Cyberterrorism is the conjunction of cyberspace and terrorism. It denotes illicit attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people. Also, to qualify as cyberterrorism, an attack must cause violence against persons or property or inflict sufficient harm to cause fear. Attacks which cause death or bodily injury, explosions, or severe economic loss are a few examples. Grave attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Cyberterrorism is a deliberate attempt, which is a politically, socially or religiously inspired attack against information systems, programs and data. The definition is occasionally expanded to include any cyber attack that intimidates or generates fear in the target population. Attackers often do this by inflicting damage or disruption to critical infrastructure. Cyberterrorism is also known by terms such as electronic terrorism, electronic jihad, information warfare or cyber warfare. The fact is that cyberterrorism threats can come from so many different sources, and sometimes it would seem impossible actually to defend ourselves from them. Objectives of Cyberterrorism The fundamental objective of a cyber-attack is hacking, generally to satisfy the ego of hackers by creating terror. Sometimes it seems too similar or overlapping, like cyber attacks and cyberterrorism. The objective of cyberterrorism is to instil feelings of terror in the mind of cyber victims. Cyberterrorism also threatens the most vulnerable points covering physical and virtual worlds. It includes the commission of acts of destruction, alteration, acquisition and acts of transmission against the following: Defence forces. Internal security system. Health care system. Financial infrastructure. Other important civilians networks. Destructions of supervisory control and data acquisition system of smart cities. Information and Communication Technology (ICT) may be used to help the commission of terrorist-related offences. It can be promoted to use, promote, support, facilitate, and engage in acts of terrorism such as spreading propaganda, recruitment, radicalisation, incitement to terrorism, terror financing, training planning and execution of terrorist attacks. Modus Operandi of Cyberterrorism Cyberterrorism is gaining far-fetched attention due to extensive reporting by the media and numerous other institutions, both from the public as well as private sectors. They accept that cyberterrorism is capable of rendering catastrophic impacts. Thus, it is imperative to share awareness among the general public to alleviate cyberterrorism threats effectively. Most cyberterrorism cases have numerous common traits. It is essential to clearly define what a cyberterrorism attack looks like to avoid misunderstandings leading to confusion later on. Usually, the victims of cyberterrorism attacks are specifically targeted by the attacker(s) for predetermined reasons. There have been random cases of cyberattacks carried out in the past, such as releasing harmful viruses and worms through the Internet. However, in reality, the targets were arranged by cyber terrorists. This is because if the attacks are more focused and intended towards an explicit target, there are better chances of inflicting severe damage on the target chosen. The most common objective of cyberterrorism is to inflict damage or destroy completely a particular target which may be an organisation, industry, sector, or economy, or to impact particular targets. These types of attacks are becoming popular. Thus, specific countermeasures will be required to prevent the targeted entities from falling victim to such attacks. One more common feature of cyber terrorism is the resolve which is to further the terrorist or terrorist groups’ own goals, such as to inflict heavy damages on the former employer due to unsettled disputes or to create chaos among the general public. Cyber terrorists deploy various types of cyberterrorism attacks. As per the Center for the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School in Monterey, California, USA, cyber terrorism capabilities can be grouped into three main categories; simple unstructured, advanced-structured and complex-coordinated. Simple-unstructured This is the fundamental capability to conduct hacks against individual systems employing tools created by others. This type of organisation possesses little target analysis, command and control skills, and limited learning capability. Advanced-structured This is the advanced competence to conduct more experienced attacks…

Read More

Augmented Computer Vision: Technology, Application and Benefits in Visual Inspection & Content Monitoring

Prakash Prabhu – Chief Business Officer & Co-Founder, VisionBot In this feature, we will together discover the basic concept of Augmented Computer Vision, it’s use in the real world to automation of tasks, turn images and video in to strategic information, and build exception based alert reporting. We will also consider industry use cases and what we should consider when implementing AI/ ML driven visual content monitoring applications in any organization. Augmented Computer Vision To augment means to improve, enhance something and get more specific and detailed information. The goal is to use artificial intelligence and machine learning to derive enriched cognitive information from computer vision video data also known as cognitive augmentation or Augmented Computer Vision. Purpose Augmented Computer Vision focuses on using artificial intelligence (AI/ ML) tools in an assistive role to enhance the partnership between human and artificial intelligence to enhance cognitive performance for better visual content monitoring and inspection application. Technology System delivering augmentation use artificial intelligence technologies to complement human output. Augmented AI uses technologies such as: Machine learning: Systems learn from data to identify patterns and create a feedback loop to learn and improve. Logical reasoning: This uses logical techniques to rationalize and assist in conclusions and deductions based on available data to solve problems and make predictions. Spatial navigation: They are designed to work with temporal and spatial information. Machine vision: This enables a computer to see for automatic analysis and inspection. Pattern recognition: This is automated recognition of patterns within data by spotting regularities or irregularities. Functions Augmented Computer Vision employs five main functions: Detect: Video data is fed to the system; detection & classification is then derived from. Identify: As new data is input, the old data is analysed, and new data sets are identified. Classify: The new data set then defines results. Assess: Humans then provide feedback on the results or output, and the system is adjusted. Respond: Defined processes are used to ensure compliance and security for risk management. Augmented Computer Vision can Enhance operational decision-making. Save time by sorting through high volumes of Video data. Drive profits and reduce risks by successfully predicting patterns. Remove human error and bias in data interpretation. Allow operators to make more accurate data-driven decisions in real time. Augmented Computer Vision is meant to in crease the intelligence of both, the computer and the human user. When used properly in tandem, man and machine can be smarter together. AI and augmented data from Visual Content Monitoring can open the door for more creativity and new innovations by assisting and enhancing human capabilities. Application of Augmented Computer Vision The spectacular development of Deep Learning approaches, has revolutionized video analysis and its applications. Computer Vision techniques have moved from classic use cases (e.g., Triggering an alert if the camera image gets too dark or changes drastically) and has since moved to systems capable of identifying specific objects in an image and tracking their path. Augmented Computer vision is proving to be a game-changer, with a plethora of applications in Visual Content Monitoring and Visual Inspection Monitoring applications in virtually every industry, allowing it to leverage the power of deep learning and, as a result, provide faster, cheaper, and superior automation. Primary use case would be for Automated Visual Inspection (AVI). Areas of Requirement It is that is required in both continuous and discrete operational scenarios. In non-production contexts, a visual inspection can be used to evaluate whether the traits indicative of an ‘object or behaviour’ are present and prevent possible negative consequences, similar to how it is used in manufacturing for quality or defect evaluation. There are numerous other industries where visual inspection is used and till now is done manually as it was considered a high-risk area. How Automated Visual Inspection using Augmented Computer Vision is better than Manual Inspection Automatic image correction. Higher processing speed. Remote operations. Wider spectrum coverage. Higher accuracy. Zero fatigue. Scalable. Self-learning ability. Use past data for automated learning. Accurate model predictions. Real World Industry Applications Construction Manufacturing Warehousing & logistics. Warehousing & logistics. Healthcare Retail Food & hospitality. Smart & safe cities. Sports analysis. We will endeavour to cover each Industry application use case in details in subsequent features. Today we will focus on how VisionBot™ driven automated reporting and exceptional alerting helps construction companies become more safe, efficient and profitable. Ai Driven Automated Visual Inspection Monitoring for Construction Industry VisionBot™ is a platform that leverages the scalability and availability of cloud services to offer its Augmented Computer Vision based solutions. VisionBot™ helps businesses get the most out of their visual content, thereby deriving powerful insights and driving decision making. Designed as a cloud based Software-as-Service (SaaS) model, it lets any customer start using the system with minimal investment. VisionBot™ is offered as an on-premise service in Hybrid/ Private Cloud/ Data Centre for enterprise requirements. It is an adaptive platform and learns on its own, to deliver required outcomes depending on enterprise use cases. There are several use cases of Visual Monitoring for the Construction sector. With its wide stretch of land and real estate variety of vehicles and equipment and large number of workers and supervisors, visual monitoring of assets and human resources helps address both occupational safety and operational efficiency. Therefore construction sector has several use cases where Automated Visual Monitoring is a compelling need. Visionbot™ helps automating several functions in construction that are tedious/ dangerous for humans or erroneous under human monitoring. We use advanced AI and machine learning tools to train an algorithm to distinguish different things in an image and automatically report on anomalies. Turn images into information to provide real-time detection of events, things of importance and anomalies on the site. This information can be used to better assess productivity, security, risks and hazards. It is also a cost-efficient option where there is a need for large manpower: Workplace safety and compliance. Inventory management. Routine and special inspections. Attendance and access control. Theft protection & vandalism. EHS & EPC safety monitoring….

Read More

CAPSI MEETS YOGI

A delegation of Central Association of Private Security Industry (CAPSI) led by Chairman Kunwar Vikram Singh has recently met the Hon’ble Chief Minister of the state of Uttar Pradesh (UP) Yogi Adityanath Ji Maharaj, at his residence in Lucknow. They discussed the matter of security training institutes in the state and explored the opportunities. The delegation briefed the Chief Minister about the activities of the Association. Mr. Yogi informed the delegation that his government is starting extension campus of Rashtriya Raksha University (RRU)  in the State. The Chief Minister said that his government is setting an extension campus of RRU for security studies especially in forensic sciences. He also assured them that more training centres for private security shall be approved soon so that training as per Private Security Agencies (Regulation) Act, 2005 (PSARA) can be imparted to all the security guards and supervisors working in the state of UP. Kunwar Vikram Singh congratulated Mr. Yogi for bringing law & order situation in the state under complete control so that businesses can invest in the state. CAPSI members also assured the Chief Minister that soon majority of security guards will be trained as per the  BIS standards (Bureau of Indian Standards) which will further motivate investors about the security of their assets and people. Om Kumar, MLA & CAPSI State Chapter President, N P Singh Working President, Ravinder Singh, Vice President and Ashish Sisodia Convenor of Western UP Chapter of CAPSI attended the meeting along with Mahesh Sharma, Secretary general, Anil Puri,  VP, and Sudhir Bhasin VP, CAPSI. As the spokesperson of CAPSI informed, a delegation of CAPSI shall be meeting the Chief Ministers of most of the States to establish better understanding between the government and CAPSI. They also proposed to set up four Centres of Excellence (CoE) for security courses for middle level operations & management. Central Association of Private Security Industry (CAPSI) is the preeminent organization for security professionals which has emerged as an elite association. CAPSI’s governing processes are being guided by an eminent Board of Governors having former Army Generals, Veteran Police and Para-Military officers, high ranking Intelligence Professionals from Central Bureau of Investigation and premier governmental intelligence agencies and renowned Risk Managers. CAPSI is functioning as a federal body which represents the interest of entire Private Security Industry (PSI) of India. It operates through its State Chapters constituted in every State of the Republic of India. Each State Chapter is being governed by an executive council.  

Read More

Tenable Research Finds 72% of Organizations Remain Vulnerable to ‘Nightmare’ Log4j Vulnerability

Tenable®, the Exposure Management company, recently announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organizations remain vulnerable to the Log4Shell vulnerability as of October 1, 2022. The data highlights legacy vulnerability remediation challenges, which are the root cause of the majority of data breaches. When Log4Shell was discovered in December 2021, organizations around the world scrambled to determine their risk. In the weeks following its disclosure, organizations significantly reallocated resources and invested tens of thousands of hours to identification and remediation efforts. One federal cabinet department reported that its security team devoted 33,000 hours to Log4j vulnerability response alone. Tenable telemetry found that one in 10 assets1 was vulnerable to Log4Shell as of December 2021, including a wide range of servers, web applications, containers and IoT devices. October 2022 data showed improvements, with 2.5% of assets vulnerable. Yet nearly one third (29%) of these assets had recurrences of Log4Shell after full remediation was achieved. “Full remediation is very difficult to achieve for a vulnerability that is so pervasive and it’s important to keep in mind that vulnerability remediation is not a ‘one and done’ process,” said Bob Huber, Chief Security Officer, Tenable, “While an organization may have been fully remediated at some point, as they’ve added new assets to their environments, they are likely to encounter Log4Shell again and again. Eradicating Log4Shell is an ongoing battle that calls for organizations to continually assess their environments for the flaw, as well as other known vulnerabilities.” Other key findings from the data include: 28% of organizations across the globe have fully remediated Log4Shell as of October 1, 2022, a 14-point improvement from May 2022. 53% of organizations were vulnerable to Log4j during the time period of the study, which underscores the pervasive nature of Log4j and the necessary ongoing efforts to remediate even if full remediation was previously achieved. As of October 2022, 29% of vulnerable assets saw the reintroduction of Log4Shell after full remediation was achieved. Some industries are in better shape than others, with engineering (45%), legal services (38%), financial services (35%), non-profit (33%) and government (30%) leading the pack with the most organizations fully remediated. Approximately 28% of CISA-defined critical infrastructure organizations have fully remediated. Nearly one third of North American organizations have fully remediated Log4j (28%), followed by Europe, Middle East and Africa (27%), Asia-Pacific (25%) and Latin America (21%). Similarly, North America is the top region with the percentage of organizations that have partially remediated (90%), Europe, Middle East and Africa (85%), Asia-Pacific (85%), and Latin America (81%)  

Read More