securitylinkindia

G4S Unveils Revolutionary Security Risk Operations Center (SROC) in India

G4S, a leading global integrated security solutions company, recently unveiled its Security Risk Operations Center (SROC), in the presence and company of some very distinguished guests and industry experts. The global and regional teams of G4S along with its India leadership team presided over the event. This initiative earmarks a transformative milestone in integrated security solutions. SROC strengthens G4S’s position as an industry leader committed to innovation and excellence. Recognizing the diverse needs of its clients, G4S proudly offers expanded portfolios that comprehensively address every aspect of security and other business requirements. Built on cutting-edge technologies, G4S SROC showcases its expertise and mastery in the security field, delivering unparalleled solutions tailored to each client’s unique requirements. Unlike conventional service offerings, G4S leverages the power of technological surveillance, robotic process automation & advanced video analytics backed by proactive, predictive, and preventive intelligence facilitating the digital transformation of several security programs. This advanced approach ensures greater efficiency and effectiveness, setting G4S apart. The recent unveiling of G4S SROC also included projecting the future through its innovation and experience center showcasing how the security and business needs of different industries and organizations can be fulfilled effectively by leveraging the cutting-edge technological stack brought in by G4S. This will help customers to explore and collaborate on bespoke security solutions. G4S’s unique capabilities enable personalized services to effectively address the distinctive needs and requirements of diverse industries. Rajeev Sharma, Country Managing Director, G4S India, stated, “We are delighted to introduce our state-of-the-art G4S Security Risk Operations Centre. With this initiative, G4S reaffirms its commitment to providing unparalleled security solutions and bespoke solutions. SROC is a testament to our dedication to process excellence, utilizing advanced technology and expertise to safeguard our clients ‘ assets and operations. This milestone strengthens G4S as the leading global integrated security solutions company, continuously setting new benchmarks in the industry.” In 2021, G4S, a London-based global security company, was acquired by Allied Universal®, a leading security and facility services company that provides proactive security services and cutting-edge smart technology to deliver tailored, integrated security solutions. This acquisition expands Allied Universal’s footprint and infrastructure on a global and local level. Through the company’s vast network of more than 800,000 employees, they leverage global best practices in communities all over the world. With revenues of $20 billion, they are supported by efficient processes and systems that can only come with scale to help deliver their promise locally – keeping people safe so their communities can thrive. In India, they have an extensive network of offices and more than 135,000 employees to support their local communities and customers. They believe there is no greater purpose than serving and safeguarding customers, communities, and people in today’s world. Allied Universal is There for you™.  

Read More

Five Surveillance Essentials: for Cutting Shrink & Protecting Profits

Rahat Jain, Managing Director, IDIS India Video surveillance has long been an essential weapon in the war against shrink. But recent technological advances and better implementation options are redefining the way systems are designed and used. Key developments include the rise of AI-powered analytics; improvements in camera performance; the availability of easier POS and video integration; the emergence of end-to-end solutions; fairer video management software license fees and lower lifecycle costs; customers moving to NDAA-compliant equipment, and more trustworthy and ethical technology supply chains. This eBook outlines the most noteworthy developments and will be helpful for anyone planning, installing, upgrading, or using video in the context of retail profit protection. Addressing threats to profitability In the retail sector, camera systems are relied on almost universally for deterrence and detection, prevention, and investigation. Thieves remain ever-inventive in their search for new ways to exploit loopholes in security, lapses in vigilance – even brief ones, and gaps in operational oversight. Would-be thieves typically use sleight of hand, movement between aisles and displays, distraction, and speed. The video systems put in place to stop them must be effective against multiple threats, including opportunist shoplifting, organized thefts-to-order, robbery, internal fraud, bogus slip-trip-fall scams, stock room pilfering, and crime centered around checkouts and returns counters. And increasingly, in a highly competitive trading landscape, cameras are being used for powerful business intelligence functions, as well. 1. Don’t cut corners with cameras You may need to keep a close eye on budgets, but don’t be deceived by low upfront camera costs – there’s usually a catch. Beware of higher costs further down the line and avoid quality and performance shortcuts. HD and ultra-HD cameras aren’t expensive – or they don’t have to be – and saving marginal costs by installing low-quality and low-resolution models is a false economy. Crisp, clear image capture is the foundation of your security system. From the quality of real-time viewing and video evidence to the effectiveness of money-saving AI analytics, a lot is riding on camera performance. In retail settings, achieving complete visibility of all areas, without blind spots, is essential – because any gaps in surveillance will quickly be identified by criminals and dishonest staff. Experience shows that gaps in fields of view are always exploited, which is why risk assessments, both internally and externally, are essential. Even within the same retail chain, stores don’t necessarily share the same threats and risks, so it’s important that a range of cameras that will mitigate the risk profile of each facility – without impacting the shopping experience – is specified. Cutting costs and boosting system performance with the right cameras Low profile HD and ultra-HD internal cameras will give you the image quality operators need to detect suspicious behavior, especially near high-risk areas such as checkouts, outside fitting rooms, and storage areas. Quality cameras with excellent true WDR performance and IR are essential for dealing with the challenging light conditions often found in stores and storage areas, including low light, variable light, and back-lighting. Consider fisheyes that provide wide area coverage and domain awareness of entire shop floors and aisles more affordably and allow you to replace multiple fixed lens models. 2. Reliable, affordable, and easy to retrieve video evidence A robust retail video system will ensure that footage can be retained for extended periods, if necessary, without excessive storage costs. NVR-based systems remain popular for retailers as they are highly scalable, allowing for the addition of multiple cameras without the need for extensive cabling or infrastructure upgrades. This makes it easier to expand the system as needed. NVRs also make it easy to integrate with other security and safety systems, such as access control and intruder systems. This integration enhances overall security and presents an affordable yet comprehensive security infrastructure. To prevent potentially costly gaps in footage, SD card failover is now essential on cameras to guarantee continuous recording in the event of network instability or outages (a common vulnerability in retail environments such as strip malls, where bandwidth is often constrained). In addition, recordings should be fast and simple to review and export to support internal investigations or legal action. VMS controls should be intuitive and easy to use to make retrieving evidence a straightforward task, even for inexperienced users, including local retail managers. To save time and improve accuracy, retailers are taking advantage of the powerful meta-data search tools, which are now available with AI video solutions and devices. Pitfalls to avoid with HD video data handling Systems often disappoint because problems arise around video data storage and retrieval. HD video increases storage requirements, and cost can mount with extended retention periods over 30 days. To prevent this, look for solutions that support H.265 in addition to advanced compression technologies. Where video footage is mission critical, consider NVRs that offer features including RAID 1, 5, 10, and redundancy to prevent data loss in case of hardware failure or damage. With tampering becoming an increasing concern, the integrity of footage should be assured with ‘fingerprint’ technologies that make undetected tampering impossible. 3. Centralized, local, and remote monitoring Video systems should always be designed around the requirements of users. In the case of retail, this can include security officers, loss prevention managers, store and branch managers, business owners, control room operators, and head-off profit protection teams. For example, for independent businesses and convenience stores, the objective of the surveillance system may be to use real-time monitoring to support intervention at the moment of attempted theft or immediately after. To enable this, controls should be intuitive and straightforward so that non-specialist staff quickly become confident using the system. For retailers with centrally monitored large stores or branch networks, control room staff will need to be able to multitask. For example, operators will want to be able to configure notifications and alerts and relay events, including video pop-ups, to security officers and managers on the ground. Store staff will want easy-to-use client software that gives them the tools they need to manage day-to-day…

Read More

Enlite Enable: The Access Management Solution Revolutionizing Workspace Security

Shakti Leekha, Chief Business Officer, Enlite Research Private Limited In today’s fast-paced world, the importance of seamless and efficient access control systems cannot be overstated. The need for touchless, smarter, more secure solutions has led to the rise of touchless access controls. Enlite, a company that is developing wireless solutions for the built world, has taken access management to new heights with its groundbreaking access management solution. This cutting-edge system is reshaping the way we interact with our workspaces, providing a safer and more convenient access experience. Introducing Enlite: Pioneering the Future of Access Control Enlite is a rising star in the realm of sustainable and innovative solutions for the built world. Their mission is clear and powerful – to inspire tomorrow by creating a compelling today. Through years of research and development, they have unveiled Enlite Enable, an innovative touchless access management smart device that caters to the evolving needs of modern businesses. Enlite’s customer-centric approach and dedication to innovation have earned them trust across various sectors, from small startups to multinational corporations. With Enlite Enable, they are at the forefront of the access control revolution, empowering businesses to embrace a more secure, efficient, and touchless workspace. Top 10 Features of Enlite’s Access Management Solution Lightning fast contactless check-ins & checkouts: Enlite Enable transforms the way employees access their workspace. A simple tap of the RFID card or the use of an app on the smartphone grants them seamless entry and exit. This contactless approach not only enhances efficiency but also fosters a hygienic workplace, addressing health concerns in today’s world. Access & manage from anywhere: With Enlite’s webbased platform and app, administrators can manage access control from anywhere. Grant or revoke access, configure user permissions, and monitor real-time access events – all in the palm of your hand. Sync users automatically: Managing users becomes a breeze with Enlite’s automatic user synchronization. When employees join or leave the company, access permissions are updated in real-time, ensuring an always up-to-date access control system. Troubleshoot hardware online: Enlite’s proactive approach to hardware maintenance allows administrators to troubleshoot issues online, minimizing downtime and streamlining maintenance efforts. Download history logs: Comprehensive access history logs provide valuable insights into user movements and access events. Enlite enables you to download and analyze these logs for enhanced security and auditing purposes. Granular and site level permissions: Administrators have granular control over access permissions, allowing them to define specific access levels for individual users or groups. This flexibility extends to managing access control at both individual site levels and multiple locations. Easy integration: Enlite’s Access Management Solution seamlessly integrates with other security and business systems, creating a comprehensive security ecosystem. The interconnected approach enhances overall security and optimizes operations. Detailed reporting: Data-driven decision-making becomes effortless with Enlite’s detailed and customizable reporting. Monitor occupancy status, analyze access patterns, identify trends, and make informed decisions for a more secure and efficient workspace. Lockdown/ emergency mode: In critical situations, Enlite’s lockdown/ emergency mode enables administrators to secure the workspace instantly by restricting access to specific areas or the entire facility, enhancing workplace safety and preparedness. Scalability: As your business grows, Enlite’s Access Management Solution grows with you. Whether it’s a small office or a large corporate campus, the system can be easily scaled to meet your changing needs, ensuring a future-proof investment. Top Reasons to Choose Enlite’s Access Management Solution Multiple credentials for enhanced convenience: Enlite’s Access Management Solution offers multiple credential options giving users the freedom to choose the access method that suits them best. Appealing aesthetics enhancing the workspace: Enlite Enable’s sleek and minimalist design blends seamlessly with any architectural style, the smart product engineering allows for plug & play installation. Its high-quality PCBs & Heavy Duty components allow for long life. Automatic alerts for real-time security: Stay on top of security events with Enlite Enable’s automatic alerts, which instantly notify administrators of any unusual access events or security breaches. Web-based management for streamlined control: Administrators can conveniently manage the access system from anywhere using Enlite Enable’s user-friendly webbased platform, ensuring constant connectivity and control. Unlocking the Future of Access Control with Enlite Enable Enlite Enable Access Management represents the future of workspace security and efficiency. With its touchless check-ins, remote access management, automatic user synchronization, troubleshooting capabilities, and much more, it sets the benchmark for next-generation access control systems. This solution has already been deployed in buildings across India. By choosing Enlite Enable, businesses can unlock the full potential of their workspace security and access management needs. Embrace the touchless revolution with Enlite Enable and create a safer, more efficient, and technologically advanced workspace for your employees and visitors.  *Views expressed in the article are solely of the Author  

Read More

Major Considerations in Planning a Security System

Milind Borkar – Expert Security Consultant As technology evolves rapidly from year to year, it becomes a challenging task to determine the requirements to build a secure, robust and almost foolproof system that will fulfill all basic security parameters. These parameters will vary for each new system as the same parameters cannot be applied across the board for all systems. A robust system that meets the security requirements for any new and/ or green field project, the following points will drive the decision-making process. Let’s use a CCTV system as an example: Budget and time available to implement the security system. Conduct a thorough site survey to determine security vulnerabilities and use it as vehicle to determine security requirements. This then becomes the primary driver along with the available budget. Detailed Camera information a. Mega-Pixel rating. b. Number of cameras required. c. Each camera location and it’s purposed function. d. Type of camera: Fixed, PTZ, indoor or outdoor, thermal performance, Field of View etc. e. Any other requirements that are specific to the location of the camera to fulfill its intended function. Storage capacity per camera – both inside as well as outside the camera. Storage architecture of the CCTV system. Network architecture of the CCTV system. Integration of other security components such as access control, perimeter intrusion detection systems, facial recognition, license plate recognition, under vehicle surveillance system, visitor management system, radar for areas not covered by cameras and other special requirements. Remote access/ cloud connectivity. Physical guarding. Video analytics. Vendor(s) selection. As one can see there are several factors that influence the decision-making process in building a security system. We will briefly go over each one of them in the following sections: Budget and time available As in any and every sphere of life the available budget is the key factor. Based on the available budget and time, a determined effort needs to be put in place to first build a project specific requirements document. Several trade-offs will need to be considered if the project requirements cost exceeds the available budget. This could be an iterative process that will consume time and money in the planning phase. Each new or green field project or an update/ refresh cycle of an existing deployment must go through this elaboration process to avoid surprises in the implementation/ build phase. Site survey Conducting a site survey is the basis of building a security system. This phase is the most critical where a thorough site survey is conducted to determine security vulnerabilities. Along with this a determination needs to be made as to what other systems are required to complement the main CCTV system. The illustrative airport diagram should give a very good idea of the other security components that need to be explored. Once this information is gathered and documented, then this information becomes the driving force for subsequent phases of the project. The best way to illustrate the process of building a security system is through an example. We are using an airport We will use the following diagram to highlight all the components that constitute a surveillance/ security system. We have used an airport as a use case. A typical airport is a super-set of any security deployment. as an example as it has a super-set of inputs that can be applied to any security system design. The color-coded table is used to distinguish the various inputs/ requirements received from the customer. The following table is a standard template that can be used to capture security requirements. These inputs are used to design the entire security system which can then be used to calculate the cost of the implementation. Using the above inputs from the customer and the respective BOQs for each airport, a complete design can be derived. The following table shows the output of the design process for 24 airports. Each airport has the same security requirements but BOQs are different. Once the design is completed to a 90% level of the target specification, the budgetary process can be started. Several vendors, RFQs etc. will be involved to go through an iterative process. This process will also vary for each geographical region. and must be considered. Without going into the details that vary for different geographical regions the important point to consider is the vendor selection process as it has a significant impact on the quality, robustness and overall cost of the system. Customers desirous of building a security system can engage subject matter experienced consultants who can guide and evaluate all the variables/ entities in the decision-making process. Cost optimization through simulation A security system design, implementation and build out are a complex system with many sub-systems that need to work with each other flawlessly. Every care must be taken in the early phases of the project as many variables are involved which can have a significant impact on the overall cost. One of the ways to help this process is to run a simulation based on the customer inputs. Through experience we have determined the following: The customer knows what he wants but does not know how to get there. Almost all vendors over sell their products and services which do not benefit the customer in any way. A consultant is required in all cases to systematically guide and evaluate all the options available to provide the highest performance at the lowest cost to the customer. We will now go through a simulation for one of 24 airports. We will show how our simulator determines the highest performance at the lowest cost. The following graph il lustrates this. The X-Axis shows the percentage of cameras running video analytics (VA). The Y-AXIS shows the cost in a standardized format. The DELTA between the lowest cost and the highest cost is 3x. VA stands for Video Analytics; VMS stands for Video Management Software. The GREEN line is the overall COST with the other colored lines that sum up to the overall GREEN line cost. Impact of Cost…

Read More

Indian National Forum on Artificial Intelligence

The Indian National Forum on Artificial Intelligence took place on 27th July, 2023 at New Delhi. The said Forum was organized by Artificial Intelligence Law Hub and Pavan Duggal Associates, Advocates. Today, Generative Artificial Intelligence (AI) has completely changed the landscape and AI today is impacting every area of human activity and endeavour. For India being the world’s most populous nation, AI holds unique promises and opportunities. This Forum was organized to look at the emerging trends on Artificial Intelligence in the Indian context; and what kind of approaches does the Government of India need to adopt in order to facilitate more rapid adoption of AI by Indians. Key issues discussed What are the emerging trends on Artificial Intelligence in the Indian context? What kind of approaches does the Government need to adopt in order to facilitate more rapid adoption of AI by Indians? What kind of support should India provide to the Indian business and corporate community to facilitate more ready adoption of Artificial Intelligence? How will AI including Generative AI impact business prospects in the Indian context? What all should be Indian approaches for dealing with business, economic, legal, regulatory and societal aspects Artificial Intelligence including Generative AI? Are the existing legal approaches sufficient or does India require to move much further in the direction of policy issues impacting Artificial Intelligence? What should be the specific steps that the Government need to take to further promote the cause and adoption of Artificial Intelligence in India? These and variety of other issues have been discussed at the National Forum on Artificial Intelligence & Indian Approach. The National Forum was convened to collate various inputs and recommendations of identifying the key elements of India’s strategy on encouraging, enabling and regulating Artificial Intelligence. The Forum was attended by distinguished stakeholders from AI ecosystem. The Forum called upon the Government of India to have legal framework in India to not just legally recognize AI but also to regulate AI in the Indian environment. These recommendations came as the existing Indian Cyberlaw is not adequate to deal with various challenges thrown up by the advent of AI including Generative AI. The Indian National Forum on Artificial Intelligence was inaugurated by Hon’ble Justice Rajesh Bindal, Judge, Supreme Court of India. Justice Bindal highlighted the growing significance of Artificial Intelligence and its various challenges and nuances that India as a nation is facing. He further highlighted the various legal developments in AI at the global level and further emphasized the urgent need for India to address the legalities pertaining to Artificial Intelligence by coming up with strong policy and laws in this regard. He further highlighted how judiciary can play an important role in using the benefits of Artificial Intelligence for addressing the challenges of huge arrears of cases in the Indian subcontinent. Justice Bindal further talked about the need for more awareness and capacity building amongst users vis-à-vis legal ramifications of use and dependence on AI. Hon’ble Justice Rajesh Bindal further released the book entitled ‘ChatGPT & Legalities’ authored by Dr. Pavan Duggal, Advocate, Supreme Court of India and Chief Executive of Artificial Intelligence Law Hub. Dr. Pavan Duggal, Convenor, Indian National Forum on Artificial Intelligence, Advocate, Supreme Court of India and Artificial Intelligence Law Hub advocated the need for India to come up with strong legal frameworks to not just promote legally recognize but also regulate AI including Generative AI. He further advocated the need for India to demonstrate its thought leadership in developing and evolving AI legal jurisprudence. The Forum was addressed by various stakeholders from AI ecosystem including Lt. Gen. (Dr.) Vimal Arora, Chief Clinical Officer, Clove Dental, Prof. G. S. Bajpai, Vice-Chancellor National Law University, Delhi, Mr. Harsh Marwah, CEO & MD of Mudra Electronics Ltd and OA Compserve Group of Companies, Mr. Saakshar Duggal, Advocate, Delhi High Court and Advisor Academic Outreach, Cyberlaw University, Prof. Sunil Kumar Khatri, Dean (Research, Innovation and Extension activities) at Amity University Noida, Mrs. Kusum Duggal, Eminent Educationist & Vice Chancellor of Cyberlaw University, and Drishyaa Duggal, Associate at International Conference on Cyberlaw, Cybercrime & Cybersecurity. Most of the panelists underlined the need for India to attain thought leadership position in the context of AI and further highlighted the need for enhancing capacity building initiatives to be undertaken by both state and private sectors. The Indian National Forum on Artificial Intelligence ended with vote of thanks.  

Read More

First-of-a-Kind State-ofthe-Art Experience Center for Surveillance Technolgy: CP PLUS WORLD

Introducing the future of smart security CP PLUS, a leading global company in cutting-edge security and surveillance technology, has unveiled its Next-Gen Experience Center, called CP PLUS World. Designed to demonstrate breakthrough innovations, CP PLUS World promises to reshape the future of smart security by enabling the public to come explore, test, and use the most advanced security inventions first-hand. masses on how to better use and apply these advancements in their daily lives. Leveraging the best of technology to create more value for the end-user, CP PLUS provides a sneak peek into the brand’s latest product line, while also giving live demonstrations to better understand how these technologies work. Making breakthrough solutions more accessible, the CP PLUS World Experience Center also showcases most of CP PLUS vertical solutions through different zones such as AI-powered Solutions, Intelligent Network Solutions, Smart Home Solutions, among the others. Launched with the goal of helping the public better learn and understand modern day technologies such as artificial intelligence and the Internter-of-Things, CP PLUS World offers a revolutionary experience where the users can even take training sessions by skilled professionals. “We are excited to open our first and one-of-akind Experience Center in the heart of India’s tech Bazaar. CP PLUS is the most advanced such center in the whole of India, offering the widest portfolio of hi-tech solutions for first-hand learning experience. With this new store and many more to come, our goal is to provide every Indian with the best of security solutions to enhance the quality of life they enjoy,” said Aditya Khemka, Managing Director, CP PLUS (Aditya Group). Now with the successful launch of CP PLUS World in New Delhi, the brand is set to open 10 more of its experience centers across the country in the upcoming few months. CP PLUS World will also be holding hands-on training programs for the products showcased in the store under the brand’s training division. Trained by skilled professionals on the various applications of leading-edge surveillance solutions, CP PLUS will be playing an integral role in shaping the workforce for the security industry.  

Read More

Hikvision India Premieres Latest Products and Presents Bespoke Vertical Solutions at SAFE South

New Range of Smoke and Gas Detectors and 12 Zone Wired Intrusion Alarm System Launched Hikvision India participated in the Security and Fire Expo (SAFE) South India (5-6 July, 2023) in Chennai to premiere the latest products and bespoke vertical solutions. The SAFE South India was inaugurated by the lamp lighting ceremony at Chennai Trade Centre in Chennai. The SAFE South India brought together internationally renowned exhibitors, consultants, industry experts and key government officials on a single platform from the Indian and the international industries. The keynote address was given by John Paul Manickam, Chair, OSAC Chennai Chapter. On the show floor of SAFE South India, Hikvision India has introduced its new range of Smoke and Gas Detectors and 12 Zone Wired Intrusion Alarm System. The trending transformative technologies such as Artificial Intelligence (AI), Robotics and IoT Security Tech were on the display along with the products for the visitors. While speaking about the SAFE South India experience, Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. said, “We are honoured to be an integral part of the SAFE South India 2023. We are here to share the latest products and trending technologies with end-users and security professionals. The SAFE South India is very special due to our new range of Smoke and Gas Detectors and 12 Zone Wired Intrusion Alarm System launch. We are looking forward to meeting security industry specific visitors, esteemed partners, government representatives and experts. We cordially invite you to visit Hikvision India booth, it will be an enriching experience to all the discerning security professionals.” He further added, “Hikvision India is showcasing latest technological innovations in Artificial Intelligence (AI) and Robotics Technologies. We unveiled the latest products and solutions in the video security, access control, intrusion alarm, inspection and perimeter security segments. we have also displayed mobile robot products, machine vision products and logistic vision solutions.” The newly launched Hikvision smoke and gas detector range has three variants including, standalone smoke detector, multicriteria smoke detector and carbon monoxide detector. The key highlights of the technologies and solutions on display at Hikvision India booth, included AI, ColorVu, Thermal and AcuSense Technologies. The product categories on display were Command Control Center, Transmission, SSD Card, eDVR, EZVIZ, Access Control, Video Door Phone (VDP), Security Inspection Products, Alarm System, HikRobot, and Thermal Cameras. The booth also had vertical solutions on display for various scenarios. Hikvision India booth showcased its advanced security solutions across product categories and conducted various fringe programs to engage the visitors. SAFE South India organized a two day conference program based on the theme ‘Demystifying Security Threats in the New Normal.’ The speaker session on the theme ‘Technology-Enabled Disruptions and Emerging Paradigms in Security Architecture’ was presented by Gagan Lamba, Vice President, Enterprise Business, Prama Hikvision India Pvt. Ltd. The SAFE South India featured exhibitors from the security and fire safety domains. They showcased solutions and latest technological advancements. The Security and Fire Expo South India event organized a unique two-day Technical seminar. The SAFE South India Expo concluded on a high note with relevant visitors from the vertical specific end-users and security professional community.  

Read More

The State of Zero Trust

Vishak Raman, Vice President of Sales, India, SAARC, SEAHK & ANZ at Fortinet Distributed networks and a hybrid workforce are rapidly transforming today’s network environments. Workers divide their time between the office, home, and somewhere in between. Applications are split between on-premises, cloud, and Software-as-a- Service (SaaS) deployments. And data, once the sole province of the data center, is increasingly distributed across multiple locations. Over the past few years, ensuring that every user and device has secure, reliable access to the critical resources they need has been a top priority for IT teams. And access needs to be easy, no matter where the user is located or where applications and assets have been deployed The Fortinet 2023 State of Zero Trust Report looks at the progress IT teams have made in establishing a new sense of normalcy following the network upheaval initiated by the start of the global pandemic. With most employees suddenly working outside the network perimeter, IT teams scrambled to keep businesses operational. This effort often took the form of quick fixes and workarounds that exposed the weaknesses in their remote-worker strategy. It also highlighted the challenges of bringing their rapidly expanding network environments under a unified security umbrella. Outlier environments, like poorly secured home offices or misconfigured cloud solutions implemented by DevOps teams with little security experience, became new attack vectors for cybercriminals. It quickly became obvious that the implicit trust model in many organizations was a problem. However, too many IT teams tried to solve the issue in the traditional way by throwing technology at the problem. And it wasn’t long before they had a new problem of trying to get discrete point solutions to work together. These challenges are reflected in this report, which includes a number of key findings. Organizations of all sizes are actively implementing zero-trust strategies, but challenges remain: Companies have deployed considerably more solutions as part of their zero-trust strategies since 2021. Companies are looking to enable zero trust everywhere to minimize the impact of a breach. Although companies are moving forward, they still face challenges, including interoperability between solutions, consistent visibility, end-to-end policy enforcement, and application latency issues. Respondents also complained about the lack of reliable information to help them select and design a solution. Solutions must cover both on-premises and remote users with a consistent application access policy, and success has been mixed: Many solutions like zero-trust network access (ZTNA) and secure access service edge (SASE) are cloud-only. However, companies need to secure access to applications on-premises and outside of the network. Notably, nearly 40% of organizations still host more than half of their applications on-premises. The most significant challenge in any zero-trust strategy is the need for more integration between on-premises and cloud environments. Three-fourths of respondents have encountered issues with their hybrid workforce because of relying on cloud-only ZTNA. The top priorities for SASE solutions vary, but ‘security effectiveness’ is the most significant, with 58% placing it in their top three priorities. The consolidation of vendors and solution interoperability is crucial: Deploying solutions from multiple vendors has created many challenges for organizations, including introducing new security gaps and high operations costs. Larger companies are especially keen to consolidate solutions to simplify operations and reduce overhead. Zero-Trust Strategy Priorities The pandemic initiated a dramatic workforce transformation, with the vast majority of employees who traditionally worked on-premises suddenly working from home. This change triggered a corresponding dramatic upheaval in networks, essentially turning them inside out. Almost overnight, organizations needed to create secure network access to critical applications and resources through the perimeter, which often required upgrading remote access technologies such as edge security tools. At the same time, the limitations of traditional VPNs became apparent as hackers began accessing corporate resources by hijacking VPN tunnels through poorly protected home networks. Plans to move applications to the cloud were accelerated to offload pressure on the network perimeter and to improve the user experience. Of course, none of these changes were entirely unexpected. The move to a hybrid workforce had been in progress for some time, but the pandemic accelerated the change. Many organizations weren’t ready for the sudden transition to remote work, and they didn’t have the technologies in place that the circumstances demanded. Despite these issues, two-thirds of organizations have decided to maintain a hybrid workforce, with larger employers more likely to support remote workers than smaller ones. The challenge has been providing consistent access and exceptional user experience for workers who move between onpremises and remote work locations. It has been particularly difficult for the 72% of organizations that opted for a cloud-only ZTNA solution to provide secure access to critical applications. (Fig. 1) Early on, it became clear that the best approach for managing and securing a workforce with no permanent location was to initiate a zero-trust strategy, which eliminates implicit trust based on location and enforces the principle of least privilege. The reasons are broad for implementing zero trust, but 34% identified minimizing the impact of breaches and intrusions, and 29% cited enabling zero trust everywhere as their primary incentive. Interestingly, only 18% selected reducing capital expenditure. Although their top objective for choosing a zero-trust solution (ranked as either extremely or very important) was to ensure application-layer security (85%), compatibility with both on-premises and cloud settings (82%), and integration with the rest of their networking and security infrastructure (82%) were also very high. Organizations also report being better prepared to support and secure their hybrid workforce with a wide range of solutions already in place to support their zero-trust strategies. The solutions that have been implemented include secure web gateways (SWGs) at 75%, cloud access security brokers (CASB) at 72%, network access control (NAC) at 70%, ZTNA at 67%, next-generation firewalls (NGFWs) at 63%, and endpoint detection and response (EDR) with 62%. The one surprise was the relatively low implementation of multi-factor authentication (MFA) at only 52%, which is critical for preventing unauthorized access to applications and other resources. Those organizations that have not yet…

Read More

Customer Experience Matters: Four Intelligent Ways to Bring Shoppers to Your Mall

In this digital age, when footfall is declining and ecommerce is growing, the challenges for shopping malls seem bigger than ever. In this blog, we look at the importance of the customer experience and explore the best ways for malls to attract more shoppers As consumer behaviors change and shopping trends move ever more online, many shopping malls are seeing a decline in footfall and sales. Moreover, malls are finding it very difficult to compete with the endless product selection, price comparisons, and always-on nature of online shopping. However, although consumers are getting much of their shopping needs covered online and visiting their local malls much less frequently, one advantage that shopping centers have over their ecommerce competitors remains: the interactive, in-person experience. Today’s purchasers are empowered like never before, so their expectations for all of their shopping experiences have risen to a new, vastly higher level. This means only the most customer-centric businesses can reach the now-expected standard. Therefore, delivering a great customer experience can help malls regain customer loyalty and boost revenues over the long run. With that in mind, the next issue is this: what should shopping malls do to improve the customer experience and satisfaction? Here are four ways in which Hikvision’s smart retail solutions can enhance customer experience and give shopping malls a competitive edge. Understand and meet customers’ needs in real time with customer intelligence How are people shopping these days? As consumer behavior changes and competition grows, shopping malls need to track a number of metrics to attract shoppers and improve business performance. Ask yourself the following questions: What is the average daily foot traffic for my mall? Does my mall have a reasonable shopper-to-staff ratio? Do I understand my customer’s journey? In asking these questions, we begin to see the importance of data-based decisions regarding the customer experience. With key metric data, malls can launch more effective marketing activities and in turn generate more footfall and sales. But how can one get these metrics? The answer – with cameras that do more than just record security video. Hikvison’s smart cameras with people counting and heat mapping capabilities provide real-time awareness of customers’ journeys through the mall. For example, smart cameras can be used to count customers entering and leaving the shopping areas, ensuring that enough staff are available to serve them. During busy times, staff can be directed to the registers when queues get too long and then return to routine tasks at non-peak times when fewer customers are in the mall. Additionally, Hikvision’s intelligent video analytics provides new insights on which areas, shops and brands are the most popular. This helps malls to optimize available floor space throughout the retail mix and floor plan, making it more in tune with consumer needs and trends. This ensures that the shopping experience is as convenient, efficient, and satisfying as possible. Capture attention and convey information quickly and efficiently with commercial displays Shopping malls today have gone from being simply a hallway of retail stores to multipurpose complexes that feature restaurants, entertainment venues, special events, holiday activities, and more, in addition to the conventional retail shops. To attract new visitors and maintain maximum footfall, malls need to create fun and unique shopping experiences for customers. This is where Hikvision’s commercial display solutions come in. Hikvision offers a diverse range of outdoor and indoor displays with eye-catching visuals, attractive advertising, and digital navigation solutions. For example, exciting display solutions for building façades can be an effective way to draw more in-store visitors. Digital signage in central walkways can create an amazing and memorable experience for visitors. Kiosk displays in high-traffic areas can provide information about shops, brands, sales, and special events, as well as show customers the route to the nearest bathroom or exit. These solutions grab shoppers’ attention and provide useful information, boosting the whole experience in an efficient and enjoyable manner. Provide easy, convenient parking with smart parking management Today, convenience is a must, from entry to exit. From finding a parking space on the way in to smart vehicle location on the way out, malls must ensure customers not only find parking spots quickly, but also locate their parked cars easily in those shopping malls’ expansive parking structures. Here, Hikvision’s smart parking solution makes it fast and easy to find available spaces, and helps customers locate their cars in large parking lots. This solution saves them time and improves their satisfaction when visiting the mall, improving the chances for repeat business. Ensure a safe shopping environment Security is the final piece to the puzzle. With Hikvision’s smart video solution, security teams at shopping malls can get alerts in real time to ensure the store is always safe. Additionally, Hikvision offers multiple, high-value security applications for unattended environments, from traditional video security to AI algorithms that detect incidents. These capabilities ensure that customers always feel safe and comfortable inside the mall.  

Read More

Exposure Management The Proactive Tool to Fend Off Sophisticated Cyber Threats

Gaurav Ranade, CTO, RAH Infotech The rising cybersecurity risks are a cause for worry for IT teams across verticals. This is where organizations need a proactive and advanced mechanism to counter the new-age threats and threat actors. Exposure and vulnerability management are considered as one of the most ideal solutions for mitigating cyber threats But what is exposure and vulnerability management? Exposure and vulnerability management are both important aspects of cybersecurity, but they focus on different aspects of protecting an organization’s systems and data. Exposure management is the process of identifying and mitigating potential risks or vulnerabilities in an organization’s systems and infrastructure. It involves assessing the overall risk landscape and implementing measures to minimize the impact of potential threats. Vulnerability management is a subset of exposure management and specifically focuses on identifying, evaluating, and mitigating vulnerabilities in an organization’s systems and applications. It involves a systematic approach to proactively identify and address weaknesses that could be exploited by attackers. The key components for strong exposure management are – vulnerability assessment, risk assessment, risk mitigation, patch management, secure configuration management, security awareness and training, incident response planning, and continuous monitoring. Why is exposure management needed? Exposure management in cybersecurity is crucial for several reasons: Risk Reduction: Exposure management helps in reducing the overall risk to an organization’s digital assets. By identifying and mitigating vulnerabilities and weaknesses in the system, exposure management minimizes the chances of cyberattacks and data breaches. Vulnerability Identification: This process helps in understanding potential entry points that attackers could exploit, allowing proactive measures to be taken to strengthen security. Prioritization of Security Measures: Exposure management helps organizations prioritize their security measures based on the level of risk associated with each vulnerability. Compliance Requirements: Many industries and regulatory frameworks require organizations to implement exposure management practices as part of their security and compliance efforts. By adhering to these standards, organizations can demonstrate their commitment to protecting sensitive data and maintaining a secure environment. Incident Response Preparedness: By continuously monitoring and managing exposures, organizations can detect and respond to potential security incidents more effectively. This proactive approach allows for faster containment and remediation of security breaches, reducing the overall impact on the organization. Reputation and Customer Trust: Exposure management helps in preventing and minimizing the impact of security breaches, enhancing the organization’s reputation and maintaining customer confidence in their ability to protect sensitive information. Skybox’s award-winning exposure management solution is a go-to option for businesses Skybox’s Vulnerability and Threat Management solution leverages the company’s proprietary network modelling, exposure management, and path analysis to provide precise exposure analysis and vulnerability prioritization and management. Skybox’s approach to vulnerability and threat management delivers four essential benefits for customers: Skybox aggregates vulnerability data from all assets (including IT, OT, and multi-cloud) and every corner of the network. Unique scan-less detection capabilities and active scanning deliver a 360-degree view of the attack surface. Daily, human-curated threat intelligence is fed into the Skybox network model. Exposure, CVSS severity, exploitability, asset importance, and automated cyber risk quantification capabilities including financial impact provide an exact risk score used to prioritize action where it matters most proactively reducing your risk of attack. Skybox identifies and automatically recommends effective, practical options to reduce risk. Available patches are aggregated by Skybox threat analysts daily, however, remediation options go beyond patching and include configuration changes, network segmentation, and more. Attacks, including zero days, can be prevented, even when patches are impractical or unavailable. Integrations with ITSM tools assist in implementing and maintaining remediation through ongoing oversight. The solution automatically generates tickets, tracks performance versus SLAs, keeps stakeholders apprised, and ensures issues are promptly addressed. Skybox continues to evolve this solution and recently added the ability to quantify cyber risk exposure in financial terms to help organizations pinpoint cyber risks with the highest potential financial impact. By implementing exposure management practices, organizations can reduce their attack surface, minimize the risk of data breaches, and improve their overall cybersecurity posture. It is important to tailor exposure management strategies to the specific needs and risks of each organization and regularly review and update them to address emerging threats and technologies. *Views expressed in the article are solely of the Author RAH Infotech is India’s leading value-added technology distributor and solutions provider. Headquartered in New Delhi, RAH Infotech has been providing world-class IT solutions since the year 2005 to a large number of channel partners and enterprises in the India & SAARC regions. The rich portfolio includes a wide range of best-of-breed solutions to address requirements across Security, Data, Network, Application, Storage, and beyond.As a top-tier technology enabler, we manage the entire value chain of data management requirements of enterprises and protect their digital assets. We partner with the finest global technology firms to develop customized IT solutions in the area of cybersecurity, networking, cloud computing, data management and application management for various industry verticals.  

Read More