securitylinkindia

MassMediaLink India LLP SecurityLink India

Infraon

Infraon Premier League 2025 Brings Cricket, Camaraderie, and Corporate Spirit Together

The Infraon Premier League 2025 – a high-energy celebration of cricket, corporate camaraderie, and competitive excellence – has successfully concluded, marking the end of a remarkable season that brought together talent, teamwork, and the true spirit of sport. Held at the Backyard Sports Club in Gurugram, the tournament saw eight enthusiastic teams from leading organizations across India step onto the pitch – not just to win, but to connect, collaborate, and celebrate the unifying power of cricket. The teams that participated were NEC Corporation (Winners), Airtel (Runners-Up), Dev IT Serv, SISL Infotech, Orbit Techsol, RailTel Corporation, Hitachi System and Niveshan Technologies. From left to right: Randeep Guha, GM, ONGC Ltd., Doman Yadav, Executive Director, Power Grid Corporation of India Limited, Sanjai Kumar, Chairman and Managing Director, RailTel Corporation of India Ltd, NEC Corporation India team captain Harinder Ratra, and from EverestIMS Technologies – Satish Kumar V, CEO, Ramesh Tiwari, Director and Head of Sales, Rohit Garg, Director Sales Government. Throughout the tournament, players demonstrated a perfect balance of professionalism and passion. From nail-biting finishes to breakout individual performances, each match offered something memorable. The level of sportsmanship and the bonds forged during the tournament reflected the core values of Infraon – collaboration, resilience, and excellence. In a gripping final match, NEC Warriors outplayed the formidable Airtel Warriors to emerge as champions of the 2025 edition. Reflecting on the success of the tournament, Satish Kumar V, CEO of EverestIMS Technologies, said, “The Infraon Premier League has been more than just a cricket tournament – it’s a celebration of culture, connection, and corporate spirit. It was heartening to see professionals from different walks of life come together with such energy and enthusiasm. Congratulations to NEC Warriors on a deserving win and to every team that contributed to making this league a true success. At Infraon, we believe that meaningful experiences outside the boardroom are just as important in shaping strong, purpose-driven teams.” EverestIMS Technologies extends its sincere gratitude to the sponsors who made this league possible through their generous support and shared vision – Netpoleon India, Persistent Systems, Infoblox and HEAL Software. They helped turn the tournament into a much-awaited annual celebration of sport, synergy, and success. A special note of appreciation goes to the Infraon organizing team, whose meticulous planning, behind-thescenes coordination, and tireless effort ensured the tournament ran seamlessly from start to finish. From scheduling and logistics to on-ground execution and team engagement, their dedication transformed this league into a world-class experience for everyone involved. With the 2025 edition setting new benchmarks in engagement, participation, and energy, plans are already underway to make next year’s tournament even more spectacular. Until then, we salute every player, team, supporter, and sponsor who made this journey unforgettable. Because at Infraon, we don’t just build technology – we build communities. Read More

Read More

Fortinet Threat Report Reveals Record Surge in Automated Cyberattacks as Adversaries Weaponize AI & Fresh Techniques

FortiGuard Labs 2025 Global Threat Landscape Report highlights a boom in Cybercrime-as-a-Service on the darknet, fueling a lucrative market for credentials, exploits, and access Fortinet®, the global cybersecurity company driving the convergence of networking and security, recently announced the release of the 2025 Global Threat Landscape Report from FortiGuard Labs. The latest annual report is a snapshot of the active threat landscape and trends from 2024, including a comprehensive analysis across all tactics used in cyberattacks, as outlined in the MITRE ATT&CK framework. The data reveals that threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders. “Our latest Global Threat Landscape Report makes one thing clear. Cybercriminals are accelerating their efforts, using AI and automation to operate at unprecedented speed and scale,” said Derek Manky, Chief Security Strategist and Global VP Threat Intelligence, Fortinet FortiGuard Labs, “The traditional security playbook is no longer enough. Organizations must shift to a proactive, intelligence-led defense strategy powered by AI, zero trust, and continuous threat exposure management to stay ahead of today’s rapidly evolving threat landscape.” Key findings from the latest FortiGuard Labs Global Threat Landscape Report include: ● Automated scanning hits record highs as attackers shift left to identify exposed targets early. To capitalize on newfound vulnerabilities, cybercriminals are deploying automated scanning at a global scale. Active scanning in cyberspace reached unprecedented levels in 2024, rising by 16.7% worldwide yearover- year, highlighting a sophisticated and massive collection of information on exposed digital infrastructure. FortiGuard Labs observed billions of scans each month, equating to 36,000 scans per second, revealing an intensified focus on mapping exposed services such as SIP and RDP and OT/IoT protocols like Modbus TCP. ● Darknet marketplaces fuel easy access to neatly packaged exploit kits. In 2024, cybercriminal forums increasingly operated as sophisticated marketplaces for exploit kits, with over 40,000 new vulnerabilities added to the National Vulnerability Database, a 39% rise from 2023. In addition to zero-day vulnerabilities circulating on the darknet, initial access brokers are increasingly offering corporate credentials (20%), RDP access (19%), admin panels (13%), and web shells (12%). Additionally, FortiGuard Labs observed a 500% increase in the past year in logs available from systems compromised by infostealer malware, with 1.7 billion stolen credential records shared in these underground forums. ● AI-powered cybercrime is scaling rapidly. Threat actors are harnessing AI to enhance phishing realism and evading traditional security controls, making cyberattacks more effective and difficult to detect. Tools like FraudGPT, BlackmailerV3, and ElevenLabs are fueling more scalable, believable, and effective campaigns, without the ethical restrictions of publicly available AI tools. ● Targeted attacks on critical sectors intensify. Industries such as manufacturing, healthcare, and financial services continue to experience a surge in tailored cyberattacks, with adversaries deploying sector-specific exploitations. In 2024, the most targeted sectors were manufacturing (17%), business services (11%), construction (9%), and retail (9%). Both nation-state actors and Ransomware-as-a-Service (RaaS) operators concentrated their efforts on these verticals, with the United States bearing the brunt of attacks (61%), followed by the United Kingdom (6%) and Canada (5%). ● Cloud and IoT security risks escalate. Cloud environments continue to be a top target, with adversaries exploiting persistent weaknesses such as open storage buckets, over-permissioned identities, and misconfigured services. In 70% of observed incidents, attackers gained access through logins from unfamiliar geographies, highlighting the critical role of identity monitoring in cloud defense. ● Credentials are the currency of cybercrime. In 2024, cybercriminals shared over 100 billion compromised records on underground forums, a 42% year-overyear spike, driven largely by the rise of “combo lists” containing stolen usernames, passwords, and email addresses. More than half of darknet posts involved leaked databases, enabling attackers to automate credential-stuffing attacks at scale. Well-known groups like BestCombo, BloddyMery, and ValidMail were the most active cybercriminal groups during this time and continue to lower the barrier to entry by packaging and validating these credentials, fueling a surge in account takeovers, financial fraud, and corporate espionage. CISO takeaway: Strengthening cyber defenses against emerging threats Fortinet’s Global Threat Landscape Report provides rich details on the latest attacker tactics and techniques while also delivering prescriptive recommendations and actionable insights. Designed to empower CISOs and security teams, the report offers strategies to counter threat actors before they strike, helping organizations stay ahead of emerging cyberthreats. This year’s report includes a ‘CISO Playbook for Adversary Defense’ that highlights a few strategic areas to focus on: ● Shifting from traditional threat detection to continuous threat exposure management: This proactive approach emphasizes continuous attack surface management, real-world emulation of adversary behavior, risk-based remediation prioritization, and automation of detection and defense responses. Utilizing breach and attack simulation (BAS) tools to regularly assess endpoint, network, and cloud defenses against real-world attack scenarios ensures resilience against lateral movement and exploitation. ● Simulating real-world attacks: Conduct adversary emulation exercises, red and purple teaming, and leverage MITRE ATT&CK to test defenses against threats like ransomware and espionage campaigns. ● Reducing attack surface exposure: Deploy attack surface management (ASM) tools to detect exposed assets, leaked credentials, and exploitable vulnerabilities while continuously monitoring darknet forums for emerging threats. ● Prioritizing high-risk vulnerabilities: Focus remediation efforts on vulnerabilities actively discussed by cybercrime groups, leveraging risk-based prioritization frameworks such as EPSS and CVSS for effective patch management. ● Leveraging dark web intelligence: Monitor darknet marketplaces for emerging ransomware services and track hacktivist coordination efforts to preemptively mitigate threats like DDoS and web defacement attacks. Read More

Read More
CP Plus

CP PLUS Unveils Ingenious & Inventive CTC Technology : Ushering in a New Era of Cyber-Secure Surveillance

CP PLUS, India’s leading security and surveillance brand, has officially launched its groundbreaking CTC Technology – CP PLUS Trusted Core Technology. Engineered with precision, foresight, and the promise of secure innovation, this ingenious and inventive solution addresses the growing global concern over data privacy and cybersecurity in modern surveillance systems. As the world advances toward hyper- connected environments, with smart homes, cloud platforms, and IoT-based systems becoming the norm, the vulnerabilities that come along with these conveniences have increased manifold. Recognizing this crucial shift, CP PLUS has developed CTC Technology as the heart of reliable, resilient, and secure surveillance: designed to fortify every layer of the surveillance ecosystem. CTC Technology is a multi-layered security architecture that brings together the best of cybersecurity practices and technological intelligence. It is not just an enhancement; it is a complete redefinition of how surveillance should function in today’s digital landscape – more intelligent, more secure, and more reliable than ever before. “At its core, CTC stands for CP PLUS Trusted Core Technology, a proprietary advancement developed with one clear mission: to protect surveillance systems from modern cyber threats that are constantly evolving. It safeguards users by addressing all possible touchpoints of vulnerability, including data access, device firmware, system operations, network communication, and even the origin of hardware components. It ensures that every camera, every stream, every piece of footage – and every byte of data – is protected,” added Aditya Khemka, Managing Director, CP PLUS (Aditya Infotech Ltd.). What sets CTC apart is its foundation on six critical pillars of protection, each addressing a key vulnerability area. Cyber Security protects the system from hacking attempts and unauthorized access. Operational Security ensures there are no disruptions or system failures caused by malicious interference. Network Security shields data transmission channels to prevent breaches. Data Security secures all recorded footage using high-grade encryption, making it unreadable to unauthorized users. Application Security ensures that the software running the devices is robust and shielded against exploits. And lastly, Critical Component Security safeguards the hardware and firmware – the physical and digital backbone of every device – from tampering or counterfeiting. CP PLUS, India’s leading security and surveillance brand, has officially launched its groundbreaking CTC Technology – CP PLUS Trusted Core Technology. Engineered with precision, foresight, and the promise of secure innovation, this ingenious and inventive solution addresses the growing global concern over data privacy and cybersecurity in modern surveillance systems But CTC doesn’t stop there. It incorporates a host of advanced security measures, making it one of the most comprehensive surveillance security platforms available today. 1. Enterprise-Grade Security CTC ensures your surveillance system starts securely and stays protected with the latest encryption and authentication mechanisms. 2. Secure Boot: Verified from Power– On CTC verifies firmware integrity from the moment the device powers on – no chance for malicious code injection. 3. Strong Cryptography with AES- 256 CTC employs the latest AES-256 encryption standard, safeguarding data transmission and storage at all times. 4. Tamper-Proof Communication CTC secures all data in transit with encrypted channels, ensuring protection against man-in-the-middle attacks. 5. Trusted Core = Trusted Surveillance CTC builds trust at the core, enabling organizations to meet compliance needs like OWASP, IoTSCS ER, and more. The system is also resilient against side-channel attacks, a sophisticated form of cyberattack that exploits indirect leaks like electromagnetic emissions or power consumption. CTC has been specifically engineered to resist such vulnerabilities with advanced hardware-level security. Backing the technological depth of CTC is a stamp of validation that speaks volumes. Our CTC-powered cameras are STQC Certified, aligning with India’s stringent cybersecurity and quality assurance standards. This certification reinforces the credibility and reliability of CTC-enabled solutions and showcases CP PLUS’s dedication to developing indigenized, Made-in-Bharat innovations that meet global benchmarks. In simpler terms, CTC Technology ensures that your surveillance system is protected: always. Whether it is the camera you have installed in your home, a large-scale deployment in a city surveillance project, or critical systems in financial, healthcare, or industrial sectors, CTC ensures that your data remains your own and your systems remain resilient against all cyber threats. At its core, CTC stands for CP PLUS Trusted Core Technology, a proprietary advancement developed with one clear mission: to protect surveillance systems from modern cyber threats that are constantly evolving. It safeguards users by addressing all possible touchpoints of vulnerability, including data access, device firmware, system operations, network communication, and even the origin of hardware components. It ensures that every camera, every stream, every piece of footage – and every byte of data – is protected Aditya KhemkaManaging Director,CP PLUS (Aditya Infotech Ltd.). With this launch, CP PLUS has once again demonstrated its ability to lead the industry not just in innovation, but in responsible and secure innovation. CTC Technology is not just a new feature, it is a new philosophy, one that believes surveillance should be about more than just watching; it should be about protecting, not just physical spaces, but digital sanctity too. The future of secure surveillance is here. Its name is CTC. And it is proudly brought to you by CP PLUS. Read More

Read More
CP Plus

CP PLUS Reveals Inspiring New Corporate Video

“Humne Bharat Ko Bante Dekha Hai”A Tribute to India’s Journey and Trust in Innovation CP PLUS, India’s leading surveillance and security brand, proudly reveals its latest corporate video titled “Humne Bharat Ko Bante Dekha Hai. Humne Bharat Mein Bante Dekha Hai. CP PLUS – Humne Bharat ka Kal, Aaj Aur Kal Dekha Hai!” – a stirring narrative that celebrates the spirit of a rising Bharat and the brand’s deep-rooted commitment to its growth story. The film is not just a visual showcase of technological prowess; it’s a tribute to the billion dreams that shape the nation. It reflects how CP PLUS, with every innovation and every milestone, has stood shoulder to shoulder with the aspirations of a new India – a Bharat that dreams, dares, and does. At the heart of this powerful message lies a simple truth – Your trust fuels our journey. Every product developed, every solution deployed, and every milestone achieved by CP PLUS carries within it the collective hopes of a country on the move. The corporate video beautifully encapsulates this sentiment, weaving together powerful imagery, emotion, and a message of shared progress. “Through every innovation we craft, every solution we design, and every promise we uphold, we carry the collective aspirations of a nation. At CP PLUS, your trust is more than a foundation, it’s a force. Because when you trust us, we don’t just deliver products, we deliver a commitment,” said Aditya Khemka, Managing Director, CP PLUS. The new corporate film is a resounding affirmation of CP PLUS’ steadfast dedication to innovation, nation-building, and customer-centricity. It reminds viewers that CP PLUS isn’t just witnessing India’s future, it’s actively shaping it. Read More

Read More

Hikvision India Introduces Smart Swing Barriers and Turnstiles with ‘All-in-One’ Flexible Solutions

Hikvision India has introduced the latest Smart Swing Barriers and Turnstiles for flexible entrance solutions for faster access. These entrance solutions offer advanced features and integrate many functions seamlessly as an All-in-One solution. Empowered by Hikvision’s self-developed motor control algorithms, access control technology, and intercom technologies, Hikvision speed gates and turnstiles offer a diversified product portfolio with impeccable quality, stability and durability, catering to the needs of various scenarios. These Smart Turnstiles and Smart Swing Barriers are crafted with modern and sleek industrial design. Future-proof design delivers safer and more comfortable user experience with faster access and aesthetic pleasure, perfectly integrating into diverse application scenarios. They offer flexible solutions for any scenario. A variety of products offers flexible combination of multiple authentication methods. When combined with built-in access controllers, users will enjoy one-stop entrance solution. Easy set of passenger passing mode The capability of customizing single or dual-way passing mode for different periods, as well as flexible set easy/ strict mode satisfies varied security level in different scenarios. Enhanced ease-of-use from installation to configuration Installation is simplified, requiring only one network cable and one power cable. The user-friendly configuration allows quick adjustments via a LAN interface or NFC tags on Android mobile devices. Impeccable stability and durability Empowered by industry-leading motor control algorithms, Hikvision’s Swing Barriers and turnstiles offer the best-in-class quality with extended lifespan. All products will undergo a number of tests at the Hikvision Test Center, including rain test, packaging vibration test, high and low temperature test and salt mist corrosion test. Third-party integration & great extensibility Featuring easy integration with third-party software and hardware such as access controller, users can flexibly realize visitor and flow management. Product Highlights Hikvision’s Smart Swing Barrier DS-K6B360 TX Series is equipped with smart security solutions and sleek design. It has single-sided dToF sensor and high lifetime servo motor. It is compatible with multiple authentication methods. Hikvision’s Smart Turnstile DS-K3B 961TX Series has a sleek and slender design to suit any interior. It is compatible with multiple authentication methods. The other features include easy installation and touch free access. Application scenarios: While Swing Barriers offer a fluid walk-through experience and flexible access control. Turnstiles act as a powerful deterrent against tailgating and unauthorized entry. The key application scenarios for speed gates and turnstile across verticals include corporate office buildings, schools and education institutions, manufacturing facilities and factories, banks and financial institutions, airports, seaports, metro rail and other railway stations.

Read More

5Tattva Wins ‘Best Cybersecurity Consulting Award’ at CSG Awards 2025 in Dubai

5Tattva, a leading provider of cybersecurity solutions and managed security services, has announced that it has been honored with the prestigious ‘Best Cybersecurity Consulting Award’ at the CSG Awards 2025, held in Dubai. This award celebrates 5Tattva’s outstanding leadership, strategic vision, and relentless commitment to advancing the digital security landscape across global markets. With cyber threats escalating at an alarming rate, the need for robust cybersecurity leadership has never been greater. The CSG Awards is an exclusive initiative dedicated to recognizing and honoring top cybersecurity leaders and CISOs who have played a pivotal role in protecting enterprises against cyberattacks. As a recipient of this year’s top honor, 5Tattva stands as a testament to the power of innovation, proactive defense, and deep-rooted industry expertise in the cybersecurity space. “This recognition is a proud milestone for our entire team. Today Cybersecurity is no longer just an IT concern – it’s a critical business priority,” said Atul Luthra, Co-Founder of 5Tattva and CEO of Zeroday Ops, “This award reaffirms our mission to provide strategic, future-ready security solutions that empower organizations to navigate today’s complex threat landscape with confidence.” 5Tattva has been at the forefront of cybersecurity consulting and compliance, delivering state-of-the-art solutions tailored to enterprise needs. This recognition underscores the company’s dedication to a customer-centric approach, innovation-led growth, and excellence in implementation – backed by a team of highly skilled professionals driving tangible impact across industries. “This win is really about the people – our teams, our clients, our partners,” added Manpreet Singh, Co-Founder & Principal Consultant at 5Tattva and CEO of Zeroday Ops, “Our goal has always been simple – to bring clarity, confidence, and control back to our clients in a complex digital world.” In a significant strategic move earlier this year, 5Tattva acquired a major stake in Zeroday Ops Private Limited – a renowned cybersecurity firm known for its advanced threat detection and prevention capabilities. This acquisition merges 5Tattva’s robust compliance and managed security portfolio with Zeroday Ops’ offensive and defensive cybersecurity prowess, resulting in a comprehensive security ecosystem tailored for enterprises across India and international markets.

Read More
CP Plus

STQC-Certifified Security Innovations for the New Bharat

Aditya Khemkha In a defining move that signals the rise of a more secure, self-reliant, and quality-assured surveillance ecosystem, the Ministry of Electronics and Information Technology (MeitY) has introduced a new compliance requirement for the CCTV industry in India. As per the official gazette notification dated April 9, 2024, MeitY has made STQC certification mandatory for all CCTV cameras – whether manufactured, imported, or sold across the country. This change falls under the updated Electronics and Information Technology Goods (Compulsory Registration) Order, 2021, and mandates compliance with Essential Requirements (ERs) and BIS certification (IS 13252 Part 1). All non-compliant models will be barred from sale or distribution post April 9, 2025. The decision marks a pivotal shift in India’s approach toward surveillance technology, one that reinforces national security, data privacy, cybersecurity resilience, and consumer trust. Understanding STQC: The new quality gatekeeper for CCTV Standardisation Testing and Quality Certification (STQC) is a set of quality assurance frameworks developed by MeitY. STQC focuses on rigorous technical validation to ensure electronics, especially security and surveillance equipment, meet defined standards of safety, reliability, and performance. It goes beyond functional efficiency and delves deep into the core of cybersecurity, hardware resilience, and data protection protocols. STQC certification for CCTV cameras demands comprehensive testing of encryption mechanisms, firmware integrity, secure communication protocols, and physical robustness, setting a new benchmark for surveillance products in India. Key provisions of the mandate ● Universal Applicability: All analog, IP, and speed dome cameras must obtain STQC certification under IS 13252-1 (IEC 60950-1) standard. ● Cybersecurity by Design: Every certified product must comply with stringent ERs, including:• Secure communication via TLS/ HTTPS. • Enforcement of strong, unique passwords. • Disabling of debugging/ test ports in shipped devices. • Uniformity in firmware versioning and patch management ● Tamper-Resistance & Physical Security: • Devices must feature secure enclosures • Physical ports must be access-controlled or locked • External interfaces must be designed to deter unauthorized access ● Certification Deadline: Effective from April 9, 2025, all non-certified models will: • Be removed from the BIS license databases • Be ineligible for new model approvals • Face prohibition from manufacturing, sales, or imports within India A boost for Atmanirbhar Bharat & indigenous innovation The STQC mandate is not just a regulatory milestone; it is a strategic enabler of India’s ‘Atmanirbhar Bharat’ vision. By enforcing stringent quality and cybersecurity parameters within the national ecosystem, the regulation actively discourages substandard, foreign-dumped products and opens new doors for domestic manufacturers and indigenous innovations. For Indian brands, the path forward is not just about compliance, but about leading with conviction, capability, and country-first commitment. CP PLUS: At the forefront of India’s secure surveillance revolution India’s leading surveillance brand, CP PLUS, has long believed that surveillance is not just about watching –it’s about protecting, preventing, and preserving. With a well-established ecosystem of design, development, and manufacturing facilities in India, CP PLUS is uniquely positioned to meet and exceed STQC standards. Having already invested significantly in R&D, firmware security frameworks, and hardware hardening protocols, CP PLUS is fully equipped to align its product portfolio, including IP cameras, analog cameras, PTZ solutions, and smart edge devices, with the new STQC requirements. From encryption standards embedded into every transmission to physical designs engineered for tamper resistance, CP PLUS products are built with a vision to offer trustworthy, high-integrity surveillance for every Indian household, institution, enterprise, and government body. This proactive compliance readiness, backed by decades of market leadership, positions CP PLUS not just as a manufacturer but as a national partner in security sovereignty. Impact on the surveillance ecosystem The introduction of STQC compliance brings with it significant ramifications, some challenging, but many promising, for the surveillance industry at large: Enhanced Security and Trust: With encrypted data transfers, consistent firmware, and tamper-proof designs becoming mandatory, consumers and institutions can trust their surveillance systems like never before. Operational Challenges for Some Manufacturers: The path to compliance is not without its hurdles. From obtaining testing approvals to updating legacy firmware, and from redesigning physical components to aligning supply chains, the industry must prepare for transformation at all levels. Supply Chain Realignment: Manufacturers relying on imported, non-compliant components may face disruptions. India-based supply chains, however, will benefit from renewed focus and investments. A Rise in Standardization and Benchmarking: The move encourages surveillance systems to be assessed on standardized parameters – enabling fair comparison, consistent performance expectations, and better buyer awareness. The way forward: Standardised, secure & sovereign India’s move to mandate STQC certification for CCTV cameras is more than regulatory enforcement, it is a declaration of security independence and consumer dignity. In an age where surveillance systems can be the first line of defense against everything from local crime to cyber intrusion, ensuring that every device is secure by design is not just prudent, it is essential. By championing this regulation, MeitY has created a model for proactive, pre-emptive cybersecurity governance, one that puts India in the global spotlight as a nation where digital trust is engineered into every device. And with brands like CP PLUS leading the way, the future of surveillance in India looks indigenized, intelligent, and impregnable. Read More

Read More

MAJOR CONSIDERATIONS IN PLANNING A SECURITY SYSTEM

By Milind BorkarMD, Systematica Suyog Security Consultants(Sr. Consultant & Security Expert) As technology evolves very fast from year to year, it becomes a challenging task to determine the requirements to build a secure, robust and almost fool proof system that will fulfill all basic security parameters. These parameters will vary for each new system as the same parameters cannot be applied across the board for all systems. A robust system that meets the security requirements for any new and or green field project, the following points will drive the decision-making process. We will use a CCTV system as an example As one can see there are several factors that influence the decision-making process in building a security system. We will briefly go over each one of them in the following sections Budget and time available As in any and every sphere of life the available budget is the key factor. Based on the available budget and time available, a determined effort needs to be put in place to first build a project specific requirements document. Several trade-offs will need to be considered if the project requirements cost exceeds the available budget. This could be an iterative process that will consume time and money in the planning phase. Each new or green field project or an update/ refresh cycle of an existing deployment must go through this elaboration process to avoid nasty surprises in the implementation/ build phase. Site survey Conducting a site survey is the basis of building a security system. This phase is the most critical where a thorough site survey is conducted to determine security vulnerabilities. Along with this a determination needs to be made as to what other systems are required to complement the main CCTV system. The illustrative airport diagram should give a very good idea of the other security components that need to be explored. Once this information is gathered and documented, then this information becomes the driving force for subsequent phases of the project. We will use the following diagram to highlight all the components that constitute a surveillance/ security system. We have used an airport as a used case. A typical airport is a super-set of any security deployment The best way to illustrate the process of building a security system is through an example. We are using an airport as an example as it has a super-set of inputs that can be applied to any security system design. The following color-coded table is used to distinguish the various inputs/ requirements received from the customer. The following table is a standard template that can be used to capture security requirements. These inputs are used to design the entire security system which can then be used to calculate the cost of the implementation. Using the above inputs from the customer and the respective BOQs for each airport, a complete design can be derived. The following table shows the output of the design process for 24 airports. Each airport has the same security requirements but BOQs are different Once the design is completed to a 90% level of the target specification, the budgetary process can be started. Several vendors, RFQs etc. will be involved to go through an iterative process. This process will vary for each geographical region and must be considered. Without going into the details that vary for different geographical regions the important point to consider is the vendor selection process as it has a significant impact on the quality, robustness and overall cost of the system. Customers desirous of building a security system can engage subject matter experienced consultants who can guide and evaluate all the variables/ entities in the decision-making process. Cost optimization through simulation A security system design, implementation and build out are a complex system with many sub-systems that need to work with each other flawlessly. Every care must be taken in the early phases of the project as many variables are involved which can have a significant impact on the overall cost. One of the ways to help this process is to run a simulation based on the customer inputs. Through experience the ‘SYSTEMATICA SUYOG SECURITY CONSULTANTS’ has determined the following: ● The customer knows what he wants but does not know how to get there. ● Almost all vendors over sell their products and services which do not benefit the customer in any way. ● A consultant is required in all cases to systematically guide and evaluate all the options available to provide the highest performance at the lowest cost to the customer. The SYSTEMATICA SUYOG SECURITY CONSULTANTS provides consulting services through all phases of the project. They have built a proprietary ‘Design Engine’ as well as a proprietary ‘Simulation Engine’ through years of experience dealing with customers and their security requirements. We at SYSTEMATICA SUYOG SECURITY CONSULTANTS always put the customer FIRST and provide professional consultancy services. We will now go through a simulation for one of 24 airports. We will show how our simulator determines the highest performance at the lowest cost. The following graph illustrates this. The X-Axis shows the percentage of cameras running video analytics (VA). The Y-AXIS shows the cost in a standardized format. The DELTA between the lowest cost and the highest cost is 3X. VA stands for Video Analytics; VMS stands for Video Management Software. The GREEN line is the overall COST with the other colored lines that sum up to the overall GREEN line cost. Impact of Cost of Running Video Analytics for 24 airports ● Percentage of cameras running Video Analytics is the only single tactor that influences overall CCTV system design and hence overall Cost. ● Can Apply same Design Template across all airports as far as Video Analytics is concerned. ● Each Airport has unique characteristics because of different BOQ camera quantities and functionality grouping of cameras. ● If one uses a Single Design Template per airport then we run the risk of under served or over served airports unless a thorugh analysis is done….

Read More

Synology Unveils C2 Surveillance forScalable and Reliable Cloud Monitoring

Synology recently introduced C2 Surveillance, a new Video Surveillance as a Service (VSaaS) solution designed to provide a server-less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. “Our goal has always been to build a comprehensive surveillance ecosystem that enables seamless integration and management for our customers,” said Josh Lin, Director of Synology’s Surveillance Group, “With the addition of C2 Surveillance, customers now have the flexibility to deploy their surveillance solutions entirely on-premises or in the cloud, depending on their unique requirements.” C2 Surveillance is built to simplify surveillance deployment and management, especially for multi-site operations. With no device license requirements, users can add cameras without worrying about additional costs or constraints. Key highlights of C2 Surveillance include: C2 Surveillance is Synology’s new Video Surveillance as a Service (VSaaS) solution designed to provide a server-less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. Effortless setup C2 Surveillance is built with ease of deployment and management at its core. The setup process is designed to be completed within minutes even on mobile devices. Benefit from its intuitive installation experience, administrators can quickly bring new sites online without any specialized training, making it highly accessible for businesses of all sizes. Advanced AI-powered detection tasks can also be configured easily through the user-friendly Synology interface, ensuring both accessibility and powerful functionality in just a few clicks. Continuity-first architecture C2 Surveillance is designed with a continuity-first architecture, ensuring uninterrupted recording even in the event of network disruptions. All footage is edge recorded to microSD cards, with the option to back up recordings to the C2 Cloud for extra protection. Additionally, C2 Surveillance supports failover offline mode, enabling local monitoring even when disconnected from the internet. To safeguard sensitive footage and user access, the system incorporates AES-128 encryption, multi-factor authentication, and granular permission settings, and adheres to industry-leading compliance standards including ISO 27001, SOC 2 Type II, and NDAA. Smart scalability To support organizations operating across multiple locations, C2 Surveillance leverages cloud infrastructure to centrally manage cameras across sites. With seamless integration with Windows Active Directory, it enables centralized identity and access management. Role-based access control allows administrators to easily delegate specific permissions across teams or locations. In addition, C2 Surveillance supports low bandwidth mode to reduce bandwidth consumption by up to 50% with minimal impact on video quality, making it ideal for environments with bandwidth constraints. C2 Surveillance leverages cloud infrastructure to enable customers centrally manage cameras across sites. Availability C2 Surveillance will be available later this year. For the latest updates, please visit the official Synology website.

Read More

ICISSM 2nd Annual Seminar

16 May 2025 The International Council for Industrial Security, Safety and Management (ICISSM) hosted its 2nd Annual Seminar on 16 May 2025 at the Institute of Social Sciences, New Delhi, on the theme – ‘Navigating the Evolving Threat Landscape and Climate Change.’ The event brought together national security leaders, industrial experts, and tech innovators for a day of in-depth discussion, critical analysis, and solution-driven collaboration. The seminar commenced with ceremonial lamp lighting by Lt. Gen. Sudhir Sharma, Col. D.R. Semwal, Maj. Gen. Vikram Singh, Col. Sanjay Srivastava, and Capt. Manoj Kumar, followed by a welcome address from Maj. Gen. Vikram Singh, Chairman, ICISSM. He set the tone by emphasizing the urgency of industrial security transformation amidst climate change and geopolitical instability. Delivering the Inaugural Address, Lt. Gen. Sudhir Sharma, Chairman, MitKat Advisory, explored the unsettling volatility of today’s geopolitical order. “Rules are chains for the weak, tools for the strong,” he declared, critiquing the collapsing global consensus and the rise of right-wing nationalism, resource competition, and technological warfare. He underscored the need for ‘strategic autonomy’ and industrial resilience through reliable supply chains and technology leadership. The first Keynote Address by Saurabh Tolumbia, IPS, Security Advisor at GAIL, delved into the security of critical infrastructure. He highlighted that while external threats remain visible, internal vulnerabilities such as insider sabotage, cyber gaps, and undertrained personnel pose equal – if not greater – risks. “Security,” he said, “is like salt – only noticed when it’s missing.” DigiSuraksha, a platinum sponsor, showcased a transformative facial authentication system designed to replace outdated ID-based security. “Your face is your identity,” said Co-creator Ram Kunchur, demonstrating how encrypted QR codes could enhance access control with zero server dependency. Panel Discussion 1 on AI, Machine Learning & Deepfakes featured Dr. Alok Vijayant, Santosh Pathak, Avanish Pathak, and Roshan Baberwal. Discussions covered the misuse of generative AI in misinformation campaigns, vulnerabilities in unstructured datasets, and the urgent need for AI literacy across security forces. Panel 2, moderated by Dr. (Prof.) Rajiv Mathur, focused on Cyber-Physical Threats in industrial environments. The panellists were Rekha Gairola (Adobe), Lt. Col. Sandeep Mohapatra (MMTC PAMP), Maj Ranjen Bhatia (PNB), and Ankit Sabharwal (Control Risks) – and they emphasized that cyber breaches are increasingly tied to human oversight and lax protocols. “Gone are the days when CSOs and CISOs worked in silos,” noted Maj. Ranjen Bhatia. A fireside chat between Dr. Surabhi Pandey and Sumit Behl (Sparsh CCTV) unpacked how businesses must adapt to constant tech disruption. This was followed by Sparsh CCTV’s product presentation, emphasizing indigenous solutions for industrial surveillance. Post-lunch, Panel 3 addressed ESG and the Changing Risk Landscape, moderated by Cdr. Sandeep Sinha. Experts like Gp. Capt. (Dr.) S. N. Mishra, Vishnu Chandra, and Col. Abhijit Singh stressed the integration of climate, social governance, and cyber frameworks into enterprise risk strategy. “Climate is no longer an environmental issue – it’s a security one,” observed Col. Singh. The final Panel Discussion explored whether Drones are a Boon or Bane for industrial security. Moderated by Anil Dhawan, it featured insights from Col. S.A. Rodrigues (Idea Forge), Capt. Allroy Collaco (CAPSI), and Manan Batra (360PSA). The panel advocated for drone adoption in surveillance, response, and infrastructure monitoring – balanced by anti-drone measures and regulatory clarity. Col. (Prof.) Sanjay Srivastava, in his keynote, urged security professionals to become proactive agents in climate resilience, disaster mitigation, and urban risk reduction. “Security teams must lead – not just respond,” he urged. Another key highlight of the seminar was the signing of the MoU between ICISSM and Veena Gupta to jointly offer an Executive Protection training program. Closing the day, Col. D.R. Semwal delivered the final keynote, sharing best practices in industrial security management. He reinforced the importance of convergence between physical and cyber strategies, continuous learning, and integrated crisis response frameworks. The seminar concluded with Capt. Manoj Kumar’s vote of thanks, highlighting ICISSM’s commitment to evolving security landscapes with agility, collaboration, and purpose. The event was supported by Platinum Sponsors – Sparsh CCTV & DigiSuraksha, Silver Sponsors – CISS & TechnoPurple, Event Partner – CROPC, Media Partners – SecurityLinkIndia & SECURITY TODAY, and Knowledge Partner – MIGS Consulting.

Read More