securitylinkindia

MassMediaLink India LLP SecurityLink India

Honeywell Cyber Security & IP Video Surveillance 2017

Analog video solutions rely on outdated technology. These systems have made way for more secure, IP-based video surveillance systems to provide reliable and cost-efficient solutions in today’s information-rich, digital world. Modern IP technology can enable effective and manageable video surveillance to protect people, their information and their properties, and help ensure continuous operation. It can also create the potential for enhanced safety and security benefits for our society to prevent costly security incidents. However, the cyber security of IP technology has been challenged by the pace of technology transition and development, creating potential safety and economic risks. Cyber-attacks at the local and global scale are on the rise, and according to a 2016 report published by Grant Thornton, the total estimated global financial loss associated with cyber security attacks is estimated to be U.S. $315 billion each year. One example of a major cyber-attack occurred in the U.S. in October of 2016 where Internet access was denied to many major websites including Twitter, The Guardian, and CNN. This attack, which was the largest of its kind at that time, was conducted by a botnet virus called ‘Mirai’ from infected Internet Protocol (IP) video devices on the internet. Threat and vulnerability The importance of cyber security in the IP environment is widely recognized. It requires protecting devices, networks, programs, and data from being copied, changed, or destroyed by unintended or unauthorized access. Since video surveillance products such as IP cameras, network video recorders (NVRs), and video management software (VMS) are IP-enabled, they can be accessed from a remote location using internet connectivity, which means they have the same vulnerabilities as other devices and systems in the open IP world. The U.S. National Strategy to Secure Cyberspace is a report that outlines a five-level threat and vulnerability model, including home/ small business, large enterprise, sector/ infrastructure, national, and global categories. In the report, the U.S. government expresses concerns about: The network devices used to attack critical infrastructures; Large-scale enterprises being increasingly targeted by malicious cyber actors, both for the data and the power they possess; and The fact that cyber vulnerabilities could directly affect the operations of a whole sector or infrastructure. Not only has cybercrime caused significant interruptions for businesses and negatively impacted infrastructure in recent years, but it has also led to large-scale data breaches. According to PwC’s Global Economic Crime Survey 2016, the risk of cybercrime was the second most reported type of economic crime affecting 32% of organizations in 2016. Furthermore, the average cost of a data breach to organizations is $4 million, up from $3.8 million in 2015. Many countries and international organizations have been working on data-protection legislation, national standards, and regulations in most sectors. These regulatory initiatives will help reduce vulnerabilities and clarify questions of liability. Business interruption Business interruption is a type of cybercrime that is usually launched by inserting malicious code on a company or infrastructure network, which limits the network’s ability to provide service and inhibits a company’s ability to conduct business. Malicious code, or ‘malware,’ comprised of viruses, worms, botnets etc., which can be injected into IP devices with weak points, propagate itself to seek more victims on the network and steal sensitive information for the purpose of economic benefit. A botnet, short for ‘robot network,’ is an aggregation of computers compromised by bots (automated machines or robots). These bots are controlled by malicious cyber actors by launching Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks to targeted critical infrastructures or enterprises. DoS and DDoS pose a serious threat to business service. In June 2015, hackers grounded ten planes belonging to a Polish airline and blocked flight plans sent to planes by launching a DoS attack. The Mirai attack mentioned earlier is also an example of a DDoS attack. Data breach The video system is the core of a security system and contains critical information including system data, deployment, event and alarm information. When this data is compromised it’s called a data breach and this crime can cause significant security and safety risks Video surveillance in private and public applications may capture and record video images of people not relevant to security and safety incidents. Many countries are working toward privacy-protection legislation to prevent privacy breaches by intruders and inside employees. For example, in the U.S., 47 states have breach-notification laws in effect and in Ireland, it is illegal to post video surveillance footage on the internet. Compliance and liability With cyber legislation, national standards and sector regulations in place, regulatory compliance becomes a rigid entrance requirement for IP systems including video surveillance. It impacts the framework for product design, sales, industry entrance, system integration, and user operation. Meanwhile, there is also a market trend of increased cyber insurance sales spurred by the awareness of broader cyber risks. A vulnerable system will be forced to upgrade or be replaced for regulatory compliance, or the customer will have to pay a much higher premium to cover the liability every year. This is why Honeywell is committed to providing a forward-looking, cyber-secure video solution for its partners and customers. Honeywell cyber security solution any businesses haven’t conducted a cyber-threat analysis and don’t know how vulnerable they are to cyber threats. Honeywell can help by analyzing customers’ problems, then implementing best practices to execute optimal product and system design. Honeywell has also developed cyber-security management processes and released vulnerability reporting policies to help its customers face a growing cyber-security challenge. Rigorous system hardening At the product and system design and development phases, Honeywell uses in-house and third-party testing tools to evaluate product vulnerabilities and fix issues to harden the system. To mitigate the risks associated with malicious code, data privacy breaches and system mis-configuration, Honeywell employs the Information Communication Technology (ICT) industry’s security guidelines, which addresses specific video surveillance requirements.   Since IP video surveillance can be installed in both private and public networks the exposed cyber threat can vary accordingly. It is necessary to target system hardening according to…

Read More

Global Port Security Spend Boosted by Port Upgrades and New Terminal Developments

(Frost & Sullivan) With 90 per cent of global trade being carried out by the shipping industry, port security is of paramount importance. As vessel traffic continues to increase, the infrastructure will need to be developed. While a number of ports are in the process of digitising their operations to drive efficiencies and expand capacity, new ports, port upgrades, and new terminal developments will be the major drivers of security spending. Frost & Sullivan’s research, Global Port Security Market, Forecast to 2023, analyses market trends, drivers, restraints and key technologies globally. Regional trends, including key projects and investments, are also discussed. The study focuses on the land-side security of ports including surveillance, perimeter security, command and control, cybersecurity, screening and detection. “Persisting threats concerning the illegal movement of individuals, weapons, drugs, and other illicit materials are driving ongoing efforts to enhance port security technology deployments,” said Frost & Sullivan Security Analyst Rakesh Vishwanath, “New technologies and solutions, including unmanned aerial vehicles, are gaining traction with ongoing pilots and use cases.” Strategic imperatives for success in the evolving port security market include: The development of innovative cyber-resilient technologies that proactively counter constantly evolving cyber threats; Developing strategic partnerships with niche cyber-security suppliers; Positioning cybersecurity at the core of an offering to address growing challenges in an increased threat landscape; and Developing solutions that are easy to understand with actionable intelligence and seamless integration with existing architecture. “The ‘digital port’ will be a critical issue by 2023. Demand for cyber solutions that better protect networks will grow,” noted Vishwanath, “Software requirements for screening equipment and integration of this into the overall port security environment will increase across regions as well.”  

Read More

ONVIF Hosts Annual 2017 Member Webinar

ONVIF, the leading global standardization initiative for IP-based physical security products has recently hosted its annual membership meeting providing an update to members on the accomplishments of ONVIF in 2017 and its outlook for the year ahead. Attendees heard presentations on the final release of Profile A in 2017 and the ongoing development of Profile T for advanced video streaming, activities which are enabling the growing prevalence of the nearly 9,000 ONVIF conformant products in bid and specification processes in projects around the world. In the webinar’s opening remarks, ONVIF Steering Committee Chairman PerBjörkdahl highlighted collective achievements of ONVIF since its founding in 2008, including the continued inclusion of ONVIF in international standards from organizations such as the International Electrotechnical Commission (IEC), on its IEC TC 79 standard for video surveillance and physical access control standards. Björkdahl also cited the progress of ONVIF on a system-to-system approach for interoperability between various management systems, work which is happening in tandem with continued development of additional profiles to keep pace with the changes of the industry. Björkdahl also recognized the extensive contributions of three individuals to various ONVIF technical committees. Arsenio Vilallonga, vice president, Networked Systems, FLIR Systems, Inc. and Nicholas Brochu of Genetec, one of the most active participants in the development of Profile T, were recipients of the 2017 ONVIF Award, which recognizes individuals and companies who have made significant contributions to ONVIF. Sriram Prasad Bhetanabottla of Canon Inc., was recognized with the 2017 ONVIF Distinguished Service Award for his role as an active, contributing core member to the Device Testing activities of the Technical Services Working Group’s and Profile T. Hans Busch of Bosch, Chairman of the ONVIF Technical Committee, spoke to members about the specification development roadmap and its alignment to the standardization activities within the IEC TC 79 working groups for video surveillance and physical access control standards. Technical Services Committee (TSC) Chair Andreas Schneider of Sony gave an overview of the committee’s work on profiles, test tools, the conformance process and Developers’ Plugfests, and highlighted the new conformant product database launched earlier this year. ONVIF Communication Committee Chair Jonathan Lewit of Pelco by Schneider Electric followed the TSC with a recap of the internal and external communications of ONVIF in 2017, activities designed to promote the adoption of ONVIF Profiles.

Read More

China Acknowledges Indian PSI Stalwarts

Iqbal Singh Jagdeva, Managing Director, Turbo Consultancy Services Pvt. Ltd. and Anil Dhawan, Managing Director, DB Secure Solution Private Limited, the eminent security professionals of Indian homeland security industry were invited as the special guest of owner for the China Public Security Expo (CPSE 2017) held from 29 October to 1 November 2017 at the Shenzhen Convention and Exhibition Center, China. The forum also saw the 5th Global Security Industry Alliance’s ‘Gold Shield Award’ ceremony that was conducted alongside the Expo. The industry gold standard award recognizes the significant contributions that enrich the global security industry. The Gold Shield Award is presented to individuals, companies, and trade organizations for their dedication and unfaltering support to the responsible growth of the global security community. Nominees are evaluated and reviewed by a committee of global security industry trade association professionals on the basis of their contributions to the global security community over the past 10 years. This year the committee selected 11 nominees, from a slate of 50, and Iqbal Singh Jagdeva presented the 5th GSIA Gold Shield Award to the winners. It was a moment of great national pride watching Mr. Jagdeva giving out Awards in front of a Global Forum with representatives from USA, Russia, UK, Netherland, China, Bangladesh, Nepal, Philippines, Singapore, Thailand, Malaysia and Japan – Anil Dhawan Managing Director, DB Secure Solution Private Limited

Read More

Matrix Secures Hinduja Hospital

Increases everyday efficiency with Matrix video surveillance solution Hinduja hospital is an ultramodern, multi-speciality tertiary care hospital with a Medical Research Centre (MRC) in collaboration with Massachusetts General Hospital (MGH), Boston, USA. The hospital has an inpatient capacity of 342 beds, inclusive of 53 critical care beds in different specialities. It was the first multi-disciplinary tertiary care hospital to have been awarded the prestigious ISO 9002 certification from KEMA of Netherlands for quality management system. Challenges Hinduja was in use of Axis video surveillance systems which they wanted to upgrade to the latest technology surveillance solution without having to replace the existing cameras, to save investments. For centralized monitoring of multiple cameras from different devices, their existing system used a dedicated server which was complex to manage. Hence, they required a solution, which could eliminate the need of this dedicated server. Besides, they required to store camera recordings for three months as an evidential proof for audit and investigation, which the existing system could do at very high storage costs. Matrix offerings In the first instance, Matrix with the help of its intensive R&D team, was able to successfully add all of Hinduja’s existing Axis cameras to Matrix NVRs. Cascading feature of Matrix NVRs helped them connect all NVRs in a master-slave architecture which enabled centrally monitoring all 73 cameras from different NVRs, without any server. In order to address their storage requirement, Matrix provided features like adaptive recording and camera-wise recording retention, which helped in reducing storage requirement by 50% without compromising on video quality. With the help of this, Hinduja hospital stored camera recordings for three months without investing in additional storage drives. Due to the large number of patients and visitors, Hinduja is now keen on installing intelligent video analytics (IVA) like license plate recognition (LPR) and trip wire of Matrix video surveillance to get real-time security and reports.

Read More

OSH India 2017

Enhancing safety and well-being of the Indian workforce UBM India has recently held the 6th edition of the Occupational Safety & Health (OSH) India 2017 at the CIDCO Exhibition Centre, Navi Mumbai. The show brought together internationally renowned exhibitors, consultants, business experts and key government officials on one common platform, to discuss global best practices and seek solutions to some of the most pressing challenges in the field of workplace safety and health. The participation of leading exhibitors from across the industry reaffirmed the need and focus of OSH India as an industry event. The inaugural ceremony took place in the presence of SudhakarPrabhuRathod, Director, Directorate Industrial Safety & Health, the Department of Labour, Government of Maharashtra; Santosh Warrik, CFO & Advisor, MIDC, Government of Maharashtra; Arvind Mandke, Chief Fire Officer, CIDCO, Government of Maharashtra; Pankaj Jain, Group Director, UBM India Pvt. Ltd., and Yogesh Mudras, Managing Director, UBM India, amidst an august industry gathering. Speaking at the inauguration Yogesh Mudras said, “As a big chunk of the population belongs to the working age group, organisations need to look at the safety and health along with emotional well-being of these employees on priority to retain the best of talent and ensure good productivity. Companies in manufacturing and allied sectors such as automobile, oil and gas, construction etc., are becoming aware of occupational hazards and are working towards creating a safer working environment. Governments for their part are through regulations emphasising on developing infrastructure and providing resources centred around workplace safety, coupled with increasing global investments. Despite a greater focus on occupational safety and health, there is still inadequate education at various levels and public awareness is still absent, as managements and workforce don’t always place safety as a top priority. Although, many organisations have taken the initiative to organize training sessions to create awareness, a concentrated and cohesive strategy is clearly not in place. UBM India’s OSH India is geared to filling this vital gap.” “Also, this year we are glad to have a gender sensitive approach to safety and health as one of the topics at the conference seminar. A broad stratagem for the enhancement of women workers’ safety and health has to be built with an increasing number of women at the workplace, enhancing productivity and breaking the glass ceiling,” he further added. The expo was supported by DISH (Directorate of Industrial Safety and Health) – Maharashtra, Gujarat and Tamil Nadu; Gujarat Safety Council; Indian Technical Textile Association; Taloja Industrial Association; Thane Manufacturer Association and Indian Society of Ergonomics. OSH India 2017 also witnessed the ‘OSH India Safety Awards 2017’ on the evening of day 1 which was open to Indian operating businesses, organizations, alliances and individuals in the public or private sector with a workplace health and safety initiative. This year, OSH Awards received a total of 120 nominations from across industry verticals.

Read More

Videx New Vandal Resistant GSM Range

The new vandal resistant systems include many new advanced features making it more flexible then ever. Using mobile technology to communicate and operate doors, automatic gates, car parks and remote site applications makes it a perfect security solution for unmanned sites and communications outside of normal business hours. It is available as a part of the 4000 series modular door entry system in a range of styles including surface and flush panels in 12 gauge 316 grade stainless steel, the VR120 vandal resistant range and custom panel sizes. All vandal resistant panel variations can be engraved with legend or provided with back lit name plate windows. The system also provides optional proximity access control for up to 1,000 users. GSM systems enable calls to be placed from an entrance point to any mobile or land line telephone. Entry can then be granted using the telephone keypad. Two key innovative features of the new vandal resistant GSM system are – it can call up to 24 users with a divert facility of up to three numbers if the others are engaged or unanswered, and up to 1,000 telephone numbers can be stored to take advantage of the ‘dial to open’ feature which enables callers to dial the intercom and release the door/ gate without being charged for the call. Proximity access control is also an option, and a voice annunciation and LCD display can also be connected ‘if required’ which can include scroll buttons to search for users via the screen. GSM systems require minimum installation and setup time, and can be installed in places which would be too difficult or too expensive for hard wire. There is no need of any cabling to telephone points as the system utilises the existing mobile network infrastructure. The installation in a very short time requires only the mounting of the entrance panel, and the connection of a power supply, antenna and gate or door releasing device. The new system also comes with an event log that can record events that can be viewed by PC software. Programming and maintenance of the user’s details, access control codes and fobs can all be controlled via SMS text messages and USB connection. The GSM system’s flexibility allows changes to be made remotely without the need to revisit the site. Dry contact relay output, additional switched 0V output, push to exit button input and auxiliary input are all available.

Read More

See Tec Experience Video Management Solutions First Hand in 5 Themed Areas

SeeTec will present their video management applications for a wide range of areas and industries at next year’s Intersec trade fair in Dubai. They will exhibit on their own booth for the very first time. KajSvenningson, Vice President Business Development, is looking forward to welcoming customers and prospects on the 50 sqmSeeTec booth. He said, “The Middle East has become a major market for SeeTec in the past years. The projects that we realize here are of a scope that have created a visibility for us that reaches far beyond just the gulf region. And Intersec as the leading regional trade fair is mirroring the importance with its own growth towards a show of a really global scope.” The focus of the presentation in the Dubai International Convention and Exhibition Centre will be five hands-on stations that will not only showcase the video management functionalities of SeeTec Cayuga R11 but also demonstrate, how the software becomes an essential part of security and business ecosystems. “The new trend of adding ‘intelligence’ to the video feeds recorded and managed through SeeTec software will be visible in a dedicated area for video analytics as well as our SeeTec Business Video Intelligence (BVI) range of products. Here, we will show how SeeTec can help our customers to link video data to business processes e.g., in logistics, transportation or banking to safeguard their processes and to make better decisions for the future,” Andreas Conrad, Marketing Director at SeeTec, explains, “We are constantly striving to provide added value to our customers with our software solutions. We want to show that modern video management technology can be the basis of much more than just remote observation of assets, restricted areas and public space.”

Read More

Faro Scene 7.1 Software for Virtual Reality

Leading in virtual reality for construction, design and forensics FARO® has released virtual reality (VR)-ready SCENE 7.1 software that enables an immersive VR experience with integration of detailed photographic textures i.e., surface details of an object and rendering of 3D scan data so quickly that it appears to be generated in real time. While SCENE 7.1 is optimized for the FARO laser scanning product portfolio e.g., FocusSor Freestyle, it is also device agnostic, and so it can seamlessly accept and manage 3D scan data from other non-FARO laser scanner products. Immersive virtual reality SCENE 7.1 enables users to view an entire project i.e., the full range of related scans in full 3D virtual reality through a compatible VR headset from the comfort of the user’s office or workstation chair. This significantly elevates the beneficial use and reduces project cycle time by enabling architecture, engineering and construction professionals, public safety forensics experts and product designers to quickly simulate and compare reality for such tasks as evaluating as-built documentation, reconstructing crime or accident scenes, or optimizing design plans. Productivity enhancements in virtual reality SCENE 7.1 advances well beyond the ‘see it better to understand it better’ concept common in most industrial VR solutions. It enhances productivity by enabling users to take/ capture screenshots, tag comments or notes specific to images, and navigate the system overview map in real time, all without needing to exit the virtual reality environment. Merging of FARO terrestrial and handheld scanning data Historically, the FARO Focus and Freestyle products have had their own unique, coded targets (markers that identify scan areas/ specific targets), which could not be shared by the other scanning device. With SCENE 7.1 enhanced functionality, not only can both devices share coded targets, but they can also now verify registration of scans from both devices in a single, real time registration report. This ensures not only a more cohesive workflow between these devices but also enables projects to be completed faster. “We have been actively pushing the agenda to integrate high value VR capability and compatibility into our reality capture products,” stated Andreas Gerster, Vice President, Global Construction BIM-CIM, “This is the third major introduction in this area from FARO over the past year and we are confident that facilitating the way our customers interact in a virtual project environment with access to real time, simulated real world information makes the planning processes more tangible and less error prone.”

Read More

A10 DDoS Protection Solution Enhanced

As distributed denial of service (DDoS) attacks increase in size and scope, A10 Networks, a Secure Application Services™ company has recently launched its latest defenses against these threats with the most powerful DDoS protection solution available on the market. The company is strengthening its A10 Thunder™ TPS (Threat Protection System) platform with surgical flow-based detection via the new A10 Thunder TPS Detector, which integrates with A10 aGalaxy TPS management to provide automated mitigation for TPS mitigator. The A10 Thunder TPS Detector is available as a virtual machine on the A10 aGalaxy® 5000 management appliance or on other TPS mitigation appliances via the configuration option. It more than doubles the industry’s nearest competitive flow-based DDoS detection performance by managing 500,000 flows per second. The A10 Thunder TPS Detector is tightly integrated with A10’s TPS Mitigator and A10 aGalaxy TPS management solutions. Together, A10 Detector, aGalaxy TPS and A10 Mitigator comprise a complete A10 Thunder TPS solution, which enables IT organizations to quickly detect, manage and mitigate attacks. When an attack is detected via an analysis of user traffic by A10 Detector, aGalaxy TPS management is then notified, which triggers A10’s Mitigator with the recommended mitigation templates resulting in fast responses across the attack lifecycle. By understanding and assessing the severity of the attack, the A10 Thunder TPS solution then automates effective escalation and automatically runs countermeasures to help mitigate DDoS attacks before they spread and wreak havoc. The A10 Thunder TPS solution uses more than three dozen threat intelligence sources to block malicious traffic, and monitors performance and security baselines with 28 behavioral indicators – considerably more than major competitors – inspecting suspicious traffic and escalating policies to help avoid legitimate traffic drops and eliminate false positives. A10’s continued innovation in DDoS protection comes at the right time. Security teams face increasing sophistication from adversaries responsible for DDoS attacks. According to a recent report commissioned by A10, large DDoS attacks greater than 50 Gbps have quadrupled the past two years. The number of companies experiencing between 6-25 attacks per year has increased more than four times in that same time span. However, with the complete Thunder TPS solution, A10 is improving protection for companies looking to augment mitigation capacity, SecOps-friendly automation, and reduction of false positives. “With the new Thunder TPS options and flexibility, A10 is helping service providers, cloud providers, gaming companies and enterprises combat aggressive DDoS attacks with greater intelligence and agility,” said Raj Jalan, CTO of A10 Networks, “We believe the intelligent automation, combined with the industry’s highest-performing combination of powerful detection, mitigation, and management, will increase SecOps efficiency and drive more effective defense for businesses.”

Read More