securitylinkindia

Storage Technology

Storage Technology – Then & Today, and the Trend

Milind Borkar MD, Systematica Suyog Security Consultants (Sr. Consultant & Security Expert) Computer storage systems have seen a massive evolution and transformation over the last 100 years or so. These changes have been dramatic in relation to the size, price and the access speed of storage. These changes have been possible due to the rapid advances in technology, which was initially slow and took years to evolve but later in the last decade it accelerated due to rapid innovations and concerted/ collaborative efforts of the industry giants. These technology advances have revolutionized the way companies, businesses and consumers use storage technologies today –y from the most ubiquitous smart phone devices and personal computers to all the way to businesses which now have come to rely more on cloud storage services. In this article we try to capture the evolution of storage technologies over the years and examine the fundamental technical reason that has accelerated storage evolution over the last decade. Storage evolution over the last 70 years relative to size, capacity and price The table below highlights the trends in storage. Initially, the advances in technology were slow, mostly led by IBM in the 60s and 70s in the Megabyte revolution. In the 80s and 90s other companies jumped on the storage bandwagon and started the Gigabyte revolution soon to be followed by the Terabyte revolution. Today there are many physical form factors of storage devices from the traditional mechanical hard disk drives (HDD) to non-volatile memory (NVM) or solid-state devices (SSD); however, the fastest and most dynamic revolution is occurring in the cloud. Storage Technology Evolution over the last 100 years (Another View) There is another view of understanding the evolution of storage technology as well. The diagram below is a pictorial representation of the other view how storage technologies have evolved over the last 100 years. The fastest growing storage technology today Today, most storage systems use some or the other form of a mechanical device for storage which is otherwise known as ‘hard disk drives’ (HDD). HDDs are the dominant technology for several reasons such as very high recording density per platter, more than one platter per HDD, higher rotational speeds up to 15000 RPM for enterprise class drives, and reduced costs due to economies of scale. However, they do have inherent disadvantages owing to further recording density increase has hit the limits of the physical space, increasing the rotational speed of the platter increases the cost exponentially, and being a mechanical device it is bound to physically fail due to all the moving parts. A single HDD with a single platter at 15000 RPM can at most deliver a transfer speed of 100MB/s for sequential block reads, and for the random reads for the same configuration, transfer speed drops down to as low as 10MB/s Given the inherent limitations of mechanical storage devices and the rapid drop in prices of non-volatile memory (NVM), NVM is the next revolution in storage. It is found in almost all mobile devices and now continues to replace mechanical devices across the board. There are several reasons for this – they are now cost competitive with HDDs per terabyte of storage capacity and this price parity will continue to erode in favor of NVM in the coming years; NVM technology is far more reliable in the longer term because it has no moving parts; NVM is over 100 times faster than HDD and has similar transfer speeds for both sequential and random reads/writes unlike HDDs; and micro-second read/ write latency compared to milli-second latency for HDDs. Companies like Intel and Samsung have now developed NVM technologies that are 3 dimensional – it means increased storage density per cubic measure of volume without any performance degradation. The first system implementations of NVM were found to be SSDs that use the Serial ATA Protocol or SATA. The reason behind this was very simple. They achieve a 100-fold increase in transfer speeds relative to HDD immediately without changing the upper level small computer systems interface (SCSI) protocol. The SCSI protocol is over 4 decades old and is used by all I/O protocols such as fiber channel etc. All major operating systems also support the SCSI protocol. So for the industry’s quick gain, it was easy to replace the HDD with an NVM based SSD. The next disruption was soon born because the SCSI protocol and its associated software stack were very heavy as far as execution time was concerned. This SCSI protocol overhead directly impacted latency of reads and writes which is detrimental to high performance applications such as high frequency trading, small transactions in banking, and numerous database applications for machine learning and artificial intelligence. Thus, an industry working group was formed to address the latency problem associated with the SCSI protocol. The industry came up with a new protocol which takes advantage of the native speed of NMV. They completely eliminated the SCSI protocol to define a new protocol called NVMe (Non-Volatile-Memory Express) protocol. In this protocol, the NVM device is directly attached to the I/O PCI express bus hence the extension ‘e’ in NVM. This eliminates the need to have the traditional hardware and firmware that resides in a host bus adapter (HBA) along with HBA itself. The following diagram illustrates this concept Latest NVM highlights ● PCIe Gen1 is 2.5 gbps per lane per direction. Today’s SSDs pack Gen3x2 or Gen3x4 (8 Gbps x 2 or 4 lanes = upto 32 Gbps) bandwidth in a very tiny M.2 gumstick form-factor. ● 3-D NAND and 3D-Xpoint NAND – DRAM-bandwidth at flash-economies – very low-latency flash (20us IO read/Write) latency compared to 200us latency for enterprise flash. ● New form-factor coming to pack TB of capacity – ‘ruler’ form factor from Intel. ● NVMe enables performance scaling with the increase in capacity – traditionally denser HDD did not bring any performance improvement. ● NVMe over TCP enables low-cost SAN deployment compared to Infiniband, RoCE, iWarp or FC. ● NVMe allows dual-ported…

Read More

IDIS Combines Performance and Style with New all-black EDGE AI turret cameras

Latest 5MP IR turret cameras with Edge AI are a discreet option for high-end aesthetics and modern interiors Providing a stylish complement for high-end settings and modern interiors, the new, all-black versions of IDIS’s popular 5MP DC-D4512WERA and DC-D4532WERA turret cameras combine a refined look with powerful AI performance. Designed to blend neatly with luxury retail, restaurants, hospitality, corporate settings, and any location with modern, minimalist aesthetics, the NDAA-compliant 5MP cameras deliver exceptional image quality even in low-light environments thanks to their advanced LightMaster NIR sensors. With Edge AI powered by IDIS Deep Learning Analytics (IDLA), the cameras allow automated detection and alerts to a wide range of potential incidents of interest, from line-crossing, loitering, and intrusion to motion and audio detection. They also allow easy and affordable surveillance system upgrades, with analytics targeting exactly where needed. IDIS Smart Failover protects against loss of video data in the event of network instability or dropout, preserving an unbroken chain of video evidence. An in-built microphone with two-way audio allows direct communications, using recorded or person- to-person announcements. The cameras benefit from IDIS DirectIP® plug-and-play installation and mutual authentication with IDIS NVRs, enabling instant and seamless operability. Featuring LED lighting, they provide night vision clarity at ranges of up to 30 meters., The cameras can also be paired with IDIS junction boxes, also available in matching black, to support systems integrators with all the accessories they need for complete, end-to-end projects. “These new 5MP black AI turret cameras make it easy to discreetly target the power of IDIS edge analytics in a wider range of settings, from subtle placement in rooms with dark colour schemes, high-end décor, and the latest modern and urban style interiors,” said Jamie Barnfield, Senior Sales Director, IDIS Europe. Read more

Read More

ONVIF and the C2PA Announce Collaboration to Strengthen Trust in Digital Video

Leo Levit, Chairman,Steering Committee, ONVIF Cross-industry partnership aims to promote video integrity standards amid rising threats from AI-generated manipulation ONVIF®, the leading global standardization initiative for IP-based physical security products, has announced that it has entered into a strategic collaboration with the Coalition for Content Provenance and Authenticity (C2PA) to preserve the integrity and authenticity of digital video in the evolving fight against content manipulation. The two groups will work together to raise awareness and promote the adoption of open standards that help verify the authenticity of video content across digital video platforms. This initiative aligns the ONVIF video authentication specification with Content Credentials, the open standard published by the C2PA, which is comprised of Microsoft, Adobe, Google, Meta, BBC, and Truepic. Content Credentials enhances transparency and establishes end-to-end confidence in the authenticity of digital assets. This collaboration comes at a time when synthetic media, deepfakes, and AI-generated content are becoming increasingly indistinguishable from authentic footage. The tools that create this fake content pose a significant risk to public trust in video used for law enforcement, corporate security, and legal proceedings as well as in a wide range of digital media products. “We are happy to welcome ONVIF as a liaison member to the C2PA,” said Andrew Jenks, Executive Chair of the C2PA, “As the global standard for provenance, Content Credentials plays a vital role in providing transparency in digital media. The collaboration with ONVIF and the C2PA brings Content Credentials to video security – an environment where footage must reflect reality without alteration. We’re excited about our work together and the impact of our global, open standards.” The video authentication specification developed by ONVIF, known as media signing, ensures that video footage is cryptographically signed at the point of capture with a digital key specific to the individual surveillance camera. The signatures are embedded in the video, enabling an authentication tool to verify whether video frames – throughout the chain of custody – have been modified or manipulated since they left the camera. This is critical for video used in court proceedings, law enforcement investigations, and corporate security incidents, where any doubts about the validity of video evidence can undermine outcomes and erode institutional trust. The C2PA’s core specification, Content Credentials, is a technical standard that allows publishers, creators, and consumers to trace the lifecycle of media, beginning from production (such as which camera captured an image, whether it was edited, and when) to consumption (displaying this information on the website or platform where the content appears). Content Credentials embed cryptographically signed, tamper-evident metadata directly into images, video, audio, and documents or stored in a manifest that travels with the content, making any alteration detectable. This metadata acts like a digital ‘nutrition label,’ detailing the content’s origin, history, and any modifications made. “Preserving the authenticity of video has never been more important as the threats from generative AI and other means of content manipulation continue to increase exponentially, regardless of industry and use case,” said Leo Levit, Chairman, Steering Committee, ONVIF, “The work of ONVIF to preserve video integrity and the recognition by the C2PA will help build user confidence that recorded video can be verified as genuine and untampered.” Read More

Read More

20,000 Malicious IPs and Domains Taken Down in INTERPOL Infostealer Crackdown

41 servers seized and 32 suspects arrested during Operation Secure More than 20,000 malicious IP addresses or domains linked to information stealers have been taken down in an INTERPOL-coordinated operation against cybercriminal infrastructure. During Operation Secure (January-April 2025) law enforcement agencies from 26 countries worked to locate servers, map physical networks and execute targeted takedowns. Ahead of the operation, INTERPOL cooperated with private-sector partners Group-IB, Kaspersky and Trend Micro to produce Cyber Activity Reports, sharing critical intelligence with cyber teams across Asia. These coordinated efforts resulted in the takedown of 79 per cent of identified suspicious IP addresses. Participating countries reported the seizure of 41 servers and over 100 GB of data, as well as the arrest of 32 suspects linked to illegal cyber activities. What are Infostealers? Infostealer malware is a primary tool for gaining unauthorized access to organizational networks. This type of malicious software extracts sensitive data from infected devices, often referred to as bots. The stolen information typically includes browser credentials, passwords, cookies, credit card details and cryptocurrency wallet data. Additionally, logs harvested by infostealers are increasingly traded on the cybercriminal underground and are frequently used as a gateway for further attacks. These logs often enable initial access for ransomware deployments, data breaches, and cyber-enabled fraud schemes such as Business Email Compromise (BEC). Following the operation, authorities notified over 216,000 victims and potential victims so they could take immediate action – such as changing passwords, freezing accounts, or removing unauthorized access. Operational Highlights Vietnamese police arrested 18 suspects, seizing devices from their homes and workplaces. The group’s leader was found with over VND 300 million (USD 11,500) in cash, SIM cards and business registration documents, pointing to a scheme to open and sell corporate accounts. As part of their respective enforcement efforts under Operation Secure, house raids were carried out by authorities in Sri Lanka and Nauru. These actions led to the arrest of 14 individuals – 12 in Sri Lanka and two in Nauru – as well as the identification of 40 victims. The Hong Kong Police analysed over 1,700 pieces of intelligence provided by INTERPOL and identified 117 command-and-control servers hosted across 89 internet service providers. These servers were used by cybercriminals as central hubs to launch and manage malicious campaigns, including phishing, online fraud and social media scams. Neal Jetton, INTERPOL’s Director of Cybercrime, said, “INTERPOL continues to support practical, collaborative action against global cyber threats. Operation Secure has once again shown the power of intelligence sharing in disrupting malicious infrastructure and preventing large-scale harm to both individuals and businesses Read More

Read More

Driving a Sustainable Future with LED Outdoor Displays in Modern Buildings

As urban centers continue to expand, buildings are evolving into far more than just places of work or residence. Today, architectural facades are becoming dynamic digital canvases that captivate passers-by and spark conversation. Traditionally, large-scale LED displays were seen as costly and energy-hungry, but the global shift toward sustainability has spurred innovative solutions that balance striking visuals with eco-friendly design. Rethinking traditional building displays Older building displays were often notorious for their high energy consumption. While LEDs are generally more energy-efficient than traditional lighting like incandescent or fluorescent bulbs, early LED displays didn’t fully realize that advantage due to technical limitations. Firstly, they lacked efficient thermal management, causing excessive heat generation that wasted energy (and also shortened component lifespan). Secondly, inefficient power supplies and imprecise voltage control led to further waste, especially when static or bright-white content forced RGB diodes to run constantly at maximum intensity. As a result, early LED displays could consume up to 1,000 watts per square meter, leading to high electricity costs and a large carbon footprint. Maintenance added another layer of difficulty. Many legacy systems were large, hard to service, and required extensive time for repairs or recalibration. These concerns underscored the urgent need for solutions that could reduce operational costs while aligning with sustainability goals. Turning to green LED solutions Recent innovations in LED technology have ushered in a new era of energy-efficient, adaptable, and environmentally friendly building displays. A key innovation is in thermal design such as flip-chip COB technology, which can reduce device temperature by 5-10°C and power consumption by around 45%. This improvement stems from flip-chip COB architecture, where LED chips are mounted directly onto the substrate, eliminating traditional wire bonds. This design minimizes thermal resistance, allowing heat to dissipate more efficiently and lowering junction temperatures. These enhancements bring down heat output and energy use. Precise voltage control, enabled by common cathode setup, further enhances efficiency by powering each RGB diode individually. Compared to conventional common anode design, this new approach reduces energy consumption, all while maintaining the vibrant, high-definition visuals demanded by today’s audiences. Softwaredriven management and control offer another key path to energy savings. Smart content management systems such as Hikvision’s PixMaster intelligent engine, dynamically adjust brightness and contrast based on content and ambient light conditions. This ensures the display uses only the power it needs, optimizing energy efficiency without sacrificing visual performance. Additionally, robust aluminum shells protect components from harsh weather, ensuring long-term durability and reducing maintenance frequency. These innovations make modern LED displays a reliable investment and contribute to minimizing waste. A real-world example of sustainability in action The transformative potential of these innovations can be seen in the case of Kamir’s new office building in Croatia. Faced with an outdated system that consumed excessive energy and lacked versatility, Kamir installed a 26-square-meter outdoor LED video wall using Hikvision’s P6 Outdoor Fixel LED technology. Featuring flip-chip COB and common cathode designs, the new system is an energy- efficient display, reducing energy consumption by 45% while maintaining stunning visual clarity. The installation’s intelligent energy management system adjusted brightness in real time, optimizing power use without compromising clarity. Its robust construction ensured reliable performance across Croatia’s varied weather conditions. Besides, the commercial LED display’s dynamic content capabilities attracted sponsors and advertisers, transforming the façade into a revenue-generating platform. This upgrade not only enhanced Kamir’s brand visibility but also demonstrated its commitment to sustainability. The global pursuit of greener solutions is redefining expectations across industries, and building displays are no exception. By adopting energy-efficient LEDs, smart content management, and durable designs, leaders like Hikvision are helping property owners transform energy- intensive displays into key components of sustainable strategies. Each installation marks progress toward a future where technology not only captivates but also benefits cities and communities. As more businesses recognize the long-term advantages, sustainable displays will become a cornerstone of urban design. Explore more about our LED display solutions and sustainability-focused innovations. Read More

Read More
Surveillance

The Silent Threat Inside India’s Surveillance Systems

Major Sadhna SinghConsultant As India rapidly advances towards becoming a digital powerhouse through smart cities, public safety systems, and ambitious Digital Public Infrastructure (DPI) missions like India Stack and CoWIN, the invisible foundation of this transformation is the reliability of its hardware. Among the most critical components are Hard Disk Drives (HDDs), the quiet workhorses storing vast volumes of surveillance footage, citizen data, and mission-critical system logs. But what if this very foundation is quietly being compromised? India’s backdoor hardware invasion India is witnessing a stealthy influx of used, refurbished, and end-of-life (EoL) hard drives, often mis-declared as new to evade regulatory controls. These HDDs enter through loopholes in trade classification, mostly without any quality checks, manufacturer credentials, or safety certifications. Many arrive under Harmonized System (HSN) Code 84717020, which is designated for new storage devices, thus circumventing licensing requirements under the Foreign Trade Policy (FTP) and violating E-Waste Management Rules. On paper, India doesn’t prohibit refurbished HDD sales, but their import is tightly regulated. In practice, however, grey market players exploit the regulatory blind spots, resulting in a digital time bomb quietly ticking across our surveillance systems, government servers, and public sector installations. The numbers tell a troubling story ● Over 3.3 million HDDs, many suspected to be used, were imported in FY 2023-24, outnumbering imports by authorized OEMs. ● In just the first nine months of FY 2024-25, an additional 1.9 million units were imported, suggesting a thriving grey market. ● Hyderabad Air Cargo alone accounts for up to 90% of these imports in recent months, with others entering via Chennai, Kolkata, and Mumbai. ● Top source countries include Hong Kong, Singapore, China, and the US, notorious hubs for global e-waste dumping. Declared import prices, sometimes as low as USD11-20 per unit, are a fraction of the legitimate OEM cost (USD70-90). The under-invoicing not only implies massive tax evasion but also points to deep-rooted misdeclaration networks. A. Port-wise import volumes B. Country of origin National security and cyber risks These aren’t just dodgy business practices. They’re national security vulnerabilities. Unlike surveillance-grade HDDs designed for 24×7 operations, refurbished drives, typically desktop-grade and not meant for continuous workloads, fail prematurely. In sensitive environments like railway command centres, police control rooms, or border surveillance hubs, such failures could mean loss of critical footage during emergencies, be it a riot, a terrorist attack, or an industrial accident. Worse still, HDDs refurbished overseas may carry undetected firmware modifications, turning them into potential hardware backdoors. In an era where data is strategic capital, compromising hardware is equivalent to compromising sovereignty. The economic fallout Beyond the security risks, this grey market has led to: ● Crores in lost revenue due to customs duty evasion and GST shortfalls. ● Market distortion, where shady traders repackage used drives with new casings and stickers, selling them at inflated MRPs, sometimes even on government procurement platforms like GeM. ● Consumer fraud, with unsuspecting households and MSMEs believing they’ve bought new, warrantied products; when in reality, they’re buying used electronics with limited lifespan and no accountability. Environmental non-compliance The environmental cost is equally dire. India’s E-Waste Management Rules (2022) prohibit unregulated import of electronic waste. Many of these drives fail within months, turning into toxic waste streams without proper recycling mechanisms. Their import also potentially violates India’s obligations under the Basel Convention, which prohibits transboundary movement of hazardous e-waste disguised as usable goods. Storage is sovereignty In today’s world, sovereignty doesn’t just depend on borders, but on bytes. Trusted storage hardware is as vital as secure communications. From Aadhaar to AI models, from critical infrastructure to defence networks — our digital services rely on integrity at the hardware level. Allowing unknown, unverified HDDs to creep into our systems threatens confidentiality, availability, and integrity, the very pillars of cybersecurity. What needs to be done 1. Tighten the Legal Screws ● Issue clear DGFT and CBIC circulars reiterating licensing requirements for used HDDs. ● Move refurbished HDDs from ‘Restricted’ to ‘Prohibited’ category, except for OEMs under Extended Producer Responsibility (EPR). 2. Impose Minimum Import Prices Introduce import price floors (e.g., USD 35 for 1TB drives) to stop under- invoicing and restore fair trade practices. 3. Mandate Labelling and Traceability Make it mandatory for all imported HDDs to: ● Be BIS registered. ● Carry labels indicating ‘Refurbished’ status, country of origin, and refurbisher’s identity 4. Secure Public Procurement Platforms like GeM should: ● Create a separate refurbished electronics category. ● Ban usage of non-certified drives in critical surveillance and defence contracts. 5. Conduct Strategic Audits Ministries such as MeitY, MHA, and MoHUA should: ● Audit existing HDDs used in police and smart city projects ● Run firmware-level forensic checks to detect possible vulnerabilities ● Involve CERT-In and NTRO in cases of national security concern Conclusion: A call for a whole-of-government response What India faces today is not just a trade irregularity, but a strategic vulnerability. The silent flood of unauthorized, potentially compromised HDDs threatens our national security, digital trust, consumer protection, and environmental goals, all at once. This calls for a coordinated response from DGFT, CBIC, BIS, MeitY, MoEFCC, MHA, and GeM to plug gaps, ensure hardware integrity, and protect the digital spine of India. In the data age, storage is infrastructure, and infrastructure is sovereignty. Let’s not allow backdoors to be built into our nation’s future, drive by drive. Read More

Read More
Indonesia

Fast Pass to Knowledge: Universitas Indonesia Upgrades Library Access and Digital Learning with Hikvision

Universitas Indonesia, one of the country’s most prestigious universities, is modernizing its campus infrastructure with Hikvision’s access control and smart classroom solutions. These upgrades ensure a safer, smarter and more interactive environment for students, faculty, and staff Smarter and more secure access to the library Universitas Indonesia’s central library faced a persistent issue with unauthorized and uncontrolled access. People from outside the university could enter without being monitored or verified, and it was hard to monitor traffic levels for management purposes. To address this problem, the university worked with IT system integrator Trimitra Data to install a combination of speed gates and facial recognition terminals at the library’s three main entrances. Hikvision’s Ultra Swing Barriers (DS-K3B801BX) can adjust opening and closing speeds based on visitor flow, ensuring smooth transitions and preventing unauthorized entry. They also include safety features such as automatic locking when there’s an obstruction, and emergency unlocking during a fire alarm. For identity verification, the university deployed Hikvision’s Ultra Series Face Recognition Terminals (DS-K1T- 673TDX-T) on the speed gates. These process entries in less than 0.2 seconds with over 99% accuracy. By integrating these terminals with the HikCentral Professional Series software, library staff can manage access permissions remotely while maintaining a detailed log of visitors. According to Sony Pawoko, a library staff member, the benefits were felt immediately. “With this system,” he said, “It is much easier for us to manage people coming in and out of the library. Now, only students, lecturers and guests who have permission can enter and access the facilities at Universitas Indonesia.” Apart from optimized access control and enhanced safety, because the solution tracks visitor flows, it helps administrators adjust library space usage according to peak and off-peak hours. It also helps staff to optimize the way they work, ensuring that they are deployed where and when they’re most needed. Exploring the benefits of smart classrooms In other parts of the university, faculties have begun to replace whiteboards with interactive displays in order to enhance the learning environment for students. Recently, the Faculty of Fiscal Administrative Sciences has constructed a new eco-friendly and smart building and wanted to create a pilot of Hikvision’s smart education solutions in order to explore the impact of digital learning tools. The pilot classroom includes an 86-inch 4K Interactive Display (DS-D5C86RB/B) for dynamic presentations and collaborative learning. It features light protection which filters out over 60% of ultrashort-wave blue light to protect students’ eyes and make long lectures more comfortable to follow. A 22-inch Electronic Class Board (DS-D6122TH-D/C) shows class schedules and announcements, as well as simplifies attendance through facial recognition or ID card scanning. There’s also a 4K lecture-recording camera (DS-2CD7186G0-IZS) and a 32-mic array (DS-UAC-M1P) for high-quality audio-visual capture for hybrid and online learning. An Education and Sharing System (DS-9604LNI-V/B12) manages lecture recording, whilst online learning and conferences are supported with Hikvision’s Classin Software. Together, these smart classroom technologies are already delivering many of the benefits of digital technologies in higher education. The interactive display, for example, allows lecturers to zoom-in on detailed parts of graphs and annotate directly on the screen. This is particularly beneficial for a faculty such as Fiscal Administrative Sciences where complex graphs, regulations, and models feature so heavily. It is also a very dynamic domain, and academics are now benefiting from the ability to use up-to-date, real-world case studies to create hybrid classes which combine lectures with online resources. The smart classroom pilot has also demonstrated the great potential for online learning. The university’s e-learning program, UI MOOCS, currently has over 750 Massive Open Online Courses (MOOCs) and 175 cascade courses. In the future, it could easily be enhanced with the faculty’s new smart classroom technologies. Another advantage of these products is their eco-friendliness which fits in well with the faculty’s environmental plan. Both the Interactive Display and the Electronic Class Board have built-in light sensor modules. These automatically adjust screen brightness based on the surrounding lighting conditions, saving energy without compromising the clarity of the displays. They are also Energy Star certified, meeting the strict guidelines of the Environmental Protection Agency (EPA). By using Hikvision’s solutions, Universitas Indonesia has strengthened security and started a journey of digital education transformation. The success of the library access control system and the smart classroom pilot is an excellent start for campus-wide implementation. Dr. Neni Susilawati, a lecturer at the Faculty of Fiscal Administration Science, said: “We are dedicated to building a modern and innovative educational environment. With Hikvision’s technological support, we are working together to create a better future for education.” Read More

Read More
Zygal

Zygal Appoints Mike Hurst CPP CPOI as Senior Security Strategist to Lead UK & European Expansion

Zygal, a global company in AI-driven cloud based Video Management Systems (VMS) and monitoring solutions, is pleased to announce the appointment of Mike Hurst CPP CPOI as Senior Security Strategist. This key leadership addition marks a pivotal step in Zygal’s strategic expansion into the United Kingdom and European markets. With an impressive career spanning more than 35 years, Mike Hurst brings extensive expertise in security strategy, market development, and organizational leadership. His appointment reflects Zygal’s commitment to strengthening its international presence and scaling its innovative security solutions across new geographies. Mike has held numerous senior roles in the security industry and is widely recognized for his leadership in both commercial and voluntary capacities. He has served with distinction in global organizations such as ASIS International, The Security Institute, and The International Foundation for Protection Officers (IFPO). He holds prestigious certifications including ASIS Certified Protection Professional (CPP®) and IFPO Certified Protection Officer Instructor (CPOI), among other qualifications. “We are delighted to welcome Mike to the Zygal team,” said Sumanyu Vashishta, Founder and CEO, Zygal, “His deep industry knowledge and proven leadership will be instrumental as we accelerate our entry into the UK and European markets. We are confident that Mike’s strategic insights will significantly contribute to our long-term growth.” In his new role, Mike will collaborate closely with Zygal’s leadership team to develop and execute market entry strategies, forge key partnerships, and guide customer acquisition initiatives. He will also provide strategic input on regulatory compliance, market trends, and competitive positioning to ensure Zygal’s success in the region. “I’m excited to join Zygal at such a transformative time for the company,” said Mike Hurst, “Zygal’s AI-driven platform is redefining how security is delivered and managed. I look forward to contributing to the company’s vision and helping build a strong, sustainable presence in the UK and Europe.” Zygal delivers cutting-edge, cloud-native security and monitoring solutions powered by Agentic AI. The company’s platform enables enterprises to seamlessly connect, manage, and monitor distributed assets in real-time through a unified, intelligent interface. Read More

Read More
Netgear

NETGEAR Delivers on the Next Milestone of its Enterprise Vision with the Acquisition of Exium, Bringing Integrated Networking and Security to Small and Medium Enterprises

Pramod Badjate NETGEAR® Inc., a global player in intelligent networking solutions designed to power extraordinary experiences, recently announced a definitive agreement to acquire Exium, a cybersecurity company, as part of its continuing investment in cloud-based solutions for advanced business connectivity. The acquisition builds on the company’s goal of delivering next-gen networking solutions that provide simplicity, reliability, and cost-effectiveness to small and medium enterprises. Exium’s products and expertise will help to add an integrated Secure Access Service Edge (SASE) platform to NETGEAR’s robust network offering. This solution will offer the first, completely integrated, network and security solution, purpose built for MSPs and SMEs. According to Gartner, the SASE market is expected to grow at a 29% CAGR, reaching over $25 billion by 2027 as organizations increasingly prioritize cloud-based networking and security solutions. With the integration of Exium’s platform and expertise, NETGEAR for Business will build an all-in-one, easy-to-use solution that includes wired and wireless networking as well as firewall and integrated security. “AI has changed the threat landscape for small and medium enterprises as well as larger businesses, but the solutions for SMEs are often too difficult to implement or need to be cobbled onto the network and managed separately,” said Pramod Badjate, President and GM of NETGEAR for Business, “By offering the Exium SASE solution with the goal of integrating it into our Insight cloud management platform, we’ll be able to bring our customers a seamless, single-pane-of-glass solution that is easily deployed and managed by small IT teams or MSPs.” The Exium team brings deep expertise in building widely deployed networking and security solutions. The company’s SASE solution was built with MSPs in mind to help onboard and serve their small and medium enterprise customers rapidly. Exium CEO Farooq Khan will continue to lead the Exium solution, joining the NETGEAR for Business leadership team. “Exium was built from the ground up as a cybersecurity solution to help protect small and medium enterprises that lack a comprehensive solution for combating cybersecurity threats,” said Farooq Khan, CEO, Exium, “We share a similar vision with NETGEAR and are excited to be joining the team to build a fully integrated network and security solution specially tailored to serve the needs of these customers.” The closing of the transaction is subject to customary closing conditions and is expected to occur by the end of Q2 2025. Read More

Read More
Consistent

Consistent Launches Advanced 4G Linkage Cameras for Enhanced Surveillance

Consistent also known as Consistent Infosystems, a leading name in IT hardware and electronic solutions, has unveiled its latest innovation in security technology – the 4G Solar Linkage Mini Pan-Tilt Camera (CT-CM-6MLPT) and the 4G Linkage Mini Pan-Tilt, ATC Camera (CT-CM-4MLPT). Designed to meet modern surveillance needs, these state-of-the-art cameras offer high-resolution visuals, intelligent monitoring, and seamless mobile connectivity. Due to rising security concerns and affordability, businesses and homeowners prefer reliable, Made-in-India surveillance brands such as Consistent Infosystems which comes with easy installation, strong after-sales support, and high-resolution recording for enhanced safety in residential, commercial, and industrial space. The latest 4G Linkage Cameras from Consistent Infosystems redefine home and business security by integrating cutting-edge AI-driven features, remote monitoring, and weather-resistant designs. These innovative cameras are built to provide round-the-clock protection and convenience, making them a must-have for modern security setups. Consistent 4G Solar Linkage Mini Pan-Tilt Camera (CT-CM-6MLPT) Consistent 4G Solar Linkage Mini Pan-Tilt Camera is a high-performance security solution equipped with Dual Intelligent Cameras that ensure comprehensive surveillance. The inclusion of a Solar Panel & Built-in Battery guarantees uninterrupted operation, making it an excellent choice for outdoor monitoring. This model features an impressive 3MP+3MP resolution, providing ultra-clear and sharp visuals. It supports Two-Way Audio Intercom, allowing real-time communication between users and visitors. With Humanoid & Motion Detection, the camera enhances security alerts by identifying movement and distinguishing between humans and other objects. Users can store extensive footage with up to 256GB SD Card Support, ensuring seamless video recording without frequent data overwrites. The camera is IP66 Rated, making it dust and water-resistant for durable performance in all weather conditions. For added security, the device offers Alarm Notification on the app with snapshot functionality, providing instant alerts to users. The Mobile App Monitoring feature allows remote access and control from anywhere, ensuring real-time surveillance. Additionally, the 10X Digital Zoom ensures detailed viewing, making it easier to focus on crucial areas. Consistent 4G Linkage Mini Pan-Tilt, ATC Camera (CT-CM-4MLPT) Consistent 4G Linkage Mini Pan-Tilt, ATC Camera is designed for high-quality security at an affordable price. It comes with Dual Intelligent Cameras that provide enhanced coverage, ensuring a wider field of view for surveillance needs. With a 2MP+2MP resolution, this model delivers clear and crisp visuals for effective monitoring. It also features Two-Way Audio Intercom, allowing users to communicate directly through the camera. Security is further enhanced with Human Detection with Push Notification, ensuring immediate alerts whenever motion is detected. Users can store footage conveniently with up to 256GB SD Card Support, reducing concerns about limited storage. Built to withstand tough conditions, the camera is IP66 Rated, offering superior dust and water resistance. It also features Mobile App Monitoring, allowing seamless remote surveillance and control. Lastly, the 10x Digital Zoom function helps in capturing detailed images from a distance, improving situational awareness. Read More

Read More