securitylinkindia

5Tattva Wins ‘Best Cybersecurity Consulting Award’ at CSG Awards 2025 in Dubai

5Tattva, a leading provider of cybersecurity solutions and managed security services, has announced that it has been honored with the prestigious ‘Best Cybersecurity Consulting Award’ at the CSG Awards 2025, held in Dubai. This award celebrates 5Tattva’s outstanding leadership, strategic vision, and relentless commitment to advancing the digital security landscape across global markets. With cyber threats escalating at an alarming rate, the need for robust cybersecurity leadership has never been greater. The CSG Awards is an exclusive initiative dedicated to recognizing and honoring top cybersecurity leaders and CISOs who have played a pivotal role in protecting enterprises against cyberattacks. As a recipient of this year’s top honor, 5Tattva stands as a testament to the power of innovation, proactive defense, and deep-rooted industry expertise in the cybersecurity space. “This recognition is a proud milestone for our entire team. Today Cybersecurity is no longer just an IT concern – it’s a critical business priority,” said Atul Luthra, Co-Founder of 5Tattva and CEO of Zeroday Ops, “This award reaffirms our mission to provide strategic, future-ready security solutions that empower organizations to navigate today’s complex threat landscape with confidence.” 5Tattva has been at the forefront of cybersecurity consulting and compliance, delivering state-of-the-art solutions tailored to enterprise needs. This recognition underscores the company’s dedication to a customer-centric approach, innovation-led growth, and excellence in implementation – backed by a team of highly skilled professionals driving tangible impact across industries. “This win is really about the people – our teams, our clients, our partners,” added Manpreet Singh, Co-Founder & Principal Consultant at 5Tattva and CEO of Zeroday Ops, “Our goal has always been simple – to bring clarity, confidence, and control back to our clients in a complex digital world.” In a significant strategic move earlier this year, 5Tattva acquired a major stake in Zeroday Ops Private Limited – a renowned cybersecurity firm known for its advanced threat detection and prevention capabilities. This acquisition merges 5Tattva’s robust compliance and managed security portfolio with Zeroday Ops’ offensive and defensive cybersecurity prowess, resulting in a comprehensive security ecosystem tailored for enterprises across India and international markets.

Read More
CP Plus

STQC-Certifified Security Innovations for the New Bharat

Aditya Khemkha In a defining move that signals the rise of a more secure, self-reliant, and quality-assured surveillance ecosystem, the Ministry of Electronics and Information Technology (MeitY) has introduced a new compliance requirement for the CCTV industry in India. As per the official gazette notification dated April 9, 2024, MeitY has made STQC certification mandatory for all CCTV cameras – whether manufactured, imported, or sold across the country. This change falls under the updated Electronics and Information Technology Goods (Compulsory Registration) Order, 2021, and mandates compliance with Essential Requirements (ERs) and BIS certification (IS 13252 Part 1). All non-compliant models will be barred from sale or distribution post April 9, 2025. The decision marks a pivotal shift in India’s approach toward surveillance technology, one that reinforces national security, data privacy, cybersecurity resilience, and consumer trust. Understanding STQC: The new quality gatekeeper for CCTV Standardisation Testing and Quality Certification (STQC) is a set of quality assurance frameworks developed by MeitY. STQC focuses on rigorous technical validation to ensure electronics, especially security and surveillance equipment, meet defined standards of safety, reliability, and performance. It goes beyond functional efficiency and delves deep into the core of cybersecurity, hardware resilience, and data protection protocols. STQC certification for CCTV cameras demands comprehensive testing of encryption mechanisms, firmware integrity, secure communication protocols, and physical robustness, setting a new benchmark for surveillance products in India. Key provisions of the mandate ● Universal Applicability: All analog, IP, and speed dome cameras must obtain STQC certification under IS 13252-1 (IEC 60950-1) standard. ● Cybersecurity by Design: Every certified product must comply with stringent ERs, including:• Secure communication via TLS/ HTTPS. • Enforcement of strong, unique passwords. • Disabling of debugging/ test ports in shipped devices. • Uniformity in firmware versioning and patch management ● Tamper-Resistance & Physical Security: • Devices must feature secure enclosures • Physical ports must be access-controlled or locked • External interfaces must be designed to deter unauthorized access ● Certification Deadline: Effective from April 9, 2025, all non-certified models will: • Be removed from the BIS license databases • Be ineligible for new model approvals • Face prohibition from manufacturing, sales, or imports within India A boost for Atmanirbhar Bharat & indigenous innovation The STQC mandate is not just a regulatory milestone; it is a strategic enabler of India’s ‘Atmanirbhar Bharat’ vision. By enforcing stringent quality and cybersecurity parameters within the national ecosystem, the regulation actively discourages substandard, foreign-dumped products and opens new doors for domestic manufacturers and indigenous innovations. For Indian brands, the path forward is not just about compliance, but about leading with conviction, capability, and country-first commitment. CP PLUS: At the forefront of India’s secure surveillance revolution India’s leading surveillance brand, CP PLUS, has long believed that surveillance is not just about watching –it’s about protecting, preventing, and preserving. With a well-established ecosystem of design, development, and manufacturing facilities in India, CP PLUS is uniquely positioned to meet and exceed STQC standards. Having already invested significantly in R&D, firmware security frameworks, and hardware hardening protocols, CP PLUS is fully equipped to align its product portfolio, including IP cameras, analog cameras, PTZ solutions, and smart edge devices, with the new STQC requirements. From encryption standards embedded into every transmission to physical designs engineered for tamper resistance, CP PLUS products are built with a vision to offer trustworthy, high-integrity surveillance for every Indian household, institution, enterprise, and government body. This proactive compliance readiness, backed by decades of market leadership, positions CP PLUS not just as a manufacturer but as a national partner in security sovereignty. Impact on the surveillance ecosystem The introduction of STQC compliance brings with it significant ramifications, some challenging, but many promising, for the surveillance industry at large: Enhanced Security and Trust: With encrypted data transfers, consistent firmware, and tamper-proof designs becoming mandatory, consumers and institutions can trust their surveillance systems like never before. Operational Challenges for Some Manufacturers: The path to compliance is not without its hurdles. From obtaining testing approvals to updating legacy firmware, and from redesigning physical components to aligning supply chains, the industry must prepare for transformation at all levels. Supply Chain Realignment: Manufacturers relying on imported, non-compliant components may face disruptions. India-based supply chains, however, will benefit from renewed focus and investments. A Rise in Standardization and Benchmarking: The move encourages surveillance systems to be assessed on standardized parameters – enabling fair comparison, consistent performance expectations, and better buyer awareness. The way forward: Standardised, secure & sovereign India’s move to mandate STQC certification for CCTV cameras is more than regulatory enforcement, it is a declaration of security independence and consumer dignity. In an age where surveillance systems can be the first line of defense against everything from local crime to cyber intrusion, ensuring that every device is secure by design is not just prudent, it is essential. By championing this regulation, MeitY has created a model for proactive, pre-emptive cybersecurity governance, one that puts India in the global spotlight as a nation where digital trust is engineered into every device. And with brands like CP PLUS leading the way, the future of surveillance in India looks indigenized, intelligent, and impregnable. Read More

Read More

MAJOR CONSIDERATIONS IN PLANNING A SECURITY SYSTEM

By Milind BorkarMD, Systematica Suyog Security Consultants(Sr. Consultant & Security Expert) As technology evolves very fast from year to year, it becomes a challenging task to determine the requirements to build a secure, robust and almost fool proof system that will fulfill all basic security parameters. These parameters will vary for each new system as the same parameters cannot be applied across the board for all systems. A robust system that meets the security requirements for any new and or green field project, the following points will drive the decision-making process. We will use a CCTV system as an example As one can see there are several factors that influence the decision-making process in building a security system. We will briefly go over each one of them in the following sections Budget and time available As in any and every sphere of life the available budget is the key factor. Based on the available budget and time available, a determined effort needs to be put in place to first build a project specific requirements document. Several trade-offs will need to be considered if the project requirements cost exceeds the available budget. This could be an iterative process that will consume time and money in the planning phase. Each new or green field project or an update/ refresh cycle of an existing deployment must go through this elaboration process to avoid nasty surprises in the implementation/ build phase. Site survey Conducting a site survey is the basis of building a security system. This phase is the most critical where a thorough site survey is conducted to determine security vulnerabilities. Along with this a determination needs to be made as to what other systems are required to complement the main CCTV system. The illustrative airport diagram should give a very good idea of the other security components that need to be explored. Once this information is gathered and documented, then this information becomes the driving force for subsequent phases of the project. We will use the following diagram to highlight all the components that constitute a surveillance/ security system. We have used an airport as a used case. A typical airport is a super-set of any security deployment The best way to illustrate the process of building a security system is through an example. We are using an airport as an example as it has a super-set of inputs that can be applied to any security system design. The following color-coded table is used to distinguish the various inputs/ requirements received from the customer. The following table is a standard template that can be used to capture security requirements. These inputs are used to design the entire security system which can then be used to calculate the cost of the implementation. Using the above inputs from the customer and the respective BOQs for each airport, a complete design can be derived. The following table shows the output of the design process for 24 airports. Each airport has the same security requirements but BOQs are different Once the design is completed to a 90% level of the target specification, the budgetary process can be started. Several vendors, RFQs etc. will be involved to go through an iterative process. This process will vary for each geographical region and must be considered. Without going into the details that vary for different geographical regions the important point to consider is the vendor selection process as it has a significant impact on the quality, robustness and overall cost of the system. Customers desirous of building a security system can engage subject matter experienced consultants who can guide and evaluate all the variables/ entities in the decision-making process. Cost optimization through simulation A security system design, implementation and build out are a complex system with many sub-systems that need to work with each other flawlessly. Every care must be taken in the early phases of the project as many variables are involved which can have a significant impact on the overall cost. One of the ways to help this process is to run a simulation based on the customer inputs. Through experience the ‘SYSTEMATICA SUYOG SECURITY CONSULTANTS’ has determined the following: ● The customer knows what he wants but does not know how to get there. ● Almost all vendors over sell their products and services which do not benefit the customer in any way. ● A consultant is required in all cases to systematically guide and evaluate all the options available to provide the highest performance at the lowest cost to the customer. The SYSTEMATICA SUYOG SECURITY CONSULTANTS provides consulting services through all phases of the project. They have built a proprietary ‘Design Engine’ as well as a proprietary ‘Simulation Engine’ through years of experience dealing with customers and their security requirements. We at SYSTEMATICA SUYOG SECURITY CONSULTANTS always put the customer FIRST and provide professional consultancy services. We will now go through a simulation for one of 24 airports. We will show how our simulator determines the highest performance at the lowest cost. The following graph illustrates this. The X-Axis shows the percentage of cameras running video analytics (VA). The Y-AXIS shows the cost in a standardized format. The DELTA between the lowest cost and the highest cost is 3X. VA stands for Video Analytics; VMS stands for Video Management Software. The GREEN line is the overall COST with the other colored lines that sum up to the overall GREEN line cost. Impact of Cost of Running Video Analytics for 24 airports ● Percentage of cameras running Video Analytics is the only single tactor that influences overall CCTV system design and hence overall Cost. ● Can Apply same Design Template across all airports as far as Video Analytics is concerned. ● Each Airport has unique characteristics because of different BOQ camera quantities and functionality grouping of cameras. ● If one uses a Single Design Template per airport then we run the risk of under served or over served airports unless a thorugh analysis is done….

Read More

Synology Unveils C2 Surveillance forScalable and Reliable Cloud Monitoring

Synology recently introduced C2 Surveillance, a new Video Surveillance as a Service (VSaaS) solution designed to provide a server-less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. “Our goal has always been to build a comprehensive surveillance ecosystem that enables seamless integration and management for our customers,” said Josh Lin, Director of Synology’s Surveillance Group, “With the addition of C2 Surveillance, customers now have the flexibility to deploy their surveillance solutions entirely on-premises or in the cloud, depending on their unique requirements.” C2 Surveillance is built to simplify surveillance deployment and management, especially for multi-site operations. With no device license requirements, users can add cameras without worrying about additional costs or constraints. Key highlights of C2 Surveillance include: C2 Surveillance is Synology’s new Video Surveillance as a Service (VSaaS) solution designed to provide a server-less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. Effortless setup C2 Surveillance is built with ease of deployment and management at its core. The setup process is designed to be completed within minutes even on mobile devices. Benefit from its intuitive installation experience, administrators can quickly bring new sites online without any specialized training, making it highly accessible for businesses of all sizes. Advanced AI-powered detection tasks can also be configured easily through the user-friendly Synology interface, ensuring both accessibility and powerful functionality in just a few clicks. Continuity-first architecture C2 Surveillance is designed with a continuity-first architecture, ensuring uninterrupted recording even in the event of network disruptions. All footage is edge recorded to microSD cards, with the option to back up recordings to the C2 Cloud for extra protection. Additionally, C2 Surveillance supports failover offline mode, enabling local monitoring even when disconnected from the internet. To safeguard sensitive footage and user access, the system incorporates AES-128 encryption, multi-factor authentication, and granular permission settings, and adheres to industry-leading compliance standards including ISO 27001, SOC 2 Type II, and NDAA. Smart scalability To support organizations operating across multiple locations, C2 Surveillance leverages cloud infrastructure to centrally manage cameras across sites. With seamless integration with Windows Active Directory, it enables centralized identity and access management. Role-based access control allows administrators to easily delegate specific permissions across teams or locations. In addition, C2 Surveillance supports low bandwidth mode to reduce bandwidth consumption by up to 50% with minimal impact on video quality, making it ideal for environments with bandwidth constraints. C2 Surveillance leverages cloud infrastructure to enable customers centrally manage cameras across sites. Availability C2 Surveillance will be available later this year. For the latest updates, please visit the official Synology website.

Read More

ICISSM 2nd Annual Seminar

16 May 2025 The International Council for Industrial Security, Safety and Management (ICISSM) hosted its 2nd Annual Seminar on 16 May 2025 at the Institute of Social Sciences, New Delhi, on the theme – ‘Navigating the Evolving Threat Landscape and Climate Change.’ The event brought together national security leaders, industrial experts, and tech innovators for a day of in-depth discussion, critical analysis, and solution-driven collaboration. The seminar commenced with ceremonial lamp lighting by Lt. Gen. Sudhir Sharma, Col. D.R. Semwal, Maj. Gen. Vikram Singh, Col. Sanjay Srivastava, and Capt. Manoj Kumar, followed by a welcome address from Maj. Gen. Vikram Singh, Chairman, ICISSM. He set the tone by emphasizing the urgency of industrial security transformation amidst climate change and geopolitical instability. Delivering the Inaugural Address, Lt. Gen. Sudhir Sharma, Chairman, MitKat Advisory, explored the unsettling volatility of today’s geopolitical order. “Rules are chains for the weak, tools for the strong,” he declared, critiquing the collapsing global consensus and the rise of right-wing nationalism, resource competition, and technological warfare. He underscored the need for ‘strategic autonomy’ and industrial resilience through reliable supply chains and technology leadership. The first Keynote Address by Saurabh Tolumbia, IPS, Security Advisor at GAIL, delved into the security of critical infrastructure. He highlighted that while external threats remain visible, internal vulnerabilities such as insider sabotage, cyber gaps, and undertrained personnel pose equal – if not greater – risks. “Security,” he said, “is like salt – only noticed when it’s missing.” DigiSuraksha, a platinum sponsor, showcased a transformative facial authentication system designed to replace outdated ID-based security. “Your face is your identity,” said Co-creator Ram Kunchur, demonstrating how encrypted QR codes could enhance access control with zero server dependency. Panel Discussion 1 on AI, Machine Learning & Deepfakes featured Dr. Alok Vijayant, Santosh Pathak, Avanish Pathak, and Roshan Baberwal. Discussions covered the misuse of generative AI in misinformation campaigns, vulnerabilities in unstructured datasets, and the urgent need for AI literacy across security forces. Panel 2, moderated by Dr. (Prof.) Rajiv Mathur, focused on Cyber-Physical Threats in industrial environments. The panellists were Rekha Gairola (Adobe), Lt. Col. Sandeep Mohapatra (MMTC PAMP), Maj Ranjen Bhatia (PNB), and Ankit Sabharwal (Control Risks) – and they emphasized that cyber breaches are increasingly tied to human oversight and lax protocols. “Gone are the days when CSOs and CISOs worked in silos,” noted Maj. Ranjen Bhatia. A fireside chat between Dr. Surabhi Pandey and Sumit Behl (Sparsh CCTV) unpacked how businesses must adapt to constant tech disruption. This was followed by Sparsh CCTV’s product presentation, emphasizing indigenous solutions for industrial surveillance. Post-lunch, Panel 3 addressed ESG and the Changing Risk Landscape, moderated by Cdr. Sandeep Sinha. Experts like Gp. Capt. (Dr.) S. N. Mishra, Vishnu Chandra, and Col. Abhijit Singh stressed the integration of climate, social governance, and cyber frameworks into enterprise risk strategy. “Climate is no longer an environmental issue – it’s a security one,” observed Col. Singh. The final Panel Discussion explored whether Drones are a Boon or Bane for industrial security. Moderated by Anil Dhawan, it featured insights from Col. S.A. Rodrigues (Idea Forge), Capt. Allroy Collaco (CAPSI), and Manan Batra (360PSA). The panel advocated for drone adoption in surveillance, response, and infrastructure monitoring – balanced by anti-drone measures and regulatory clarity. Col. (Prof.) Sanjay Srivastava, in his keynote, urged security professionals to become proactive agents in climate resilience, disaster mitigation, and urban risk reduction. “Security teams must lead – not just respond,” he urged. Another key highlight of the seminar was the signing of the MoU between ICISSM and Veena Gupta to jointly offer an Executive Protection training program. Closing the day, Col. D.R. Semwal delivered the final keynote, sharing best practices in industrial security management. He reinforced the importance of convergence between physical and cyber strategies, continuous learning, and integrated crisis response frameworks. The seminar concluded with Capt. Manoj Kumar’s vote of thanks, highlighting ICISSM’s commitment to evolving security landscapes with agility, collaboration, and purpose. The event was supported by Platinum Sponsors – Sparsh CCTV & DigiSuraksha, Silver Sponsors – CISS & TechnoPurple, Event Partner – CROPC, Media Partners – SecurityLinkIndia & SECURITY TODAY, and Knowledge Partner – MIGS Consulting.

Read More