securitylinkindia

Analog Devices Hosts Open RAN Policy Coalition Reception

Analog Devices, Inc. hosted an Open RAN Policy Coalition (ORPC) networking event recently as part of its larger Open RAN presence at Mobile World Congress (MWC). ORPC promotes policies that further the adoption of open and interoperable Radio Access Network solutions, advancing innovation, expanding supply chain diversity, and speeding time to market for advanced wireless technologies such as 5G. The attendees included ORPC members, policy experts, and leaders from across the telecoms industry. “Open RAN’s potential for technology innovation and industry transformation has been a focal point for ADI and MWC this year. Open RAN’s greater interoperability increases choice in radio-access network gear, accelerating innovation and reducing cost. To achieve these goals, however, a robust ecosystem with an informed regulatory environment supportive of Open RAN goals will be critical. The ORPC plays an important role in facilitating the necessary relationships and discussions among industry participants and governmental organizations,” said Andy McLean, Corporate Vice President, Communications and Cloud at ADI. “Open RAN Policy Coalition members believe that with continued support for policies that lower barriers to entry, promote innovation, increase competition, and reduce costs, we can create a thriving marketplace for 5G and beyond. Key in our endeavors is fostering public-private cooperation towards the shared goal of an ecosystem that is diverse, resilient, and secure. This informal event presented a wonderful opportunity to connect with our members and partners to share ideas as we work together to promote open and interoperable networks,” said Diane Rinaldo, Executive Director, Open RAN Policy Coalition. Analog Devices, Inc. is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $12 billion in FY22 and approximately 25,000 people globally working alongside 125,000 global customers, ADI ensures today’s innovators stay Ahead of What’s Possible. Open Ran Policy Coalition is a group of companies formed to promote policies that will advance the adoption of open and interoperable solutions in the Radio Access Network (RAN) as a means to create innovation, spur competition and expand the supply chain for advanced wireless technologies including 5G.  

Read More

Honeywell Launches Blenze Pro Wiring Devices, the New Premium Range for Indian Market

Honeywell recently announced the launch of its premium range of wiring devices, Blenze Pro for the Indian market. Blenze Pro range is specifically designed to meet the high-end wiring requirements by architects, interior designers, builders and developers for residential, commercial and hospitality buildings. Featuring a range of front plates made of high-quality materials including metal and glass, Blenze Pro Wiring Devices provides a unique and sophisticated look. The devices also offer a silent-and soft-switch operation and perfect illumination, enhancing both the convenience and aesthetics of the product. “We are committed to offering our customers the very best in engineering and design, and Blenze Pro represents the latest innovation in our product line,” said Sameer Mahajan, Regional General Manager, Building Management systems, Honeywell Building Technologies, India, “Our goal is to expand our footprint in the Indian market and cater to the growing demand for premium products in the residential and commercial hospitality segments.” One significant advantage of Blenze Pro is the ease of installation, as they require no additional wiring and can be installed with the same wiring, saving installation time and costs. Additionally, the white-color SKUs are antibacterial, ensuring the highest standards of hygiene. The range also offers fast charging solutions for mobile devices, including A & C type USB Chargers, making it convenient for users to charge their devices quickly and efficiently. Blenze Pro Wiring Devices were designed to be durable and are capable of enduring up to 100000 operations with ease. Honeywell’s unwavering commitment to innovation, design, and quality is reflected in the premium building and materials used in the devices, providing a reliable and long-lasting solution for buyers seeking the very best in wiring device technology.  

Read More

AX PRO Series Wireless Intrusion Alarm System, Enables More Reliable Intrusion Detection

Hikvision India has launched AX PRO Series Wireless Intrusion Alarm System at PACC event in Kochi with big fanfare in the presence of security industry leaders and dignitaries. The newly launched AX PRO Series Wireless Intrusion Alarm System enables more reliable intrusion detection with home automation features. While elaborating the unique product features of AX PRO Series Wireless Intrusion Alarm, Ashish P. Dhakan, MD & CEO, Prama Hikvision India said, “It is an intelligent alarm system with convergent solutions. Anti-intrusion systems must be able to detect security breaches instantly and reliably – while also minimizing false positives. To help companies, homeowners, retail stores owners, and key institutes to achieve this, Hikvision has created its AX PRO wireless alarm system, which includes highly reliable video verification solutions, secure wireless transmission, and a wide range of state-ofthe-art alarm detectors.” Introducing Hikvision’s AX PRO wireless alarm system Hikvision has created its AX PRO wireless alarm system with long range detection using Tri-x and Cam-x transmission technology, range can be extender further using range extender to cover maximum area using single solution. This includes remote video verification to detect security breaches, secure wireless transmission technology for alarms and video images, and a wide variety of wireless products that trigger alarms rapidly and reliably in the event of a break-in or other security breach. The system also includes the AX PRO hub, which can connect more than 96 detectors to meet customers’ specific security needs. The range is ideal for home protection and small and medium-sized business applications, supporting ‘simplicity through innovation’ for alarm detection. The system includes 5 main types of Hikvision AX PRO wireless alarm detectors: Hikvision AX PRO motion alarm detectors: The AX PRO range offers two types of motion detectors: ‘single element’ detectors, and ‘dual-tech’ detectors. Single element detectors use passive infrared (PIR) or microwave technology to detect moving intruders and to trigger intrusion alarms in real time. Dual tech solutions combine different technologies, such as PIR, microwave, or cameras to verify intrusion threats and to minimize false positives. An example of this type of solution is our ‘PIRCAM’ motion detector, which combines PIR with a smart camera. This solution takes pictures when the PIR sensor is triggered, allowing homeowners or business security teams to verify intrusion incidents remotely. Hikvision AX PRO glass break detectors: AX PRO glass break detectors work with glass of different types and thicknesses. These detectors can be installed on both walls and ceilings facing glass panels or windows. The detectors use high-quality broadband microphones to monitor loud high-frequency and low-frequency noises. In a glass-breakage scenario, loud, low-frequency sounds are created by shockwaves when a pane of glass is struck (with a heavy object for example). At the same time, the high-frequency sound confirms that the glass has shattered or broken. This approach to monitoring low and high-frequency noises ensures that the detectors can distinguish between loud noises in the environment, vibrations caused by high winds, and real glass breakages – helping to minimize false positives. The AX PRO range includes a single-element glass break detector and a PIR motion detector that includes glass-break detection technology in a single unit. Hikvision AX PRO door opening detectors (magnetic contact detectors): Hikvision door opening detectors comprise two parts, a magnet attached to a door or window, and a second unit attached to the frame. When the door or window opens, the switch is broken, and the detector is activated. Hikvision AX PRO ‘shock’ detectors: AX PRO shock detectors use high-quality G-Sensors to monitor the vibration characteristics of different mount surfaces – including wooden walls, concrete walls, and panes of glass. This allows Hikvision detectors to filter out false positives caused by a number of factors, including small, hard objects hitting a wall; dynamic pressures caused by windy weather; and maintenance teams hammering in nails or conducting other work on a building. Hikvision AX PRO ‘environmental’ detectors: The Hikvision AX PRO wireless range also includes lots of additional detectors to improve home and business security. These include both portable and wall-mounted emergency buttons, an EN 14604-certified smoke detector with a 10- year battery life, a water-leak detector, and a temperature detector. Key features of the AX PRO wireless alarm system include: The industry leading AX PRO hub: which allows 210 detectors to be integrated in a single installation. Multi-Path Communication: Onboard LAN, WiFi, GPRS, 3G/ 4G communications. AX PRO Intrusion Verification-as-a-Service (IVaaS): which provides live video verification based on 7 seconds of video recording so users can quickly confirm alarm events on their system. Anti-jamming security: with signal hopping across up to 50 frequencies to protect the integrity of the system. Secure, reliable wireless connectivity: with our powerful Tri-X technology, which delivers the highest levels of security and performance. Fast, simple installation: which requires installers to scan the device QR code and turn on the device, which automatically connects to the control panel. Quick, easy configuration: via the AX PRO mobile app, web portal and Hik-ProConnect.  

Read More

Eliminate Complexity for Data Protection & Threat Prevention Using SaaS-Based Cloud Security

The challenges of today’s businesses are immense. As organizations are going online and operations are automated, there is a substantial increase in the number of endpoints across the world. Every digitally enabled device that now ranges from lighting and home décor to wearables and toys are all endpoints. The operations, associated applications, and the majority of work and leisure are data-driven. Changes post-2020 led to many organizations part from their in-house storage to the cloud. But in the digital age with cloud and data-driven business plans the focus moves towards securing it all. But how to fight against threats while navigating the complexities of multiple aspects? What about the costs involved in dealing with these challenges? SaaS-based solution for endpoint and workload is the answer “ Trend Micro has a powerful Saas-based solution called Cloud One under which Endpoint Security and Workload Security are available. A single solution doesn’t necessarily mean singular capability and this helps get the best of both worlds. This solution conducts 2.5 trillion events processed per day across the network, emails and files. To stop malware, ransomware and vulnerabilities faster, Cloud’s complex public, private and hybrid systems, in-house storage, and diversified endpoints lead to complexities. Siloed, disconnected solutions mean blind spots, alert overload, operational complexity, and security gaps. But these services however can be procured through a single, lightweight agent that protects the servers, cloud workloads and applications. It is for this very reason that Gartner, IDC and MITRE have recommended and ranked #1 respectively in the global market,” said Suchit Karnik, COO at RAH Infotech. So how is in-depth work done and benefits are provided by these solutions? Cloud One Endpoint Security and Workload Security provide: Optimized service options. Broadest security capabilities. Value-adding integrations. Seamless security. Stopping attacks without disruption. Frees up resources. Flexible pricing. The solution enables layered protection and detection capabilities, like antimalware, ransomware protection, hostbased intrusion prevention, device and application control, and more. It provides the most ideal functionality by detecting and blocking threats with a minimal performance impact. This helps achieve role-based access controls and maintain regulatory and compliance requirements. It aids with the integration of full-featured XDR and attack surface risk management. Turn-key integrations are available that connect with other protection products, threat intel, SIEMs, orchestration solutions and more. The solution provides value addition with automated security deployment, policy management, health checks and compliance reporting. With this SaaS-based cloud solution Trend Micro provides a nonstop monitoring of 45+ billion URLs, emails and files. The company has the support of over 15 global research centres and 450 internal researchers, delivering 24/7/365 threat prevention for the cloud. The impact study by Forrester and the recognitions by Gartner, IDC and MITRE showcase how economically disruptive security threats and complexities are. So, Trend Micro Cloud One has proved to be an ideal solution to counter any existing and new challenges an organization meets during its journey. RAH Infotech is India’s leading value-added technology distributor and solutions provider. Headquartered in New Delhi, RAH Infotech has been providing world-class IT solutions since the year 2005 to a large number of channel partners and enterprises in the India & SAARC regions. The rich portfolio includes a wide range of best-of-breed solutions to address requirements across Security, Data, Network, Application, Storage, and beyond. As a top-tier technology enabler, we manage the entire value chain of data management requirements of enterprises and protect their digital assets. We partner with the finest global technology firms to develop customized IT solutions in the area of cybersecurity, networking, cloud computing, data management and application management for various industry verticals.  

Read More

Interface with Dr. Rajiv Mathur Regional Advisor Asia, OSPAs

Dr. Rajiv Mathur What are the challenges you faced in getting OSPAs launched in India? The security industry in India has always been of paramount importance, but in recent times, it has become even more critical due to the increasing focus on the subject. The professionals who work in this industry play a vital role in ensuring the safety and security of people, assets, and information. As a result, there are many awards both in India and globally that recognize and honor the contributions of security professionals and the security organisations. While there are already several prestigious awards in the security industry in India, one award that stands out is the Outstanding Security Performance Awards (OSPAs). These awards are recognized globally and are known for recognizing outstanding performance in the security industry. As someone who has been associated with the security industry for a long time, I first learned about the OSPAs about five years ago from Professor Martin Gill, a renowned expert in the field. I was intrigued by the approach taken by the OSPAs and believed that they could be valuable to the security industry in India. However, bringing the OSPAs to India was not an easy task due to the presence of many other awards in the industry. To address this challenge, I engaged with many industry experts and highlighted the unique value proposi tion that the OSPAs bring to the table. I emphasized how the OSPAs cover all aspects of the security industry, are judged independently, and have relevant and standard criteria that can help raise the bar for the industry in India. After several rounds of discussion and deliberation, we were finally able to bring the OSPAs to India. What do you consider unique about OSPAs? The Outstanding Security Performance Awards (OSPAs) are truly unique in many ways and set a new standard for recognition and excellence in the security industry. Perhaps the most remarkable aspect of OSPAs is that it is the only award that is global, with its reach extending to 18 countries already, and with plans to expand to 29 countries with the upcoming Southeast Asia Awards. This global presence provides a unique opportunity for security professionals and organizations from around the world to compete on a level playing field and be recognized for their outstanding contributions to the industry. One of the most impressive features of OSPAs is its comprehensive coverage of all fields under the security domain. With over 20 categories, OSPAs acknowledge exceptional performances in areas ranging from physical security to logical security, manned guarding, cybersecurity, security training, product development, and much more. It is truly an all-encompassing award that recognizes every aspect of the security industry, making it a coveted and sought-after recognition for professionals across the globe. Prof. Martin Gill Founder, Ospas Next year, 2024 will see a significant development. The design of the OSPAs means that all the categories, and the criteria, and the judging process are exactly the same in every country. So next year the winners of the most of the categories will represent India in the global OSPAs. So an individual or company not only wins the India OSPAs but in so doing will enter the global awards. What an accolade that will be. We do know the very best from India is very good indeed, how good the spotlight on the best in the world will shine on India too. Security technologies are evolving and this offers new opportunities. But we must remember that this is also true of offenders. My own view is that offenders move fast and are quick to spot weaknesses in the latest new security evolution and exploit them ruthlessly. This is why being outstanding is important, offenders are good too (sadly) and they innovate all the time, so just being good at security is nowhere near enough, you have to be outstanding. Moreover, getting things wrong is not trivial. If security is not optimised and is compromised the consequences can be serious, organisations can lose money and reputation for example, in worst case scenarios they have gone out of business. Individuals can be hurt, physically and emotionally, sometimes seriously and sadly fatalities sometimes happen. Having outstanding security is vital and the OSPAs recognise this. Moreover, OSPAs provides a global platform for the security industry, organizations, and professionals to showcase their exceptional performances at the international stage. The OSPAs are truly global awards that will culminate in the World Awards/ International recognition in the year 2024. Winners of each category in every country will compete for the Global Awards, which will be a prestigious event. The best of outstanding security performances of the Indian Security Industry will be discussed, evaluated, recognized, and positively awarded. Who knows, there may even be an OSPAs Global Award coming to India, making it another remarkable achievement for the Indian Security Industry. What is the modus operandi of OSPAs in India? The Outstanding Security Performance Awards (OSPAs) is a unique global award that is conducted in a consistent manner across all the countries where it operates. Currently, OSPAs operates in 18 countries and soon it will be in 29 countries. One of the distinctive features of OSPAs is that it follows the same processes, judging rules, categories, and criteria for nomination and evaluation in every country. It is worth noting that OSPAs prefers to work with a local partner or associate in each country. Once a local partner is identified, OSPAs write to all the security associations in the country to seek their support and nominate their representative as the jury member. The representatives who are finalized are then exposed to the OSPAs code of conduct and judging and evaluation process to ensure consistency across all countries. All the categories, criteria, and evaluation process remain constant in every country, and the nominees are required to fill in their answers. The backend team collates the responses and sends them to all the jury members independently. Each jury member assesses the entries and gives…

Read More

Evolving Landscape of Physical Security – Latest Trends

Anil Puri CMD, APS group A first generation serial entrepreneur, thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, an innovator and a strategic thinker. He has used this combination to innovate and implement on-ground many new business ideas. His rich experience in various businesses has enabled him to nurture & mentor innovative ideas and scale them up Introduction The evolution of physical security industry is constantly getting accelerated due to emergence of new technologies. As we move into the future, it’s important to stay ahead of the exponential curve and be aware of the latest trends. The past three years have been a whirlwind of disruption as we’ve navigated the security and logistical challenges of COVID lockdowns and the resulting return-towork plans. One doesn’t feel like that their organization has gotten back to normal? Let’s be honest – looks like, there won’t ever be a return to normal. Public and private life has permanently changed, and we need to start thinking about security differently. New risks will always present themselves with fresh challenges to security professionals. Resultantly, security professionals need to continue learning, evolving and re-evaluating the physical security strategy of their organizations. Contrarily, there will always be need to assess any emerging technology and procedures that sprout as an outcome of disruption or evolution. Dynamic shifts over the past few years in the way the world does business, forced companies to use technology in new ways, hence evolution continues. Factors shaping the Security landscape Technology continues to shape the evolution of the security sector. The innovations in AI, biometrics and the cloud have changed the face of how security systems are specified, installed and operated. While other industries may be farther along, physical security solutions will quickly catch-up as they will need to support overall IoT solutions by moving to the cloud. Added services is the new normal for security. The move to being remote across vertical markets has accelerated the need for security solutions. As a result, as-a-service adoption has become increasingly prevalent. Smarter devices, products, and services are starting to provide more than the traditional safety, security, and threat identification offerings. New technologies bring the value add of business intelligence and data science. Many technologies such as AI enabled cameras are evolving to offer data capture in addition to traditional security. These security solutions can help users make smarter business decisions, drive additional revenue, and create greater efficiency in addition to providing better safety and security. Beside emergence of new technologies, regional and global Geopolitical situations, COVID enforced WFH, hybrid work culture, rampant cyberattacks by hackers on physical & IT infrastructure and data, labour shortage and fear of economic recession further accentuated by the reported resurgence in the Omicron BF7 strain are some of the salient factors leading the change in security landscape. Salient Emerging Trends Trend 1. Convergence of Physical & Cyber Security Now that the security industry has made nearly every sensor, system, software and server/ recorder and device interconnected and remotely available; the question that clients ask is not just, “How does this help protect my people, assets and information?” but is, “While you promise to improve my security, what cybersecurity risks does your system create for me?” Undisputedly, today cyber security is more than critical to the overall resilience of an organization. Whatever be the size of business, the growing threat from more and more sophisticated hacking techniques is very real in 2023, and can cause major damage to businesses, public sector services, or increasingly, critical national infrastructure. Businesses are looking to invest in cyber security-related tools to improve physical security in 2023. There is now much greater awareness that with so much of the security infrastructure connected to the network, a siloed approach between physical and cyber teams is no longer conducive. Both have to engage with one another, as a ‘zero trust’ approach appears to have emerged, where every connected device is cyber-reviewed with the assumption that they are all potentially vulnerable. Cameras, access control points and connected alarms are by no means excluded from this approach. While a more holistic, automated approach to defending against threats will take precedence, so too will proactive security architecture planning and procurement. In 2023, business continuity requires rigorous product selection & implementation. Same goes for the physical security industry hardware and software updates, high reactivity maintenance, expertise and strong collaboration between customers and all solutions providers on site. The continued push to secure networks by IT professionals and network vendors will create even more cyber security awareness in 2023. While security professionals are highly aware of the geo-political risks posed by untrustworthy state-owned manufacturers, the continued push to secure networks by IT professionals and network vendors will create even more cybersecurity awareness in 2023. We expect companies to follow policies that prevent authorities from installing Chinese state-owned surveillance systems in sensitive sites. One can anticipate continued adoption of zero trust practices which validate every transaction between devices and people. Cybersecurity as a pillar of corporate responsibility will become an emerging trend as businesses seek to safeguard business continuity for their customers. Hence Cyber-Physical Security Convergence is an agenda high on the horizon. Companies are also looking at the quiet quitting, moonlighting on one hand and the proliferation of cloud, 5G and edge computing, IoT, mobility and automotive, digital supply chains as well as reduced dependence on VPNs on the other; hence necessitating a clear focus on ever preparedness and cyber resilience. Cybersecurity leaders will have to keep abreast of all global developments, especially in the AI act, digital services and market acts of Europe, the new regulations across the Middle East, Japan, Thailand and several others. With the trends of globalization continuing, in 2023 and beyond especially for those handling sensitive end customer and employee data. There must be careful consideration of aspects such as customer/ employee/ stakeholder consent and rights, data storage, retention and transmission policies, and clear guidelines in case…

Read More

Predictive Technologies and CounterTerrorism

Colonel B. S. Nagial (Retd.) On 27 March 2023, United Nations Counter-Terrorism Executive Directorate (UNCTED) hosted an insight briefing on the blind spots in technology-driven counter-terrorism decision-making processes and proposed methods to mitigate these blind spots. UNCTED’s meeting focused on using predictive technologies to improve counter-terrorism initiatives, especially border security.1 One of the main takeaways of this briefing was that while predictive and probabilistic algorithms, human and signals intelligence, big data analytics, and facial recognition capabilities offer opportunities for countries’ efforts to address the scourge of terrorism, they also present many challenges.The United Nations Security Council (UNSC)’s guidance given out in its resolution 2396 (2017) on the assistance of biometrics in counter-terrorism and the necessity to enhance standards for using and collecting biometric data in counter-terrorism, the limitations in technology-driven counter-terrorism were outlined, and the suggestions for overcoming them have been elaborated therein. During his opening address, David Scharia, Director and Head of the Technical Expertise and Research Branch of UNCTED, said that the briefing was aimed at assisting countries to identify methods to upgrade technology-assisted decision-making processes in the context of counter-terrorism. This briefing featured a presentation from Professor Krebs, a Professor of Law at Deakin University, Australia, and a UNCTED’s Global Research Network member. The presentation was titled: Fact and Fiction in Technology-Driven Technology. This presentation elaborated on how counter-terrorism efforts in the airport and border security have gradually evolved towards preventative counter-terrorism. The benefit of predictive and probabilistic technologies lies in their ability to provide vast amounts of immediate, relevant information, process it, and identify connections and inconsistencies. However, Professor Krebs noted that attempts to prevent terrorist attacks by identifying suspicious individuals, including from data collected on terrorism watch lists and databases and from law enforcement cooperation, could also create false predictions about people and incorrectly assess the risk they pose. This could, in turn, negatively affect the principles of human rights, equality, and privacy, to name just a few. She further explained how technological limitations, limitations surrounding human use, and cognitive biases could cause decision-making errors in counter-terrorism risk assessments. She ended her presentation with a few suggestions for improving predictive counter-terrorism. Professor Krebs cited the need to develop transparent data practices and decision-assisting technologies, develop strengthened and clarified evidentiary standards, and provide capacity-building training to assist in de-biasing national and international decision-makers. Predictive technologies can be utilised to improve counter-terrorism initiatives in many ways. These technologies leverage such as data analysis, machine learning, and artificial intelligence to process and analyse large volumes of data, identify patterns, and make predictions that can help prevent, detect, and respond to terrorist activities effectively Here are some ways in which predictive technologies can be employed to improve counter-terrorism efforts: Early Warning Systems: Predictive technologies can analyse diverse data sources such as social media, communication networks, financial transactions, and travel patterns to identify potential warning signs of terrorist activities. By analysing these data in real-time, predictive technologies can help to identify suspicious activities or behaviours that may indicate the planning or execution of a terrorist attack. Early warning systems can provide timely alerts to law enforcement agencies, allowing them to take preventive measures and disrupt terrorist activities. Threat Assessment: Predictive technologies can analyse vast amounts of data to assess the threat level of individuals or groups suspected of being involved in terrorism. This can include analysing their social media posts, online activities, travel patterns, financial transactions, and other relevant data. By using machine learning algorithms, predictive technologies can identify patterns and indicators that may suggest the likelihood of an individual or group engaging in terrorist activities, helping law enforcement agencies prioritise their resources and focus on high-risk threats. Risk Prediction: Predictive technologies can use historical data and machine learning algorithms to predict the likelihood of specific locations or events being targeted by terrorists. By analysing patterns of past terrorist attacks, including location, timing, and modus operandi, predictive technologies can identify high-risk areas or events that may be vulnerable to terrorism. This information can help law enforcement agencies take preventive measures such as increased security measures, surveillance, and crowd management strategies to mitigate the risk of terrorist attacks. Social Media Monitoring: Predictive technologies can monitor social media platforms to identify and track individuals or groups promoting or inciting terrorism. By analysing social media posts, comments, and interactions, predictive technologies can detect patterns and keywords that may indicate radicalisation or recruitment activities. Social media monitoring can help law enforcement agencies identify and intervene with individuals vulnerable to radicalisation or engaging in online extremist activities. Border Security: Predictive technologies can be used to analyse data related to travel patterns, passports, visas, and other relevant information at border checkpoints. By leveraging machine learning algorithms and data analytics, predictive technologies can help identify potential terrorists or individuals with suspicious travel patterns, false documents, or other indicators of terrorist activities. This can help improve border security measures and prevent terrorists from entering or exiting a country. Resource Allocation: Predictive technologies can help optimise the allocation of limited resources, such as personnel, budget, and equipment, in counter-terrorism efforts. By analysing data on previous terrorist activities, response times, and resource utilisation, predictive technologies can help law enforcement agencies allocate their resources more effectively and efficiently. This can improve the overall operational readiness and effectiveness of counter-terrorism initiatives. However, it’s important to note that predictive technologies can provide valuable insights and support counter-terrorism efforts. But these technologies are not foolproof and must be used ethically and with appropriate legal safeguards to protect civil liberties, privacy, and human rights. Human oversight, accountability, and transparency should be maintained in using predictive technologies for counter-terrorism to ensure responsible and effective deployment. Challenges Associated With the Use of Predictive Technologies in Counter-terrorism. While predictive technologies in counter-terrorism could be promising, but presents several challenges. These challenges could summarise as under: Ethical concerns: Predictive technologies in counter-terrorism raise ethical concerns, such as bias, discrimination, and privacy. If trained on partial data, predictive technologies may be biased, leading to discriminatory outcomes, especially against certain…

Read More

CAPSI North East Security Education and Global Employability Conclave

Boost for Pvt defence sector, employment The main objective of this initiative is to make the northeast a hub of the private security industry  CAPSI to setup 8 ‘Centres of excellence’ for security training in each state capital of the North East states Development and progress of NE region is top priority of Narendra Modi Govt: Union Minister G Kishan Reddy The Central Association of Private Security Industry (CAPSI), the apex body of private security agencies in India, will set up eight ‘Centres of Excellence’ for training in private security in the capitals of each state of the NE region which will galvanise the private security industry by creating jobs, said CAPSI Chairman Kunwar Vikram Singh . He was addressing the North East Security Education and Global Employability Conclave here recently. “We have signed MoUs with reputed international security education organisations like the International Federation of Protection officers (IFPO), the Association of Investigation & Security Agencies Regulators (USA), and the Security Institute of UK for placement of trained youth of NE in foreign countries. The Bureau of India Standards (BIS) has already constituted a panel of security experts to draft international standards so that trained and certified Indian youth can be employed in foreign countries,” the chairman added. They also plan to start three drone pilot training academies in the NE region. Our Aviation Division will set up a flying club to impart training for commercial pilots, cabin crews and aircraft maintenance support staff. The Centre of Excellence will impart training in aviation security as per global standards. The conclave was also addressed by G Kishan Reddy, Union Minister Culture, Tourism and Development of North East Region (DoNER); Bhanu Pratap Singh Verma, Union Minister of State, Ministry of Micro, Small and Medium Enterprise; Dr. R K Ranjan Singh, Union Minister of State, Ministry of External Affairs & Education; Mrs Pratima Bhoumik, Union Minister of State, Ministry of Social Justice & Empowerment; and Manik Saha, Tripura Chief Minister. G Kishan Reddy said that the development and progress of the North Eastern states is among the top proprieties of the Narendra Modi government. Prime Minister Narendra Modi believes that the nation’s development is not possible till we ensure the development of the North East region, and that is why he has put special emphasis on the development of the North Eastern states. Addressing the Governing Council Meeting of the Central Association of Private Security Industry (CAPSI), Mr Reddy indicated that the Narendra Modi government is expanding railway network in the entire North Eastern region, and by 2024 all the state capitals of the region will be connected by rail network. Earlier only Assam was connected by railway network but now a majority of the areas of the NE states are being connected by railway network. There has been a major expansion of railway network in Tripura also. “The Narendra Modi government is investing heavily on the development of infrastructure in the North Eastern region. An allocation of Rs 21,000 crore has been done. New medical colleges are being opened in the region while IIT has also started. The North Eastern region hold strategic importance for the nation since it borders China and Myanmar,” he added. Lauding the efforts of CAPSI, Mr Reddy said CAPSI is starting major initiatives in the North Eastern states which will create major employment opportunities for the youth and also speed up growth and development of the region. He asked CAPSI to strengthen private security industry in the North East and the government was ready to help and support the private security industry which today employs over 1 crore private security personnel and professionals. Dr. R K Ranjan Singh, Union Minister of State, Ministry of External Affairs & Education said on the occasion, “It is a great initiative by CAPSI. Not only conclaves like this will shed light to the audience regarding development in the industry, but also in its own way highlight opportunities in the sector to the local youth. In this regard, holding this conclave in Tripura is opportune and timely.” He furthered, “It is very encouraging that CAPSI, an umbrella body, represents over ten million private security professionals, and work for their welfare and standards of industry. For Indian private security industry, it is needless to highlight the importance of high standards and certification to remain competitive. Let me take this opportunity to thank the over 10 million private security personnel extending security services to their client –often in challenging situations. Basic security is a very important aspect in everyone’s life, it is crucial to attaining full productivity –both at social and individual levels.” Kunwar Vikram Singh said CAPSI was committed to support Narendra Modi government’s efforts towards growth and development of the region. CAPSI held the ‘North East Security Education and Global Employability Conclave’  here where all the CAPSI members have pledged to expand their businesses in the North East. “The North East Conclave brings together security organizations and professionals at one common platform. The conclave focuses on key topics such as establishing state-of-art training institutes, promoting security courses of international standards, generating employment and women empowerment, contributing to growth and prosperity of the entire North East region,” said Mr Singh. “The conclave’s agenda  – ‘Securing People’ – was also launched there which includes key areas like improving public safety, emergency response, judicial reforms, providing basic needs like shelter, food, education, and healthcare. It also extends to ensuring the security of vital infrastructure, transportation systems, and critical assets. A G20 Presidium of Heads of Private Security Associations of member nations is being constituted to have consultations for the implementation of bio security & cyber security threats as its first project. By prioritizing the safety and well-being of individuals, the agenda can enhance economic growth and societal development since it creates a conductive environment that attracts investment and supports social inclusivity. Therefore, Securing People as an agenda should receive significant attention from governments at all levels, policymakers, and relevant stakeholders to foster sustainable growth and…

Read More

Dallmeier’s Casino Surveillance 2.0 Initiative Reduces Cost and Complexity of Gaming Floor Surveillance

German video technology manufacturer Dallmeier presented its solutions for casinos at the recently held WGPC 2023 (World Game Protection Conference) in Las Vegas. Highlights included the modular DOMERA® camera system and the PANOMERA® high-performance, high-resolution 360° ‘multi-imager.’ Dallmeier cameras simplify casino gaming floor surveillance with features such as remote adjustment of camera views or unique 360° overviews and ‘virtual PTZs’ for significantly improved situational awareness. Surveillance Managers: Quickly adjust cameras to new table layouts When casinos change the layout of their gaming tables, such as for a holiday, or completely rearrange the tables, it is often time-consuming to adjust the installed surveillance cameras: Standing on a ladder or a forklift, technicians must reposition the cameras to get the desired view. With Dallmeier’s DOMERA® cameras this is a thing of the past. The integrated Dallmeier RPod (Remote Positioning Dome) enables remote controlled fine adjustment of the lens in three axes. This allows casinos to easily install the cameras and quickly and easily adjust the recorded scene from any location if requirements change. In addition to up to 4K resolution, the cameras offer other exciting features such as WDR (Wide Dynamic Range) for optimal recording of scenes with very bright and very dark areas, and exposure presets for casinos. Finding the bad guy much faster with fewer cameras Dallmeier also demonstrated new features of its HEMISPHERE® SeMSy® video management system and the Panomera® W 180° and 360° panoramic cameras. With these innovative camera systems, surveillance managers can monitor large indoor casino areas with a much smaller number of cameras and seamlessly track persons of interest in much less time. This is possible due to the unique combination of a large, 180° or 360° panoramic overview and theoretically unlimited ‘virtual PTZs’ which allow for a much more convenient and efficient tracking of details than traditional gaming floor PTZs. Casino customers report that the time to resolve typical gaming floor incidents has been reduced by over 80%. Gaming Managers: Make informed decisions with AI people counting “Not only can casinos easily and quickly reposition our DOMERA® cameras when, for example, they rearrange their gaming tables,” said Joe McDevitt, President, Dallmeier electronic USA Inc., “Advanced video analytics – whether in the camera itself or via third-party analytics tools – enable applications such as AI people counting on the gaming floor. This gives gaming managers the ability to increase both safety and efficiency, for example by opening more gaming tables if there are too many people in an area, or closing tables if the occupancy of individual tables is not ideal. With our Panomera® W8 camera solutions, surveillance managers are simply revolutionizing gaming floor surveillance.”    

Read More

Advanced Protects Alnmouth Friary with Intelligent Fire Panels

Fire protection solutions manufacturer, Advanced, has provided intelligent fire panels to protect Alnmouth Friary, a Franciscan monastery overlooking the Alnmouth coastline in Northumberland. An Advanced MxPro 5 analogue addressable fire panel was installed in the Friary to provide industry-leading protection that is high-performance and fault tolerant. Alnmouth Friary was originally built as a private dwelling in the early 20th Century and today the main ministry offers hospitality to visitors and is also the house where new men are welcomed to try their vocation with the Society of Saint Francis. Fire and security service providers, Safe Services, installed an Advanced MxPro 5 four loop analogue addressable fire panel in the Friary. Safe Services was involved in the project from the design stage though to installation and commissioning. The Advanced MxPro panel is integrated with Apollo Discovery fire detectors for a complete fire system. Graeme Millar, Fire Systems Technical and Sales Engineer at Safe Systems said, “We were delighted to be asked to install fire protection in the Friary on the beautiful Northumberland coast. The Advanced MxPro 5 is providing fire protection for both the Brothers who live in the Friary and all of their guests who visit them. The Advanced MxPro 5 is our panel of choice since it is reliable, fault-tolerant, high performance and great to install.” Neil Parkin, Advanced Sales Manager for the North, said, “Our MxPro 5 panels are designed to make life as easy as possible, delivering robust protection that offers real peace of mind, all backed up by our highly rated technical support. Add to that the time and cost benefits they provide to installers, and they are a great choice in multiple scenarios both large and small.” MxPro 5 is the fire industry’s leading multiprotocol fire panel and is certified by FM Approvals to the EN 54 standard. It offers customers a choice of four detector protocols and a completely open installer network, backed up by free training and support. MxPro 5 can be used in single-loop, single-panel format, or easily configured into high-speed networks of up to 200 panels covering huge areas. Ease of installation and configuration, as well as its wide range of peripheral options, make MxPro 5 customisable to almost any application. To combat false and unwanted alarms, AlarmCalm is available as standard on MxPro 5 multiprotocol fire panels, delivering unprecedented control of verification and investigation delays. By dividing sites up into virtual false alarm ‘building areas’ independent of fire zones, much more precise control of false alarm management and reduction strategies can be achieved, that exactly fit the needs of each part of a building. An optional AlarmCalm button allows trained occupants to verify if they believe a local fire signal is a false alarm too – a highly effective way of eliminating unwanted alarms.  

Read More