securitylinkindia

MassMediaLink India LLP SecurityLink India

GJD Clarius® PLUS IP LED Illuminator Range

GJD, one of the world’s leading manufacturers and designers of innovative LED Illuminators, has launched its new Clarius PLUS IP Infra-Red and White-Light LED lighting range for networked based security applications. The range provides dedicated lighting for IP cameras via Power-over-Ethernet (PoE), providing a smart and integrated lighting solution. All models feature the latest dual core surface mount LEDs with enhanced optical output and an interchangeable lens diffuser system to deliver extremely clear night time images with no hot spots. Clarius PLUS IP offers unbeatable levels of performance and seamless integration with third party VMS providers. Keith Fenwick, CCTV Lighting Director commented, “We are pleased to announce our new range of network illuminators. The Clarius PLUS IP range provides all the advantages of the standard Clarius, but with added secure IP technology for smart integration and easy installation with remote setup.” In addition to the comprehensive features of existing Clarius illuminators, the IP models provide real time remote monitoring access via a user-friendly secure web-based interface. Adjustable settings include temporary power boost, light pulsing mode for intruder deterrent, and timer functions for energy and cost savings. Each Clarius IP is built with a unique anti-vandal shock sensor to ensure optimal intruder deterrent. For example, if an intruder attempts to vandalise the illuminator by throwing a brick at the unit, the illuminator will automatically detect and alarm. Designed with flexibility in mind, it comes with an interchangeable lens kit as standard. This useful installation feature allows the user to quickly and easily change the angle of illumination when on site. The versatility of Clarius PLUS IP makes it perfect for a wide range of applications including protecting residential properties, commercial buildings and industrial sites, as well as rural and isolated areas. All of GJD’s Clarius PLUS IP illuminators are covered by a five-year warranty, with a projected working life of over ten years.

Read More

Nice Actimize Debuts Autonomous Financial Crime Management

To significantly reduce costs of compliance and increase detection accuracy Autonomous Financial Crime Management addresses such complexities as changing regulatory requirements, mounting costs for personnel, and dramatic shifts in technology In the face of mounting pressures on compliance departments at financial services organizations, NICE Actimize, a NICE business, is leading the revolution to more efficient and cost-effective financial crime and compliance operations with the debut of Autonomous Financial Crime Management. Addressing a paradigm shift where machine-led functions are driving operations, which are today performed manually, this innovative process will create a unique environment that more effectively addresses the challenges and pain points that financial services organizations are facing by allowing them to tailor their operations to lower costs and drive greater profitability, all while improving accuracy and throughput. Autonomous Financial Crime Management also allows organizations to configure which decisions to direct to human experts, supporting either semi-autonomous to fully autonomous operations. By addressing such complexities as changing regulatory requirements, mounting costs for personnel, and dramatic shifts in technology, NICE Actimize’s Autonomous Financial Crime Management offers a unified view of risk through targeted utilization of big data, advanced analytics everywhere, artificial intelligence and Robotic Process Automation which enables these issues to be more effectively processed. Autonomous Financial Crime Management also streamlines and creates more productive use of personnel, therefore improving an organization’s overall effectiveness. NICE Actimize’s innovative Autonomous Financial Crime Management approach relies on its deep domain knowledge and expertise in financial crime and compliance. This new method creates a seamless connection to data from anywhere, from any source at any volume, to work quickly to turn raw data into intelligence. This acquired intelligence is then used to detect, decide, investigate and resolve alerts and cases with limited human intervention, enabling financial services organizations to mitigate various types of financial crime with greater speed and accuracy. Joe Friscia, President, NICE Actimize said, “Financial services organizations are facing a true paradigm shift. Where humans once drove and assisted machines to execute processes in financial crime management, the reverse is becoming true and machines are now driving operations, thereby creating dramatic gains in cost savings, creating vastly better models and improving detection accuracy. This rapid technology transformation, coupled with vast regulatory change, requires a new approach. NICE Actimize’s Autonomous Financial Crime Management leads the market and our customers into the future while providing a vision and strategy that streamlines the specialized operational requirements of financial crime fighting by unifying advanced analytics, machine learning and intelligent automation.”

Read More

A New Alternative to Video Transmission Over Ethernet For Industrial Security Applications

By Bruce M. Berman – ComNet Vice President of New Business Development The industrial security market has been witnessing the gradual transition to video, audio, and data transmission over Ethernet since the beginning of this decade. This change has impacted numerous other markets as well, including the transportation, factory automation/ industrial control, and utility/ electric power transmission and distribution markets. Prior to the introduction of video over IP (or Internet Protocol), a separate network of analog or digitally encoded video was typically utilized for hauling the video from the edge of the network back to the monitoring location. Audio for telephony or a communications intercom system; RS-232, RS-422, or RS-485 serial data, commonly used for CCTV camera pan-tilt-zoom (PTZ) control or the card access element of the system, was transmitted from the field devices back to the control center on other dedicated and parallel networks (see figure 1). The transmission media of choice was usually optical fiber for reasons of robustness and bandwidth.    These technologies and system design approaches are still very viable solutions for hauling high-quality full-motion video, audio, and data, and when optical fiber is employed as the communications media, extremely long transmission distances and electrically noisy environments are easily accommodated. The difficulty of installing and maintaining two or more parallel and technically diverse networks, one for video, one for audio, and another for serial or other data, has motivated many users to consider the use of Ethernet as their preferred communications networking system. The relative ease of integration of the key components of the system onto a common platform has largely made Ethernet the networking solution of choice in many markets, including the industrial security market. With the advent of Ethernet, it now became practical and cost-effective to consolidate the video, audio and data elements of a security communications subsystem onto a single network (see figure 2). Although in theory this should be the ideal platform for the typical local or wide area communications network utilized for industrial security and other surveillance applications, in practice several key and recurring issues are frequently encountered by the systems integrator and end-user responsible for the installation, maintenance, and operation of the system. When analog video is to be deployed onto the network, a video encoder is required to convert the camera video output into an electrical signal that is compatible with transmission over an Ethernet-based network. These encoders employ signal compression technology to reduce the bandwidth occupied by the video, so as to increase the number of potential video, audio, or data signals that may share the finite bandwidth available on the network. Present video compression standards include MPEG-2, MPEG-4 and H.264, with MPEG-4 currently most widely used. The H.264 standard is newer and offers the advantage of enhanced video quality with the benefit of reduced bandwidth. MPEG-2 was originally developed for use by the commercial television broadcast industry, and although capable of superb video quality, its bandwidth requirements are large. As such, it has not been widely accepted for use within those communications networks employing Ethernet. Regardless of the compression standard utilized, hardware decoders or decoding software compatible with the encoded video are required for viewing the video. One major issue involves the relative lack of MPEG-4 or H.264 video encoders that are environmentally hardened when these devices are installed in an out-of-plant operating environment. In this kind of environment, issues such as ambient operating temperature, voltage transient protection, vibration, mechanical shock, and humidity with condensation must be considered to ensure that the video encoders or other field equipment are capable of providing long-term reliability and stable performance. The market is full of suppliers that build quality encoders designed for deployment in benign, conditioned operating environments such as when the equipment is fielded in an adequately heated and cooled communications equipment room. However, those manufacturers that build hardware capable of withstanding the extended operating temperature range, humidity with condensation, and electrical voltage transients and noise encountered in an outdoor or out-of-plant environment are few and far between, and the equipment is costly as a result. The MPEG-4 and H.264 video compression standards are suitable for transmission over Ethernet. As these standards rely upon video compression, the video in these standards is not transmitted in real time, and exhibits a certain amount of latency depending upon the compression standard utilized. Some users may encounter potential legal issues with video transmission systems that are not real-time. Other users may have operator issues with the time lag or delay between executing a pan-tilt-zoom command, and the actual execution of the command as viewed on the CCTV monitor. Full-motion 30 frames per second true broadcast-quality video with zero latency is not achievable considering the current state of Ethernet-based systems, and significant system bandwidth is required to achieve acceptable video quality. The high system bandwidth requirement imposed by the video ultimately limits the total number of video channels and other signal sources that may be inserted onto the Ethernet platform. Many end-users have been disappointed with the video quality of their video-over-Ethernet system, especially when the video is viewed on highly revealing wall monitors. In addition, some video surveillance or monitoring applications mandate the use of high resolution cameras, and much of the resolution provided by these cameras may be lost when the video is compressed to MPEG-4 or H.264 and inserted onto the network. Although Ethernet is based upon the industry accepted IEEE 802.3 standard, and in theory any manufacturer’s Ethernet equipment should be completely interoperable with any other manufacturer’s equipment, in practice this is very frequently not the case. Interoperability issues require the involvement of a trained IT professional to resolve, and in some cases, resolution is not possible. Trained IT or technical personnel are required for the initial installation, setup, and long-term maintenance of the system, and the long-term cost associated with this are obvious and frequently not within the budget of many users. They must be considered as part of the overall life-cycle cost of owning and operating the…

Read More

SIA Launches Code of Conduct

The Secure Identity Alliance, the global identity and secure eServices advisory body, announces the adoption of a Code of Conduct that all the Alliance’s members will voluntarily commit to Developed in consultation with individual members to support best practices and enforce industry standards, the new Code enshrines the commitment of Secure Identity Alliance’s members to transact, engage and operate in a manner that conforms to highest standards of ethics and excellence in the design and implementation of digital ID systems. “As a multi-stakeholder association, the Secure Identity Alliance represents members that demonstrate the highest degree of professionalism, expertise and ethical standards in every aspect of their operations,” says Frederic Trojani, President of the Secure Identity Alliance. “The Secure Identity Alliance’s Code of Conduct sets out an unequivocal ethical framework for interventions and provides a minimum standard of behaviour that any public, private and non-government organization or entity engaging with a Secure Identity Alliance member can expect to encounter. Indeed, it is the Secure Identity Alliance’s belief that strict adherence to high ethical standards is the key to enabling the full potential of trusted digital identities and secure eServices.” New Code of Conduct sets out the commitment of Secure Identity Alliance members to highest standards of ethics and excellence in the design and implementation of digital ID systems, the beating heart of Government eServices delivery, upon which sustainable social and economic inclusion is built “The Secure Identity Alliance is acutely aware of the important responsibilities that fall on the shoulders of suppliers of digital ID solutions. Today’s ID systems represent the beating heart of Government eServices delivery, upon which sustainable social and economic inclusion is built. Indeed, a robust digital ID platform is the primary enabler for governments and businesses looking to reach and serve populations in new and more efficient ways – and the Code enshrines the commitment of our members to highest standards of ethics and excellence in the design and implementation of digital ID systems and program roll-outs,” concludes Frederic Trojani. The newly instituted Code sets out the primary principles Secure Identity Alliance’s members must observe in relation to their business practices and commercial actions and has been adopted to facilitate and enhance business relations in the marketplace with all relevant stakeholders (private and government entities and agencies).

Read More

Apollo Celebrates 40 Years of Manufacturing Excellence

HRH The Duke of Kent visits Apollo Headquarters His Royal Highness, the Duke of Kent recently visited the headquarters of Apollo Fire Detectors in Havant, Hampshire to commemorate 40 years of excellence in UK manufacturing by the company. During his visit, the Duke took a tour of the manufacturing facilities and met some of the engineers and assembly workers who are behind the award-winning and life-saving fire detection technology made by Apollo. The royal visit and Apollo’s longstanding achievement in manufacturing excellence are documented by an official plaque, unveiled by the Duke during his visit. “We are very proud to be able to share this important milestone in our history with HRH the Duke of Kent,” said Charles Lombard, Managing Director EMEA at Apollo, “In addition to celebrating Apollo’s long history of manufacturing excellence, this event reaffirmed our commitment to Apollo’s status of Royal Warrant Holder.” Apollo Fire Detectors Ltd. specialises in the design and manufacture of high quality fire detection products. Over the last 40 years, the company has broadened its capability from a straightforward focus on conventional fire detectors to include the manufacture of sophisticated analogue addressable detectors and interfaces for monitoring and controlling equipment in fire protection systems. Apollo has some of the most advanced manufacturing technologies to ensure consistently high quality products and fast response to customer requirements. With more than 3000 international approvals along with exporting to over 100 countries, Apollo has cemented its position as a world-class fire solutions provider. Apollo is part of the HALMA group of companies.

Read More

Skybox’s Security Threat-Centric Vulnerability Management for Virtual and Cloud Networks

Expands solutions to enable organizations to consistently and securely manage day-to-day security processes across all networks in one platform Skybox™ Security continues to expand its cloud security management solution, Skybox for the Cloud™. The solution now includes threat-centric vulnerability management (TCVM) for virtual and multi-cloud environments and extends capabilities for security policy management, attack surface visibility and network path analysis. With one platform, the Skybox™ Security Suite, organizations are now able to consistently and securely manage day-to-day security processes across their entire network infrastructure, whether on premises or in the cloud. As businesses continue to migrate to virtual and cloud environments, security becomes more complicated due to the nature of cloud architecture, from multi-tenancy to elasticity and the shared responsibility for the computing stack. For example, security mechanisms in virtual and cloud networks are different from physical environments, and even differ amongst cloud service providers. In addition, cloud elasticity means virtual machines are quickly spun up and down, making traditional vulnerability scanning insufficient as the environment may change significantly between scans. To counteract these challenges and reduce the chance of human error, Skybox helps automate security processes not only in virtual and cloud environments, but across all networks within a single, unified dashboard. Whether an organization’s network infrastructure is physical, virtual, cloud or a hybrid of all three, Skybox for the Cloud addresses a number of use cases in the following areas: Comprehensive visibility of the attack surface in a single network model, capable of incorporating data from 120+ security and networking technologies. End-to-end path analysis from any source to any destination across or within physical, virtual and multi-cloud networks, including detailed path analysis on the devices, rules, etc., along the path. Unified security policy management across all networks including out-of-the-box compliance checks for key industry regulations such as NIST and PCI DSS. Vulnerability discovery, prioritization and remediation planning with the context of an organization’s on-prem and multi-cloud networks; this information is correlated to current threat intelligence of exploits in the wild. As cyber events like the Equifax breach (caused by the Apache Struts vulnerability) continue to increase, it’s obvious that organizations are struggling to quickly identify and effectively remediate vulnerabilities in their systems. This challenge can be compounded by the nature of cloud environments and even procedural requirements from service providers that impact third-party scans. Skybox for the Cloud gives security teams the power to assess vulnerabilities in the cloud on demand by combining data from cloud-based patch and asset management systems, scanners and network devices. The results are analyzed and prioritized using the TCVM approach, taking into account: The vulnerabilities on the virtual machine and its importance to the organization. The virtual machine’s exposure based on the hybrid network topology and security controls in place. Threat intelligence on available and active exploits in the wild. TCVM also gives prescriptive guidance of what action can be taken to prevent exploitation and how urgently that action should be performed. IT teams are tasked with launching new services and applications on a daily basis. By leveraging cloud architecture, they can achieve that in minutes – opposed to days of work. The challenge is that this leads to a fluid security situation where assets (virtual machines) can be assigned to the wrong security group, resulting in immediate exposure. Security teams need to be on the top of this, and the only way to do it is to have global visibility and management across all your networks – Ravid Circus Skybox VP of Products

Read More

IFSEC International Takes New Industry Role Addressing Critical Global Security Challenges

Security has never been a more critical discussion. 2017 has been a year where organisations and governments became increasingly aware that the manner of threat which they were working to prevent has changed irrevocably. Europe fell victim to a string of unpredictable attacks; Yahoo saw their share value fall by $350 billion over 48 hours after the largest security breach in history was revealed; the NHS found their physical assets left vulnerable after a ransomware attack disrupted their ambulance service; the FBI and Apple went to war on encryption and Airbnb properties were left in chaos when a smartlock update went wrong. These represented a pivotal theme, the need for all those influencing security to adapt to reflect the more complex world, and the ever-closer interweaving of physical and cyber security. The time is now for the security profession to unite their knowledge and their technologies to protect people, property and profits. As of 2018, it is IFSEC’s commitment to become the place for the profession to create a safer world. More than just a prominent trade show, IFSEC must foster the global security conversation, be the vessel that sets and carries the agenda and be the antenna for broadcasting the safety and security dialogue. 2018 will be the inauguration year of a transformation of IFSEC’s 40 year heritage as a physical security show into a high level security summit and integrated security event. When IFSEC was first conceived, the threats were merely physical. Society has adapted and this is the year we must too. The security profession must evolve to meet modern needs. IFSEC is gladly becoming the arena for the big discussions, however difficult they may be. The security profession must discover solutions that are a driving force in protecting businesses, people and data. IFSEC will give the security industry the platform to display and discover products and services to help national, corporate and home security adapt to the changing tides of tomorrow’s challenges. The security profession must drive the agenda. IFSEC will exist for the world’s leading security experts to find a platform for provocative debate on global security and propel intercommunication forward between the installer, integrator, end user and vendor. To pilot this in 2018, IFSEC will drive an emphasis on major keynote addresses from strategic global security leaders in a dedicated Summit, host a multitude of high level panel debates from government and industry influencers in the striking Amphitheatre and provide the opportunity to hear from those leading the way in identifying, installing and maintaining transformational security practices between physical and IT. Establishing the impartial voice of security equipment will also be key to the IFSEC 2018 proposition, rigorously holding technology up to the test in real-life Testing, across attack scenarios and surveillance situations. This will allow security innovation to be delivered to the world, revealing thousands of differentiated products that will filtrate from government, to the boardroom, and to every individual in the security profession. Tall Building Fire Safety Conference 2018 The tragedy at Grenfell Tower, along with several other similar fires in tall buildings around the world has highlighted the need for a review of fire safety practice, engineering and risk management. The rate and complexity of tall building construction is increasing, and cities will house many more people in tall buildings. The 5th International Tall Building Fire Safety Conference will take place on 19-21 June 2018 at Excel, London alongside the FIREX International Exhibition, supported by organisers UBM. Day 1 will consider design and fire engineering in tall buildings; day 2, management and insurance of fire risk in tall buildings; while the last day will consider firefighting in tall buildings. With Early Bird rates available, anybody interested in attending is advised to book now as space will be limited. Conference Director Russ Timpson commented, “This is a timely opportunity to get the Global fire safety community together and discuss a ‘way forward’ for tall building fire safety. FIREX provides a great platform to encourage people to travel to London and take part. With a great line up of world class speakers, this should be a seminal event for those concerned with learning lessons from Grenfell and other recent tall building fires”. All delegate will also get VIP access to FIREX and associated exhibitions.

Read More

Videx Secures North Tyneside Housing

Videx has expanded its presence in the housing market by winning a three year contract with North Tyneside Council. North Tyneside Council provides a range of accommodation across the region to meet the differing needs of the local community. The Council wanted to refurbish 16 sheltered housing schemes with better suited door entry systems and provide new systems to a further 10 new builds. These schemes ranged in size from a new build development comprising 8 bungalows to a 54 bed extra care scheme. The number of properties in total that required access control additions or modifications was 1,000. Videx, working with Goldshield Securus, has provided door entry systems that offer flexible access control that meets both the changing needs of the residents and also the operational aspects of the staffing arrangements. Steve Natton, Projects Manager at Videx, said, “The requirement was clear – the Council wanted an easy way for residents to report issues such as anti-social behaviour, general maintenance faults and any other non-emergency related issue that did not require a call through their warden call system. With the Videx IP based door entry system, tenants have been provided with a remote IP help line through to a dedicated team at North Tyneside Council. By using the door entry handset the tenant can place a call through to the Council which is handled by an operator on a PC based concierge. The operator views the call on the screen and can call the resident back over the IP connection. This call has no cost associated to it as it utilises the authority intranet and also provides inclusion for all tenants living within their schemes whether they have a telephone line or not. Another main benefit of this feature is that it also relieves the strain on the Warden Call system freeing up time for emergency calls.” A full access control and CCTV system with IP remote monitoring covers the external perimeter, controlled access doors, lobby area, and an additional camera is set up in the Scheme Manager’s office. The controlled access door cameras are made available on the residents’ communal IRS TV system allowing them to validate the visitor and the office camera can be switched on to also broadcast on to the TV system to allow the residents to view the Scheme Manager during morning calls. This feature was a specific request by the client to provide the residents with a visual presence if they wish during the call process. Perimeter intruder alarm detection was also provided with remote monitoring which interfaced with the CCTV and provided a complete security package. Steve added, “What’s particularly reassuring for the Council is that our door entry systems come with a lifelong guarantee of support so if the client has any issues with the system or needs to modify it to meet the changing needs of residents, they can. That is one of the most unique aspects of the Videx service – lifelong support – and one of the reasons why we are able to grow our client base in the housing market.”

Read More

STM32H7 Series MCU

STMicroelectronics, a global semiconductor provider serving customers across the spectrum of electronics applications and a leading supplier of Arm-based microcontrollers (MCU) used in Internet-of-Things (IoT) devices, welcomes Platform Security Architecture (PSA) from Arm as a major enabler for ubiquitous, best-in-class cyber security. ST’s STM32H7 high-performing MCUs are designed with the same security concepts as the PSA framework, and combine these principles with STM32-family enhanced security features and services. People and organizations are increasingly dependent on connected electronic devices to manage time, monitor health, handle social interactions, consume or deliver services, maximize productivity, and many other activities. Preventing unauthorized interactions with these devices is essential to protecting identity, personal information, physical assets, and intellectual property. As the IoT grows in scope and pervasiveness, public safety and national security are also at stake. As device manufacturers must always innovate to beat new and inventive hacking exploits, PSA helps them implement state-of-the-art security cost-effectively in small, resource-constrained devices. “Security is a major priority to ensure the success of the IoT. Winning the confidence of end users – from individual consumers to businesses and government agencies – is critical to adoption,” said Michel Buffa, Microcontroller Division General Manager, STMicroelectronics, “PSA from Arm is making core security capabilities like device identity and over-the-air (OTA) updates more affordable and scalable for small autonomous IoT devices, and we’ve made it work with the existing security features of STM32 microcontrollers including on our high-performing STM32H7 series.” ST’s STM32H7 MCU devices integrate hardware-based security features including a true random-number generator (TRNG) and advanced cryptographic processor, which will simplify protecting embedded applications and global IoT systems against attacks like eavesdropping, spoofing, or man-in-the-middle interception. In addition, secure firmware loading facilities help OEMs ensure their products can be programmed safely and securely, even off-site at a contract manufacturer or programming house. To enable secure loading, security keys and software services already on-board the MCU permit OEMs to provide manufacturing partners with already-encrypted firmware, making intercepting, copying, or tampering with the code impossible. This enables programming and authenticating the device to establish the root-of-trust mechanism needed for the device to be connected to the end-user’s network and remotely updated over the air (OTA) to apply security patches or feature upgrades throughout the lifetime of the device. “Arm is working with our ecosystem to shift the economics of security with the introduction of PSA as a common industry framework for securing the next trillion connected devices,” said Paul Williamson, Vice President and General Manager, IoT Device IP, Arm, “To secure hardware blocks and firmware-loading services ST has embedded in the Cortex-M based STM32H7 series, and utilizes the Arm PSA principles to drive innovation in security for a broad range of applications, including communication gateways and connected objects.”

Read More

Wavesight Appoints New Director

Wavesight India appoints Shrikant Gupta as the Director who is joining on 1 December 2017. Shrikant is a passionate leader with proven abilities to conceptualize long term goals and rally the team on that path. He would be the change agent to deliver results. A business manager with sales experience in wireless for over 17 years and business development experience across IT and Telecom domains, Shrikant has specifically excelled in building new relationships/ verticals, recruitment of channel partners and growing new business into multimillion US dollar successes. Prior to joining Wavesight, Shrikant was the Head of Cambium Networks in India for 7+ years. Earlier he helped set up and establish Radwin in India. Some of the key projects he has worked on in India include Airtel, Tikona, TCL, Reliance, Dialog, Grameen phone, Assam e-Govt, Tripura e-Govt, Nepal Telecom Authority and rural connectivity for Wi-Fi with Aircel.

Read More