securitylinkindia

Eco IP Video Door Phone Series to Meet Evolving Security & Communications Needs

Hikvision India has Introduced Eco IP Video Door Phone (VDP) DS KIS302 P Series to meet the evolving security and communications needs in the market. VDP products address a crucial part of the security, communications and convenience needs in both residential and business sectors. They have evolved over time alongside the rapid development in technologies created for better and safer living environments. The Eco IP VDP Kit with 1 IP indoor station and 1 four-wire HD door station. It has a User-friendly control with a convenient touch screen. It offers convenient management via the Hik-Connect mobile client. It has more cost-effective. Easy installation as the doorbell requires no exclusive power supply. The transition from analog to IP technologies The VDP market is witnessing a significant transition from analog to IP. Traditional analog systems feature relatively poor audio and image quality and limited functionality. For example, they cannot be accessed using a mobile app or networked management systems. Although analog systems are often a more economical option, more manufacturers and installers have recommended their customers shift to IP-based VDPs for their wider range of capabilities – including higher image resolution, mobile control, remote operation, and a series of smart functions. IP VDPs bring a new level of convenience Mobile control: IP VDPs let owners receive calls, play video, and open locks from anywhere through just a simple touch. For example, people often receive calls on their mobile devices for package deliveries or other services when they’re not at home. IP VDPs, however, allow users to give temporary access remotely to those who need it, just using a simple mobile application. This is more convenient and much safer than manually giving out passwords or key cards. User-friendly interfaces: IP VDPs commonly provide a user-friendly screen with a clearly visible interface, simple touch interaction, intuitive operation, and multi-functional information display (e.g., weather, news, announcements etc.). These easy-to-use features help get modern consumers accustomed to using IP VDPs since they operate very similarly to mobile phones. High image quality: Compared to purely analog solutions, IP VDPs provide excellent imaging with higher resolutions and wider field of view. Wide Dynamic Range (WDR) and night vision are also supported to help users see clearly despite challenging light conditions, such as direct sunlight or high contrast environments during the day and darkness in the evening and night time. IP VDPs provide excellent imaging with higher resolutions and wider field of view. All-in-one management: IP VDPs also offer opportunities for integration with other security systems such as video and alarms. A unified control center ensures all-in-one linkage among various devices and systems and facilitates convenient device operation and management, improving security for businesses and home owners. Enter Hikvision Hikvision’s IP VDPs serve a wide range of scenarios including apartment buildings, single-family homes, and SMB offices. In residential applications, these advanced VDPs combine a better user experience with elegant design to suit any decor, as well as a touch-friendly screen for easy operation. Users can remotely open doors and talk to visitors by simply tapping the Hik-Connect mobile app on their smartphone or tablet. For Business applications, Hikvision’s IP VDPs enhance safety levels and management efficiency with strong integration capabilities. Hikvision’s All-in-One Indoor Station Series controls and manages all Hikvision access control, video security, and alarm devices through the built-in Hik-Connect app. The product series can also be converged with third-party applications to satisfy customized or personalized needs.  

Read More

New Survey by HID Reveals Five Pressing Themes Reshaping the Security Industry

Sustainability, Mobile IDs and a Changing Workforce Continue to be Among Top Concerns HID, a worldwide company in trusted identity and physical security solutions, recenlty announced its inaugural State of the Security Industry Report, which gathered responses from 2,700 partners, end users, and security and IT personnel across a range of titles and organization sizes representing over 11 industries. By looking at what’s driving the next innovations and the technology that supports them, the security industry is empowered to create more value for its organizations and its people. Conducted in quarter 4 of 2022, the survey reveals five common threads, as follows: Prabhuraj Patil Commercial Director, Physical Access Control Solutions, South Asia, HID “We are grateful for the opportunity to share insights with the security community as part of this year’s State of Security Industry Report. Mapping our industry’s dynamic trends helps provide a deeper understanding of customer needs and challenges. We are confident that our report will help security teams adapt faster and better capitalize on innovative solutions” 1. Nearly 90% of respondents acknowledge sustainability as an important issue: End users are increasingly demanding that suppliers provide footprint transparency in terms of their operations, product sourcing and research and development practices, with 87% of respondents stating that sustainability ranks as ‘important to extremely important.’ Mirroring this trend, 76% said they have seen the importance of sustainability increasing for their customers. To support this growing demand, security teams are leveraging the cloud To support this growing demand, security teams are leveraging the cloud and the Internet of Things, even more, to optimize processes and reduce resources. Additionally, new products and solutions are being strategically developed to address sensible energy usage, waste reduction and resource optimization. 2. Most organizations still need to fully embrace identity ‘as-a-service’ (IDaaS) to support hybrid work: The majority of survey respondents – 81% of them – stated they are offering a hybrid work model. As an example, 67% of respondents state that multifactor authentication and passwordless authentication are most important to adapting to hybrid and remote work, while 48% point to the importance of mobile and digital IDs. Interestingly, the survey also reveals almost half of the organizations aren’t quite ready to implement a comprehensive IDaas strategy. 3. Digital IDs and mobile authentication to propel many more mobile access deployments: Identification and authentication are more commonly completed via mobile devices, including smartphones and wearables. The growing popularity of digital wallets from major players such as Google, Apple and Amazon is a key driver of this trend. And expanded capabilities allow smartphone users, for example, to add keys, IDs and digital documents directly in the wallet app. These include, but are not limited to, drivers’ licenses in eight states, verifiable COVID-19 vaccination information, employee badges, student IDs and hotel room keys. Commercial real estate companies (40%) are outpacing other verticals as large commercial real estate firms are leveraging mobile access as part of their larger tenant experience apps, according to the HID survey. 4. Nearly 60% of respondents see the benefit of contactless biometrics: Biometric technologies represent a major break from more conventional means of access control. Using biometrics as an additional authenticating factor (e.g., biometric scans to verify an individual’s physical identity) can help organizations eliminate unauthorized access and fraud. The importance of this trend is exemplified in the survey data, which shows that 59% of respondents are currently using, planning to implement, or at least testing biometric technologies in the near future. 5. Supply chain issues continue to be a concerning factor, but optimism begin to emerge: According to the survey, 74% of respondents say they were impacted by supply chain issues in 2022, although 50% are optimistic that conditions will improve in 2023. Most affected are commercial real estate companies, with 78% citing supply chain problems as their main concern. More than two-thirds of organizations with fewer than 1,000 employees indicate that they were highly impacted by supply chain issues in 2022, but they are also the most optimistic that these issues will resolve in 2023. By better understanding the aforementioned topics, security professionals will be better prepared to adapt faster, deliver exceptional digital plus physical experiences, and capitalize on breakthrough innovations in solutions and services. Read the survey in its entirety here. HID powers the trusted identities of the world’s people, places and things. We make it possible for people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and billions of things are connected through HID technology. We work with governments, educational institutions, hospitals, financial institutions, industrial businesses and some of the most innovative companies on the planet.  

Read More

Fortinet Unveils New ASIC to Accelerate the Convergence of Networking and Security Across Every Network Edge

Fifth-generation security processing unit (FortiSP5) delivers unparalleled levels of power-efficient performance to open new frontiers for securing the branch, campus, 5G, edge compute, operational technologies, and more Fortinet®, the global cybersecurity company driving the convergence of networking and security, recently announced FortiSP5, the latest breakthrough in ASIC technology from Fortinet, propelling major leaps forward in securing distributed network edges. Building on over 20 years of ASIC investment and innovation from Fortinet, FortiSP5 delivers significant secure computing power advantages over traditional CPU and network ASICs, lower cost and power consumption, and the ability to enable new secure infrastructure across branch, campus, 5G, edge compute, operational technologies, and more. Unparalleled innovation in custom chip performance With an application-specific design and embedded multi-core processors to accelerate the convergence of networking and security functions, FortiSP5 delivers: 17x faster firewall performance compared to leading standard CPUs. 5x faster next-generation firewall (NGFW) performance compared to leading standard CPUs to handle higher levels of traffic inspection to detect and block threats. 32x faster encryption to protect sensitive data and secure virtual private networks. 5 Gbps of SSL deep inspection to deliver the processing power needed to inspect encrypted traffic for malware without performance issues. Secure boot to allow only approved operating system software to boot up, protecting critical infrastructure against malicious tampering. Volumetric DDoS protection to thwart distributed denial-of-service (DDoS) attacks. VXLAN/ GRE hardware-accelerated encapsulation to enable secure interconnectivity for distributed networks. Hardware-accelerated Quality of Service (QoS) to enhance user experience with dedicated QoS for sensitive applications such as video conferencing. Significant cost and energy savings As a fifth-generation 7-nanometer chip, FortiSP5 packs more capabilities in a smaller form factor to deliver: 88% less power consumption compared to the leading industry-standard CPU. Industry-leading performance per watt. Industry-leading price-performance. Supporting more applications to enable important customer use cases With the ability to accelerate and concurrently run 2x more applications – for example, NGFW, zero-trust network access (ZTNA), SD-WAN, and SSL inspection – compared to the previous generation, FortiSP5 will support use cases such as: Branch/ Campus: FortiSP5 ensures the transition to SD-Branch is efficient and cost-effective in a small form factor, enabling IT staff to simplify management and reduce OpEx while increasing network uptime. Additionally, as more organizations embrace the cloud and hybrid work model, FortiSP5 will continue to be a driver for Secure SD-WAN to empower customers to securely and seamlessly access applications any where while delivering consistent user experience with an optimized platform. Edge Compute: As edge computing improves efficiency and cost control through processing close to the edge, FortiSP5 supports high-speed networks and security threat protection for both commercial and operational technology (OT) environments, minimizing bottlenecks for traffic movement. Operational Technology: The convergence of IT and OT has opened the infrastructure to increased security risks that can disrupt operations. FortiSP5 enables scalable convergence, securing both OT and IT infrastructures with a single, high-performance platform. 5G: 5G adoption is on the rise in enterprise networks, fueling innovation at the edge as it provides higher bandwidth and lower latency. FortiSP5 enables a seamless transition to support 5G with an optimized and sustainable platform. Proven system on a chip technology FortiSP5 will power the next generation of entry and mid-range FortiGate firewalls being released later this year. Now on its fifth generation, we believe Fortinet’s proprietary system on a chip technology has a proven track record of powering the industry’s top-performing products and solutions. A few examples include: Fortinet has been named a Leader in the 2022 Gartner® Magic Quadrant™ for Network Firewalls,¹ marking the thirteenth time Fortinet has been recognized in this Magic Quadrant. A recent Forrester study2 highlighted that customers deploying Fortinet’s Secure SD-WAN solution, which is backed by FortiGate and SOC technology, achieved a 300% return on investment over 3 years with a payback period of only 8 months. Fortinet supports sustainability goals The energy efficiency and performance per watt of FortiSP5 and the products that leverage the chip will help organizations reduce their power and space requirements. Fortinet remains committed to sustainable product innovation to ensure each generation of its products consumes less energy and is built sustainably. Today, Fortinet’s Sunnyvale headquarters is a net-zero emissions facility and plans for global operations to be completely carbon neutral by 2030. Fortinet was recently named to the 2022 Dow Jones Sustainability World and North America Indices as one of the top sustainable companies in the world, highlighting Fortinet’s commitment to achieving a sustainable society Vishak Raman, Vice President of Sales, India, SAARC and Southeast Asia at Fortinet said, “With the introduction of FortiSP5, Fortinet once again sets new industry records for performance, cost, and energy efficiency. As the only cybersecurity vendor leveraging purpose-built ASICs, an over 20- year investment in innovation, Fortinet delivers the secure computing power that will support the next generation of secure infrastructure.” “Enterprise applications and the users and devices that access them are more distributed than ever, which is causing organizations to rethink their edge network and security architectures. A key to enabling enterprise edge networking is having strong security without compromising on network performance and user experience. Fortinet has a 20-year history in ASIC technology that helps achieve these goals, and the company’s newest FortiSP5 continues that legacy. Fortinet’s portfolio of converged network and security solutions with custom chips helps enterprises accelerate their edge network and security transformation,” said Brandon Butler, Research Manager, Enterprise Networks at IDC.  

Read More

XDR-Powered SOC: A Smarter Way to Tackle Traditional SOC Challenges

Fight threats with the combined power of Managed SOC by Eventus and XDR by Trend Micro The cyber threat landscape has been expanding, unchecked and at an unfathomable rate. The threat surface has become thinner with the fusion of the digital and real world. The vulnerability of every sector has increased multi-fold. Countering these threats from internal and external sources has become daunting. In 2022 there has been a huge difference between the number of attacks that occurred in Q2 and Q3. This difference is bigger when comparing the 2021 and 2022 attack numbers. Statics show in Q3 2022, the number of cyberattacks increased by 1/3rd compared to Q3 2021, and by 10% compared to Q2 2022. More than numbers, the sophistication level of the threats is a cause for worry. The ransomware attack against AIIMS Delhi showed how threat actors are stronger with much more advanced tools at their disposal. A recent study says that having a Security Operations Center (SOC) improves an organization’s ability to contain any threats by 43%. By a general definition – ‘SOC is a centralized function within an organization. It employs people, processes, and technology to continuously monitor and improve an organization’s security posture. All this while preventing, detecting, analyzing and responding to cybersecurity incidents.’ A traditional SOC however was good when threats were traditional and not rampant. Today, especially for businesses, using a traditional SOC will only pose challenges: Manish Chasta Co-founder & CTO at Eventus TechSol “Generally using an XDR-powered SOC means that it augments the traditional SOC. So by using this tool an organization sees improvement in vulnerability assessments. A proactive strategy is taken up prioritizing the risks that are countered by analyzing the threat patterns and meeting the expectations of cyber insurance providers. Naturally, the XDR portfolio powered by Trend Micro provided by Eventus is highly modernized. It aids the SOC in streamlining the threats and ensuring that the SOC team focuses on the most pertinent threats. Our MXDR can even recognize IoT devices or unmanaged endpoints such as BYOD devices that may have been compromised, making use of advanced AI to analyze and prioritize threat data. This is evidenced by our CERT-In Empanelment, a testament to the quality of our security solutions” #Challenge 1: Missing critical alerts due to overloading A mid-size organization faces threats on an everyday basis. Data suggests that for a workplace of 1,000 employees, almost 2 million events are generated daily. An overload of alerts overwhelms security teams and critical events are missed. #Challenge 2: Gaps in visibility with security solutions By using multiple security applications, specific alerts are targeted one-on-one and the issue is resolved. When this happens analysts miss the whole picture and have visibility in silos. The value is often limited by the type and depth of the data collected and the level of correlated analysis possible. The lack of integrations is a supreme challenge in traditional SOC. #Challenge 3: Conducting a difficult and time-consuming investigation An overwhelming number of alerts are generated in a day which leads to missing critical alerts. But once the alerts are neutralized security teams always try and investigate the alerts. This may not always be possible due to a lack of in-depth knowledge and resources, especially since it would be done manually. #Challenge 4: Increase in risks due to slow response and detection Combing through millions of alerts unable to find which are critical leads to higher risks for organizations. When there is a delay in detection, the response to mitigate the alerts is also slow affecting the operations of any organization negatively. This stage is achieved when other challenges are snowballed and thrown at the security teams. This is the biggest challenge faced when using a traditional SOC. Eventus TechSol has understood this and designed Managed SOC platform which is also known as SOC-as-a-Service. This platform gives complete visibility across multiple security layers processing millions of events. It has enriched threat intelligence driving faster threat detection and automated response combined with expert threat analysis. While Managed SOC provides the best results in mitigating threats, a sophisticated level of security is achieved by combining XDR and Managed SOC. The XDR Powered SOC collects and automatically correlates data across multiple security layers and allows faster detection of threats, improved investigation and response time. It provides full visibility of the kill chain of an attacker. “Eventus has decades of understanding of the cyber threat landscape and the evolving technology. This is why we have designed our Managed SOC close to the needs of organizations. We take pride in stating that our SOC platform is the ‘Next Gen Way.’ Its strength is the presence of Extended Detection and Response (XDR). The XDR-powered SOC platform is ideal for keeping endpoints, networks, cloud and servers secure. Our specialized threat detection and hunting platform, combined with the deep knowledge of security experts, delivers faster responses with a higher degree of confidence 24x7x365,” said Manish Chasta, Co-founder & CTO at Eventus TechSol. A traditional SOC works in silos, hence giving rise to the need of using an XDR-powered SOC in modern times. A combination of XDR and SOC will automate the entire SOC-as-a-Service offering. This is a modernization of the solution while negating the challenges faced by traditional SOC. The XDR-powered SOC is ‘context-driven’ which provides the entire visibility of the kill chain of an attacker. Our AI-supported XDR is powered by Trend Micro. It extends continuous threat detection and monitoring, and automated response beyond endpoints. It ingests threat intelligence streams to allow organizations to defend against known attacks. This allows security analysts to address actual threats faster. Eventus here has an upper hand, where they also provide MXDR i.e., Managed XDR portfolio as part of the Managed SOC solution. Eventus’ Managed Services monitor the MXDR deployment 24×7 and remotely investigate all critical security events. Real-time events from endpoints and networks will be continuously sent to the SOC via event logs and alerts. If a critical event is detected and validated, it…

Read More

AX PRO Wireless Alarm System Launched in India

Hikvision India Partners with PACC 2023 to Showcase Innovative Security Solutions Hikvision India, an IoT solution provider with video as its core competency, has partnered with the 9th edition of Project Heads, Architects and Consultants Conclave (PACC2023) in Kochi. The company showcased its latest innovative security technologies and solutions during the event. It has recently participated as a presenting partner for the Fire and Security Association of India’s Project heads, Architects & Consultants Conclave (PACC) event. At the event AX PRO Series Wireless Intrusion Alarm System was launched with big fanfare in the presence of security industry leaders and dignitaries. The newly launched AX PRO Series Wireless Intrusion Alarm System enables more reliable intrusion detection with home automation features. While launching the latest product AX PRO Series Wireless Intrusion Alarm, Ashish P. Dhakan, MD & CEO, Prama Hikvision India said, “We are happy to launch AX PRO, an intelligent alarm system with convergent solutions. This intrusion system helps to detect security breaches instantly and reliably. It also minimizes false positives. This product can help companies, homeowners, retail store owners, and key institutes to enable highly reliable video verification solutions, secure wireless transmission, and a wide range of state-of-the-art alarm detectors.” Commenting on the success of the PACC event, Ashish P. Dhakan said, “Hikvision has partnered with FSAI’s PACC Conclave to evangelize the latest innovative security technologies among the professional community and end-users.   We are here to share Hikvision’s next generation technology solutions and latest innovative products with the industry leaders and technology experts. We are striving to evangelize the adaptation of latest security technologies and solutions based on AI, Deep Learning Big Data and Robotics. Let’s join hands to make ‘Surakshit Bharat’ by providing the bestin-class security solutions.” Hikvision booth at FSAI’s PACC event showcased the latest offering AX PRO series wireless intrusion alarm system. It also displayed walls showcasing the command control centre, real estate solutions, specialized products, time lapse solution and packet tracking solution. After the lamp lighting and inaugural session the keynote speech was delivered by Mr. Dhakan on the theme ‘Make in India 2.0 and an Indigenous Manufacturing roadmap for Atmanirbhar Bharat.’ During the keynote speech he elaborated, “We are committed to the ‘Make-in-India’ 2.0 vision with a long term plan. Our state-of-the-art manufacturing facility is the largest security product manufacturing facilities across the country. We are doubling the manufacturing capabilities of our manufacturing facility due to the growing demand in the market. We are empowering to the local youth by providing training and employment.” After the debate session Hikvision AX PRO series product was unveiled in the presence of dignitaries. The BIG7 Debate on ‘SURAKSHIT BHARAT (Dream V/s. Reality)’ was moderated by Pankaj Dharkar, MEP & Green Building Consultant, PD Associates and FSAI Presidential Member. In TECHVARTA (BREAKOUT SESSION) at the PACC event on the 2nd day of ‘Emerging and Future Fire & Security Threats (Identification Management) in Hotels,’ Gagan Lamba, Vice President, Enterprise Business, Prama Hikvision India gave an impactful perspective on the latest security trends in the hospitality security. The Hikvision presentations at the PACC event were well received. The engaging panel discussions, presentations and interactive sessions with the participants provided valuable insights. The FSAI’s PACC event was aimed at bringing the Project Heads, Architects, Consultants, System Integrators, OEMs, and End-users onto a common platform. The focus of PACC was to provide the platform for presentations and deliberations on TECHVARTA, technology evolutions, best practices, implementation, standards & codes, market challenges and growth in the industry. The three-day event had empowering presentations (from expert professionals as well as event partners) and insightful panel discussions under the TECHVARTA segment. This event witnessed a participation of 750 delegates. The PACC 2023 concluded on a high note as the event has got an overwhelming response from the delegates.  

Read More

Why It Pays to Be Single Minded

3xLOGIC has developed a comprehensive ecosystem of integrated security and access control products that perfectly complement each other and, in turn, provide greater value. Richard Joslin, Senior Director of Global Sales for 3xLOGIC, explains why it makes sense to use one supplier that can meet all requirements. As a leading provider of intelligent security technology, 3xLOGIC’s product ecosystem simplifies the lives of customers and adds value to any deployment. Our video surveillance and access control systems provide an entire endto-end security and business solution that can be tailored to each customer’s needs through a single point of contact. Beyond security The word ecosystem perfectly encapsulates 3xLOGIC’s longstanding approach. It drives us to develop products that can be easily integrated, scaled, and are fully tested prior to being installed – making the process of system design and specification simpler and more reliable. An ecosystem is all about interconnection and at the heart of 3xLOGIC’s offering is the VIGIL Video Management System (VMS). This centralised software platform allows the monitoring of 3xLOGIC’s VIGIL range including National Defense Authorization Act (NDAA) compliant cameras, network video recorders (NVRs), software, advanced imaging devices with artificial intelligence (AI) based capabilities, recording appliances, mobile apps, accessories, and mounts. Life changing Data has changed our lives, the way we communicate and the way we interact – the more data you have the better informed you are and the more meaningful business decisions you can make. New data is becoming available every day, making it easier for business leaders to optimise their operations, find efficiencies, protect their buildings and assets, and solve problems. 3xLOGIC has developed a range of on-premise and mobile solutions that can maximise the effectiveness of data and offer value beyond protection. These include VIGIL Client, which offers remote and/ or local live and playback viewing of all video and data collected by a VIGIL Server. Meanwhile, VIGIL Central Management provides information such as which cameras are online, NVR recording status, disk usage, server connectivity, storage resiliency, redundancy and alerts, while VIGIL Smart Search functionality enables individuals to quickly identify and review events. Perfect harmony Integrating access control and surveillance technology makes both elements more effective. Viewing them through the VIGIL VMS and reporting interface and monitoring and analysing data through its software, allows users to view real time events and associated playback video, as well as run reports on events and alarms. Using access control and surveillance technology from the same manufacturer also eliminates disruption and finger pointing between two different system providers if things go wrong. It can also increase safety, for example, if a student loses their access card and can’t get into their accommodation after a night out, an operative can identify the individual quickly, verify them, and let them into the building. Track and trace 3xLOGIC’s innovations deliver transformational business value by mining data and converting it into actionable insights – enabling greater visibility and fresh perspectives. Organisations need to focus their attention on high value application specific data that can lead to positive changes. As such, they are increasingly looking for ways to optimise the use of available data through solutions that provide actionable business intelligence that can be used to increase profit. When it comes to safety of human assets and protection of the public while visiting a premise, 3xLOGIC leads the way via interaction with many types of sensors and external systems. For example, in the US, Active Shooter incidents pose a real threat not only to employees but also to the general public, particularly in areas where crowds might gather. 3xLOGIC’s patented Gunshot Detection Sensor can easily integrate with Access Control Systems for quick lockdowns; Video Management Systems for video verification of an emerging threat; external Alarm Systems for rapid notification of monitoring personnel; and Mass Notification Systems for quick and effective notification of large groups of people as well as First Responders. In an active shooter incident, time is a precious commodity. Giving even just a few seconds quicker notification and providing real-time, accurate situational intelligence can mitigate the damage caused by the shooter. 3xLOGIC’s TRENDS analytics and reporting software makes security management easier, more efficient and more powerful than ever. It turns data into meaningful information – collating, deciphering and presenting it in a way that makes sense by showing present and historical data in a business context. This not only gives insight when you need it, but also offers a fresh perspective to help solve problems that you might not even be aware of. A great example of this is heat mapping, which makes it possible to see where people are going, identify patterns of behaviour, ascertain the popularity of certain items and identify peak times for customer numbers. This information means that products can be positioned effectively, while wait times can be reduced to stop customers leaving a queue. Not only does this provide a better customer experience, but it also means that additional security resources can be allocated to specific areas as and when required, while key performance indicators (KPIs) can also be defined to optimise efficiencies. Up in the sky In terms of product ecosystem development, all eyes continue to be on the cloud. 3xLOGIC recognised the potential of the cloud early on through the development of solutions such as the VIGIL CLOUD, which extends the functionality of the VIGIL VMS. VIGIL CLOUD can be accessed via a standard web or smartphone app. A user can easily view live and playback video from cloud cameras, bookmark cameras for quick and easy access from the main dashboard, check camera health status, export footage clips and collect and package related video events together in case files that can be easily retrieved at a later date – anytime, anyplace, via any device. The cloud also makes collaboration easier, which is especially important considering how hard it can be to share large video files with colleagues. The next step is video in the cloud, which is already established in the US and now coming…

Read More

Threats to Internal Security in India

By Colonel B. S. Nagial (Retd.) Threat to the security of a nation is a matter of grave concern not only to Armed Forces and Para Military Forces or political leadership but also to every citizen, irrespective of profession or vocation. While those at the helm of making arrangements to meet the threat must study and follow its development very closely, every citizen must also be well aware of the matters related to the nation’s security. Today, war is no longer confined to a clash between two armies in isolation of the people. It involves the whole nation. The security of a nation involves two aspects: external security and internal security. These are two essential aspects of a nation’s security. While external security refers to protecting a nation’s borders and sovereignty against external threats, internal security refers to maintaining law and order within the country and protecting citizens against internal threats. External security protects a nation’s borders, territorial integrity, and sovereignty against external threats such as military aggression, terrorism, espionage, cyber-attacks, etc. It involves using military, diplomatic, economic, and political means to deter and counter the external threat. External security also consists of forming alliances with other countries to strengthen the country’s defence capabilities and promote regional and global security. Internal security refers to maintaining law and order within the country and protecting citizens against internal threats such as terrorism, insurgency, communal violence, organised crime, cybercrime, etc. It involves using law enforcement agencies such as police, paramilitary, intelligence, and other security forces to prevent and counter internal threats. The primary responsibility for internal security lies with the police and other law enforcement agencies. Internal security also involves the promotion of social harmony, the protection of minority rights, and the prevention of radicalisation and extremism. External and internal security is crucial for a nation’s stability and prosperity. While external security protects a nation’s sovereignty and territorial integrity, internal security ensures the safety and well-being of its citizens. A balanced and coordinated approach towards both aspects is necessary for maintaining national security. India’s Internal Security situation Contrary to popular belief, the threats stemming from the internal security situation in India are enormous and intricate. Faced with various challenges, India’s experience in dealing with these challenges is mixed in nature. No nation in the world has faced such a magnitude of problems as India has encountered and is still coping with them. Though difficulties posed by internal security have been largely overcome, they have not been wholly routed from Indian soil. Because of the seriousness of the issue, an attempt has been made to acquaint ourselves with India’s Internal Security situation. As per the Ministery of Home Affairs of India’s annual report 2022, the internal security of India could be classified into the following categories: Terrorism in hinterland. Left Wing Extremism(LWE) in certain parts of India. Insurgency in the Northeastern States. Cross-Border Terrorism in Jammu and Kashmir. Terrorism in Hinterland Terrorism in any city or town deep inside the country is called hinterland terrorism. Terrorism in the Indian hinterland results from a complex set of interrelated factors. India’s rendezvous with terrorism and violent extremism is deeply rooted in history, partly due to the religion-based partition in 1947, which divided the sub-continent into India and Pakistan. The sub-continent witnessed the most shocking ethnic riots in modern history, marked by extreme violence and acts of terrorism. Instead, seeds of terrorism were sown with the Arab Invasion of India and culminated in the demand for a two-nation theory. However, India moved away from the horrors of the past and carried on the path of development both of nation and human resources. But Pakistan has not come out of the two-nation theory and still holds this ideology. Since 1947, Pakistan has left no chance to weaken India internally. To understand the significance of the threat posed by terrorism, we need to go back to Afghanistan War in the 1970s and 1980s. The former USSR intervened in the internal affairs of Afghanistan to support the pro-communist regime against the Muslim Mujahidin. The Muslim Mujahidin appealed to world Muslims to support them in Jihad against USSR. Muslim volunteers came from around the world to Afghanistan to form part of this jihad. Most of these Mujahidin were trained and funded by the US through Pakistan. Pakistan conveniently and cunningly diverted these funds to launch terrorism against India. When USSR left in 1989, there was chaos in Afghanistan. The Muslim volunteers from around the world were divided into three groups: one group remained in Afghanistan, and members were united under the guidance of Osama Bin Laden to form Al Qaida. Members of the second group returned to their native countries and joined/started Islamic Fundamentalist Terrorist organisations. The third group dispersed to the western world to spread Islamic Fundamentalist ideology. After its defeat in the 1971 war, Pakistan primarily launched a policy to bleed India by thousand cuts. It started waging a proxy war against India by targeting significant cities. Khalistan terrorists also used this strategy following the insurgency in Punjab. Examples of this kind of terrorism include the 1993 Bombay blasts, the 2001 Parliament attack, the 2002 Raghunath Mandir and Akshardham attacks, the 2005 Delhi Blast, the 2006 Mumbai Train blast, the 2008 Gujrat and Jaipur serial blasts and Mumbai Attcak, the 2016 Pathankot &Uri attacks, the 2019 Pulwama, etc. Left Wing Extremism in India Left Wing Extremism (LWE) is embedded in the communist political movement, which started in 1920 and has grown in numerous streams since then. However, their basic ideology is to establish a classless society in India, but they differ in achieving their ends. Communist Party India (CPI) adopted the electoral process in 1951. A few radical elements broke away from the CPI in 1964 to form CPI (Marxist). And when CPI-M adopted electoral democracy, a more radical Maoist faction within CPI-M initiated the violent Naxalite movement. In 1969 Charu Muzamdar formed a new group called CPI-M&L based on Marxist and Lenin philosophies. By 1972 the communist…

Read More

Augmented Computer Vision Continues…

Automated Visual Inspection & Content Analysis for Manufacturing – Automotive Prakash Prabhu – Chief Business Officer & Co-Founder, VisionBot In this feature, we will discover benefits of automated visual inspection, content analysis and deep learning methodologies for Manufacturing enterprises. Computer vision driven automated video content monitoring for future digital factories Computer vision can be used in manufacturing for quality assurance by automatically inspecting products for defects or deviations from specifications. This can be done using techniques such as image processing and deep learning to analyse images or videos of the products. Computer vision is a type of technology that is revolutionizing the way that we think about retail. By using machine learning algorithms, computer vision is able to ‘see’ the world around us and make sense of it in ways that were previously impossible. Computer vision can be used in manufacturing for quality assurance by automatically inspecting products for defects or deviations from specifications. This can be done using techniques such as image processing and machine learning to analyse images or videos of the products. This can help to improve the accuracy and efficiency of the inspection process and reduce the need for human inspection. Some examples of computer vision application in manufacturing include: Identifying defects on a surface of a product Computer vision can be used to identify defects on a product surface by using techniques such as image processing, pattern recognition, and machine learning. This can be done by capturing an image of the product surface, pre-processing the image to remove noise and improve contrast, then using algorithms to detect any anomalies or defects that deviate from a standard pattern. Some common defects that can be detected include scratches, cracks, chips, and blemishes. The results can be used for quality control and to improve the manufacturing process. Checking the alignment and orientation of components Computer vision can be used to check the alignment and orientation of components by using image processing and computer vision algorithms. This can be done by capturing an image of the components and using algorithms to analyse the image and determine the relative positions and orientations of the components. Some common algorithms used for this include feature detection, template matching, and edge detection. The results can be used for quality control and to improve the manufacturing process by ensuring that components are properly aligned and oriented. This can help to reduce defects and improve product reliability. Measuring dimensions and tolerances Computer vision can be used for measuring dimensions and tolerances by analyzing images of objects and using algorithms to extract dimensional information. This can be done using techniques such as edge detection, blob analysis, and pattern recognition. The system can be calibrated using a known reference object, and then used to measure the dimensions and tolerances of other objects. The results can be used for quality control, to ensure that products meet specified dimensional requirements, and for process improvement, by using the data to optimize production processes. The use of computer vision in measuring dimensions and tolerances can increase accuracy and efficiency compared to manual measurements. Detecting missing or misplaced parts Computer vision can be used to detect missing or misplaced parts by analysing images of a complete assembly and comparing it to a reference image of the expected assembly. This can be done using image processing techniques such as object detection, pattern recognition, and machine learning. The system can be trained on a set of images to learn what a complete assembly should look like, and then use this knowledge to identify any missing or misplaced parts in new images. The results can be used for quality control, to ensure that all necessary parts are present and properly assembled, and for process improvement, by using the data to optimize production processes. The use of computer vision in detecting missing or misplaced parts can increase accuracy and efficiency compared to manual inspection. Monitoring assembly processes for compliance with standard procedures Computer vision can be used to monitor assembly processes for compliance with standard procedures. This is done by using cameras to capture images and videos of the assembly process, and then using computer vision algorithms to analyse the images and videos in real-time. These algorithms can be used to detect deviations from standard procedures, such as incorrect assembly sequence or incorrect parts being used. This information can then be used to alert operators to take corrective action or to record non-compliant actions for further analysis and improvement of the process. Tracking and identifying products throughout the manufacturing process Computer vision can be used for tracking and identifying products throughout the manufacturing process. This is done by using cameras to capture images and videos of the products at various stages of the manufacturing process, and then using computer vision algorithms to analyse the images and videos in real-time. These algorithms can be used to identify individual products and track them as they move through the manufacturing process. This information can then be used to ensure that each product is processed correctly, and to track the location of products within the manufacturing facility. Additionally, computer vision can also be used to verify product quality, by analysing images of each product to ensure that it meets specified quality standards. Integrating Machine Vision with AI driven Augmented Computer Vision Objective of the integrated solution – To use automated visual monitoring and AI driven event notifications to monitor, detect and alert for real time observations, asset monitoring, predictive maintenance and centralized reporting of Visual monitoring and Machine Vision Images, alerts on incident/ event detection. VisionBot™ Cloud Automated Computer Vision for Automotive Manufacturing VisionBot™ Computer Vision is one of the many Artificial Intelligence solutions that will continue to transform manufacturing. Leading survey says computer vision will be very important, and 58% said that their firm is implementing, planning to implement, or interested in implementing computer vision in the coming year. It allows machines to extract meaningful information from image and, now, even video data by using sophisticated machine learning…

Read More

India Risk Review 2023

If 2022 was the year of India’s resurgence and resilience, 2023 can be termed as the year of economic fruition, internal security challenges and guarded optimism. Despite global headwinds, the prolonged war in Ukraine and increasing prospects of global recession, the India growth story will remain buoyant, and robust on the back of strong domestic factors. The World Bank opines that “while the deteriorating external environment will weigh on India’s growth prospects, the economy is relatively well positioned to weather global spillovers compared to most other emerging markets.”The year ahead will continue to be determined and shaped by geopolitical events. Their impact will cast a shadow on energy and food security, while also posing a risk of trade wars/barriers which India will have to navigate adroitly. Events like the price cap on Russian oil, and continued sanctions by the Western bloc, will create stress in our relations with some friendly countries. India as the newly elected President of G20, will need to be more objective and assertive in trying to solve the Ukraine imbroglio. Further deterioration of relations between NATO and Russia poses a strategic security dilemma for India. The political uncertainty and resultant instability in Pakistan is a matter of concern for India. The forthcoming elections in Pakistan will manifest in a hardening of anti-India stance and rhetoric by most political parties. The recent undiplomatic utterance against PM Modi by the Finance Minister of Pakistan has exacerbated the situation further, and any chances of talks on easing of relations between the two has suffered a major setback. With Pakistan battling internal insurgencies, and increasing problems on its Eastern borders, any adventurism on our borders is unlikely. A reasonably stable LOC and secure borders with Pakistan for 2023 can be thus be forecast. While events with China remained on low key for most of 2022, the year-end skirmish near Tawang demonstrated the fragility and volatility of the LAC with China. While the Indian Army stood its ground and deterred Chinese designs firmly, the political fallout of the incident would increase the existing trust deficit between the countries, and also seriously undermine political options for a quick resolution of the boundary issues. The increased hostility would play out in the Asia-Pacific region, and push India further into taking a harder stance in QUAD, and result in increased militarization of its maritime interests in the Indian Ocean region. Relations with China will continue to be strained but any large scale hostilities are unlikely. Notwithstanding the security concerns, trade with China will continue to grow, albeit to China’s advantage. Internally, the acrimonious electioneering towards the end of 2022 showed the increased polarisation and hardening of ideological stance by the ruling party, and the strident, but fractured opposition. This trend will not only continue in 2023, but is likely to deteriorate further with many high decibel elections due in the year. A degree of unrest and violence connected to political events cannot be ruled out. While the traditional internal security challenges like Maoism, and trouble in J&K are on the wane, societal unrest, strikes and large scale protests due to unemployment, reservations, and political affiliations are likely. The Maharashtra-Karnataka border issue has the potential of escalating as it has major political ramifications. The election of Prachanda as PM of Nepal is also an event of geo-political event of significance for India, and would need deft handling as some border tensions with Nepal could spiral out of control. Overall, 2023 could see a possible V-shaped economic recovery on all fronts despite various headwinds. The external security scenario, though challenging, will remain mostly stable. Internal tensions and strife due to high intensity elections is most likely and would need to be monitored. Climate change, sustainability and cyber threats will also pose challenges for business in 2023. In summation, 2023 will be the year of the coming of age for India both economically, as also on the geopolitical front, with it assuming presidency of the G20 and its attendant responsibilities. For India, 2022 began with the country seeking to refocus attention on multiple developmental fronts after waves of the COVID-19 pandemic subsided. Following a rollback of pandemic restrictions in late 2021 to enable economic recovery and a return to normalcy, the emergence of the Omicron variant and its eventual detection in India prompted another wave of lockdowns and restrictions across most parts of the country. However, the robust vaccine administration and lessons learnt from the second wave meant that the third wave was relatively benign, and several state governments realized the need to lift all restrictions in a gradual manner; and reorient lifestyles and business operations to coexist with the new realities brought by the pandemic. An outbreak of infections in neighbouring China and the emergence of a sub-lineage of the Omicron variant have prompted fresh fears of a fourth wave. The emerging new strains of the pandemic have already triggered testing, surveillance and masking protocols; but the disaster management capability built up over the last couple of years is likely to result in a more resilient posture for India in 2023. Notwithstanding the latest spike, businesses, governments, and citizens alike have learnt to live along with the virus, and would be able to cope with any eventual outbreaks in the coming year. On the geopolitical front, relations with China and Pakistan remained adversarial, but relatively peaceful up until December, when Indian and Chinese troops engaged in unarmed clashes at Tawang sector in Arunachal Pradesh when People’s Liberation Army of China (PLA) soldiers tried altering the status quo. Several injuries were reported on both sides, and the clashes threatened to unravel and reverse any gains made in September when both troops unanimously agreed to disengage from the Gogra Hot Springs region. Ties with Pakistan witnessed a relative thawing in 2022 after the escalations in 2019 and 2020, with the Pakistani government even considering requesting aid from India following the widespread floods in the country. However, it remains impossible to delink the issue of Kashmir from India-Pakistan…

Read More

Upgrading Hdd to Ssd Why to Consider It

Yogesh Agrawal, CEO & Co-Founder, Consistent Infosystems Pvt. Ltd. In today’s fast-paced world, keeping up with the competition requires a tremendous effort. If you don’t move fast enough, you could risk losing almost everything you started for. Let’s get straight to the point – it’s your digital speed we are referring to. If the performance of your desktop or laptop is sluggish, the loss of time means a loss to your business. Replacing that old laptop with a newer generation may seem like the perfect solution, but it’s not as cheap as you may think. Upgrading your existing system may be the right decision where you not only save on a huge expense but also boost your productivity by up to 200%, and more. So, what makes your system perform like an old haggard? Apart from the operating system, the hardware, namely Processor, RAM, and Storage, are also hand-inglove that drags down your system’s potential. While the processor can’t be upgraded as easily, the RAM (Memory) can be scaled to twice, or three times, its size. However, that’s just enough to work easily on extensive files and keep your operating system running smoothly. To have a high-performance system, your data needs to be moving faster between the storage and processor. If you are using an older technology mechanical hard drive, then you should switch to solid-state storage (SSD) to boost your system’s performance up to 10 times or more, depending on how old your current system is. We bet that your ‘not-too-old’ laptop would be definitely using a SATA HDD storage, and probably spinning at a speed of 5400rpm – right? If not, it would be a 7200rpm drive, at most. This means you are transferring data at speeds of up to 200MB/s (megabytes per second) to the max. If you switch to a SATA SSD, you can find promising data transfer speeds amounting to a whopping 600MB/s – an instant 3x performance boost. And if your system is compatible with an NVMePCIe, then you can push it to a humongous 3200MB/s or even higher. Now imagine your huge data – probably some RAW photos, large PSD files, bloated databases, or those latest gaming titles, that amount to gigabytes of data – being drawn in and out of the HDD. Swapping that mechanical HDD to a blazing-fast SSD or an NVMe is your only rescue. What is an SSD? Unlike the old HDD (Hard Disk Drive) which uses a spinning magnetic disc with moving heads and arms inside, Solid State Drives, or SSD, is a type of storage that uses non-volatile memory chips or flash and has no moving parts. HDDs with moving parts are highly prone to shocks and vibrations, while SSDs are extremely safe. Hard drives also consume a lot of power, while SSDs are highly energy efficient. Finally, SSDs perform at blazing speeds, which takes time because of the limitations of the spindle motor speeds and the moving arm. The two key components of an SSD are the flash controller and the NAND chips, which are optimized together in a way that they can deliver high readand-write performance to obtain sequential and random data requests from demanding applications. What are the types of SSDs? SSDs are available in multiple types, capacities, and form factors. SATA and SAS are the two traditional SSD form-factor types, while newer form factors include mSATA and M.2, and the high-speed NVMe. What are the benefits of switching to an SSD? Switch to an SSD and you will instantly notice a huge difference in your system performance. For example, your computer’s operating system Windows will boot up in under 10 seconds. Heavy or large software and databases can load faster than usual, saving time and reducing man-hours. Large files, such as documents, music, movies, archives, and alike, can load into the system’s memory within seconds. To sum it up, SSD has a lot of advantages – they offer faster read and write speeds, boost the system’s performance and cut down booting speeds by a substantial amount, have very low power requirements, are completely quiet as they have no moving parts, and come in different form factors to help with compact and ultra-portable computing systems. Is SSD secure? Do they have failure issues? The main disadvantage of an SSD is data recovery – while some may consider it as an advantage to prevent data theft. Recovering data from crashed or hardware-failed SSDs is extremely difficult and hence requires having a data backup plan in place. And yes, they have hardware failures too, but it’s the least if you compare it to a standard HDD. No moving parts mean SSDs can withstand drops and falls and are completely immune to magnetic fields, unlike HDDs which can lose data when a strong magnet is brought into proximity. Lastly, since they are electronic components, the performance starts decreasing after the drives start aging. A hard drive has a lifespan of up to 5 million write cycles, while an SSD can do an average of 100,000 cycles, in short. Are SSDs affordable? While the world’s largest SSD yet is a 100TB but is not yet ready for the consumer market. At present, SSDs on the market range in different sizes – 128GB, 256GB, 512GB, 1TB, 6TB, 8TB, and so on. The sluggish performance and low reliability of hard drives have got the industry switching to the faster SSD. This increasing demand for SSD drives is continuously helping drop the price, making it affordable for everyone. Future computers will see only SSDs as the storage as it helps reduce the overall size and weight of the computer while boosting the performance.  

Read More