securitylinkindia

MassMediaLink India LLP SecurityLink India

PKI to Accelerate IoT and Cloud Adoption

From VPN to email to cloud and now IoT, digital transformation has ushered in powerful new applications for PKI. The results of Thales third annual 2017 PKI Global Trends Report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals the Internet of Things (IoT) is playing an increasingly important role in influencing public key infrastructure (PKI) planning and usage. PKIs, widely used for authentication, digital signing, and encryption, are considered a core service supporting many different use cases and applications. While a majority (54 percent) of respondents believe cloud-based services is the most important trend driving the deployment of applications using PKI, 40 percent also cited the IoT – a number that has doubled in the past three years. The findings, which reflect the responses of over 1,500 IT security practitioners worldwide, paint a picture of technological evolution and some uncertainty, but also opportunity: In the next 2 years, almost half (43%) of IoT devices will use digital certificates for authentication. 43% of respondents believe PKI deployments supporting the IoT will be a combination of cloud-based and enterprise-based PKIs – a number that reflects the scale of the IoT and resulting scale of PKIs issuing certificates for it. Over one-third of respondents (36%) cite new applications like the IoT as the fastest growing area of PKI evolution (a number that has almost tripled since 2015). On average, PKIs support more than 8 different applications within a business; SSL tops the list, followed by VPNs, public cloud apps, and device authentication. Almost two-thirds of organizations now report having a PKI and 36% of respondents use hardware security modules (HSMs) to protect their PKI Dr. Larry Ponemon, Chairman and Founder of The Ponemon Institute said, “Last year, we underscored that it is hugely important PKIs be future proofed – and we still stand by that recommendation. Not only are PKIs a core enterprise asset, but they are playing an increasingly important role supporting certificate issuance needs for cloud applications and the IoT. Smart organizations have determined that successful IoT deployment rests on trust being established from the beginning, and they’re leaning on their PKI as one component for building that trust.” PKI is an established technology which is well-positioned to address growing authentication needs and challenges as we embrace cloud applications and the IoT. While the sheer number and types of IoT devices pose security and interoperability challenges, authentication is a critical building block in transforming trust from an IoT barrier to an IoT enabler. One way a root of trust can be accomplished is through HSMs, which are high-assurance sources of credentials for both IoT and non-IoT applications. In the years to come, we expect to see even more HSM deployment and other indicators of higher PKI security maturity to help underpin the digital transformation of enterprises – John Grimm Senior Director Security Strategy, Thales e-Security  

Read More

CyberArk Associates with Puppet

CyberArk that protects organizations from cyber attacks across the enterprise, into the cloud and throughout the DevOps pipeline, has associated with Puppet as an advanced technology partner. They are working together to create supported modules that provide automated, enterprise-grade protection of secrets and are seamlessly integrated with Puppet’s configuration automation, enabling secure, high-velocity DevOps  workflows. In dynamic DevOps environments, tools, scripts and applications/ services are constantly being created, used and disabled. Each step requires secrets, including SSH/ API keys, passwords and certificates, which regularly go unchanged or revoked, or may not be available for a range of reasons, making the application unable to run or run properly. Because these accounts provide access to sensitive resources, they are a prime target for an external attacker or malicious insider to facilitate enterprise-wide cyber attacks. CyberArk Conjur is the only platform-independent secrets management solution that allows organizations to integrate secrets management and machine identity security into their projects with minimal effort. It is specifically architected for containerized environments and can be deployed on premises or to any cloud at massive scale. “This integration balances security and productivity by allowing Puppet users to continue to work within the familiar Puppet interface to secure and manage secrets used by Puppet Masters, nodes and users,” said Tim Zonca, Vice President of Business Development, Puppet, “The integrated solution provides security with a strong authentication mechanism for machines before granting secrets, as well as implementing least privilege for nodes.” CyberArk Conjur allows DevOps teams to integrate security best practices into their cloud-native application development projects with ease, while giving security teams assurance that security and compliance best practices are being applied to these dynamic environments, without creating new security silos. “The CyberArk Conjur module for Puppet is designed with both DevOps users and security teams in mind. It provides visibility and flexibility for Puppet secrets workflows and users can view and manage host accounts maintained by Puppet,” said Adam Bosnian, Executive Vice President, Global Business Development, CyberArk, “The integration with Puppet furthers CyberArk’s commitment to automating secrets protection and makes it easier for organizations to recognize the benefits of using Puppet to improve productivity without changing the way developers work.” As part of this integration, Puppet is also joining the CyberArk global technology partner program that brings together enterprise software, IT security and service providers to build on the power of privileged account security to better protect customers from cyber threats across multi-platform environments. CyberArk recently joined Puppet’s Technology Alliance Partner Program (TAPP).

Read More

SIL4 Certification for Artesyn Platform

Artesyn Embedded Technologies announced Safety Integrity Level 4 (SIL4) certification for the Artesyn Embedded Computing, Inc., including ControlSafe™ Carborne Platform with Carborne Computer and Carborne Software. Rail network integrators and operators can save a significant amount of time, cost and risk associated with the system development and certification process for rail safety applications by using a SIL4 certified commercial off-the-shelf (COTS) platform. Certified by TÜV SÜD, one of the most trusted certification bodies worldwide, the ControlSafe Carborne Platform is a fail-safe and fault-tolerant computing platform designed for a wide range of train control and rail signaling applications, especially on board applications such as automatic train protection (ATP), automatic train operation (ATO), and positive train control (PTC). The new platform can also be used in wayside train control and rail signalling implementations. Housed in a compact 4U chassis with front access I/O and a DC power supply, the ControlSafe™ Carborne Platform can accommodate up to 12 I/O modules and a variety of I/O types. An innovative data lock step architecture, used in all Artesyn ControlSafe Platforms, allows customers to make seamless technology upgrades while a hardware-based voting mechanism maximizes application software transparency. The ControlSafe™ Carborne Platform leverages the same safety architecture and technologies as Artesyn’s ControlSafe Platform, ControlSafe Expansion Box Platform and ControlSafe Compact Carborne Platform providing an application-ready and cost-effective common platform to enable a variety of applications through the integration of Artesyn I/O modules. In addition, Artesyn offers customers the flexibility to develop I/O modules and specify I/O backplane connectivity to meet their specific needs by providing all necessary technical specifications, product support and service. The first three platforms in the portfolio have now been certified to SIL4, while SIL4 certification of the ControlSafe Compact Carborne Platform is planned.

Read More

OT-Morpho Becomes IDEMIA

The result of the merger of Oberthur Technologies (OT) and Safran Identity & Security (Morpho), the OT-Morpho group recently became IDEMIA. The group’s ambition is to empower citizens and consumers to interact, pay, connect, travel and even vote securely while taking advantage of the opportunities of an increasingly connected world. At an event that brought together nearly 2,000 guests at the Seine musicale (an iconic cultural venue in the west of Paris, France), Didier Lamouche, Chairman CEO of OT-Morpho, officially renamed the group IDEMIA. In a world directly impacted by the exponential growth of connected objects, the increasing globalisation of exchanges, the digitalisation of the economy and the consumerisation of technology, IDEMIA stands as the new leader in trusted identities placing ‘Augmented Identity’ at the heart of its actions. As an expression of this innovative strategy, the group has been renamed IDEMIA in reference to powerful terms – Identity, Idea and the Latin word idem, reflecting its mission to guarantee everyone a safer world thanks to its expertise in trusted identities. This event furthermore provided an opportunity to discover all of the group’s latest innovations. These include the automated air passenger boarding process, the new generation biometric payment card, and embedded security systems to equip the connected cars of tomorrow. Supported by a workforce of 14,000 employees from all over the world, including 2,000 in the Research and Development department, IDEMIA is the result of the merger between OT and Morpho completed 31 May 2017. Today a leading player in the identification and authentication sector, the group serves clients in 180 countries and provides services to five main customer segments – financial institutions, mobile operators, connected objects, citizen identity, and public security. “Our future will be built through innovation and disruption which will revolutionise our daily lives. Our vision when we merged OT and Morpho was to build a new offer capable of revisiting the world of digital security. And this is what the creation of IDEMIA has achieved. Thanks to our talented people and the solutions they invent, citizens and consumers can now connect, interact, exchange, pay, travel or even vote in total confidence, drawing on the benefits of a connected world,” explained Didier Lamouche, CEO of IDEMIA, “The accomplishment of this promise is what we call Augmented Identity. It is about using the biometric characteristics of each person as a unique signature of individual identity, thus facilitating exchanges. It fosters confidentiality and trust and guarantees secure, authenticated and verifiable transactions. This is a decisive step towards a more frictionless, safer world.”

Read More

Bringing Aimetis under the Senstar Brand

Senstar announced the beginning of a transition period to bring Aimetis under the Senstar brand. Senstar acquired Aimetis in April 2016. Since that time the two companies have worked in parallel to continue to provide market-leading PIDS and VMS solutions, but over the coming months, Senstar and Aimetis will become one company, resulting in reduced complexity, improved performance, and unified support. “Bringing together the PIDS expertise of Senstar with the VMS and analytics knowledge of Aimetis enables us to offer an unrivaled range of innovative security solutions and world-class support,” said Senstar President Brian Rich, “Throughout the transition period we are committed to ensuring as little disruption as possible to our business. Our customers and partners can expect the same accessible, responsive and flexible sales and support they have always relied on, and to be well-informed regarding any changes that may affect them.” The combination of PIDS and VMS addresses a growing trend in the security industry to reduce complexity by enabling customers and partners to source comprehensive security solutions from a single provider, resulting in reduced costs and greater accountability. Senstar also introduces the integration of its Network Manager alarm reporting system and Symphony VMS (formerly Aimetis). Network Manager is a software gateway that allows communication with a wide array of Senstar sensors, including FlexZone®, FiberPatrol®, OmniTrax®, and UltraWave™. Symphony, the new benchmark for intelligent video management, is an ideal software solution for recording, monitoring and analyzing video from both single server installations and multi-server deployments. The integration enables Symphony to receive the full range of alarm and status information from Senstar sensors via an IP connection. For each sensor alarm the full range of Symphony’s security responses can be initiated, including commanding camera actions and providing visual and audio alerts.

Read More

CASB Offering with New Cloud Security Capabilities

Palo Alto Networks® Cloud Access Security Broker (CASB) offering, Aperture™ SaaS security service, now provides application protections for several Amazon Web Services (AWS) solutions, including Amazon Elastic Compute Cloud (Amazon EC2), AWS Identity and Access Management (IAM) and Amazon Simple Storage Service (Amazon S3). The new protections address sensitive data loss, enable monitoring for risky or suspicious administrator behavior, and provide additional protection against security misconfigurations and malware propagation. When combined with the preventive capabilities of the Palo Alto Networks Next-Generation Security Platform, these advancements will enable organizations to achieve even more protection for AWS, as well as address critical cloud security needs to deliver the most complete application and data security for cloud environments. Additionally, Aperture support for Office 365 and Google applications has been enhanced to include cloud-based email services and G Suite Marketplace applications. Data and applications reside everywhere – on the network, on endpoints, and in the cloud. As part of the migration to the cloud, many enterprises are adopting a multi-cloud strategy that includes storing large amounts of business-critical data within cloud environments, which requires advanced protections that complement basic native cloud offering controls to achieve comprehensive and consistent security. Palo Alto Networks Aperture controls enterprise SaaS applications and associated data by examining and controlling how data is shared, all without impacting user experience or changes to network infrastructure. If a policy violation occurs, Aperture enables quick enforcement of security policies to quarantine folders and data while immediately alerting security teams of suspicious behavior. “Our Aperture service secures business-critical data residing within today’s most important cloud-based enterprise SaaS applications. With extensive capabilities across our security platform and our latest application protections for Amazon Web Services, our customers benefit from complete visibility and granular control, instant classification, and enforcement across users, folders, and file activities, enabling them to prevent cyber breaches and protect their data no matter where it resides,” said Lee Klarich, Executive Vice President, Product Management, Palo Alto Networks.

Read More

Interview – Kunwar Vikram Singh, Global President, WAD

India is hosting the 92nd Annual Conference of World Association of Detectives (WAD) and a Roundtable Dialogue on Anticorruption Partnership during 10-14 October 2017 in Shangri-La, New Delhi. It is an impressive assembly of global leaders in Cyber Security and Corporate Intelligence who will discuss and develop tools to deal with internal and external corrupt practices, and launch a well-coordinated corporate campaign against corruption to support agenda of good governance of the Prime Minister of India. World Association of Detectives (WAD) is a global alliance of investigators and security professionals from around the world. WAD aims to promote and maintain the highest ethical practices in the profession of private investigation and security service, and to establish and further a mutual feeling of trust, goodwill and friendship among agencies throughout the world. WAD has members from more than 80 countries across the world, where India has one of the largest representations of 71 members. Coincidently, Kunwar Vikram Singh who is the current Global President of WAD, is also from India. He joined WAD more than 30 years back, and was elected President at its 91st Annual Conference held at Bucharest, Romania last year. Kunwar Vikram Singh is the founding Chairman of Lancers Network Ltd. which is South Asia’s leading Risk Consulting firm, operating in the high-on-risk countries of the region and the other parts of the world including Europe and CIS countries. Equipped with a highly experienced operational team drawn from the financial sector, armed forces, police, security services and industry professionals; the company has developed a reputation for providing quality driven, customer focused and highly successful actionable intelligence solutions. He is also the founding President and Chairman of Central Association of Private Security Industry (CAPSI), a leading organization for security professionals in India which has emerged as an ‘elite association’ nationally and internationally. It is an association of renowned security professionals managing the world’s largest workforce of 7 million guardsmen and women engaged in providing private security cover to the nation. The unique bouquet of experience and entrepreneurship has taken CAPSI to new heights, especially after the enactment of the Private Security Agencies (Regulation) Act 2005. Mr. Singh is also the founding President and Chairman of the Association of Private Detectives & Investigators (APDI), a preeminent national association of professional investigators in India. In addition to free-lancers, other investigation personnel as well as students are offering their involvement with APDI to better understand the constant changes in investigation issues and solutions. The members of the APDI work in compliance with the code of ethics of the Association. A majority of members of APDI are also members of WAD and the Association is actively involved in the hosting and organization of the upcoming WAD Annual Conference in India. SecurityLink India spoke to Kunwar Vikram Singh about the World Association of Detectives and the WAD 92nd Annual conference to be held in New Delhi. Some excerpts: SecurityLink India: Kindly give a brief about the global entity WAD. Kunwar Vikram Singh: World Association of Detectives (WAD) is the foremost international association of private investigators, security professional and security service organizations which was founded in 1925. It is the world’s largest and oldest association of its kind. It was formed as a joint venture by the combined membership of the World Association of Detectives, and the International Secret Service Association which was founded date back in 1921. The purpose of the establishment of WAD were primarily to promote and maintain the highest ethical practices in the profession of private investigation and security service; to grant membership to only those individuals whose personal and professional backgrounds and business affiliations are based on the precepts of truth, accuracy and prudence; to eliminate unreliable, incompetent and irresponsible members of the profession; to foster and perpetuate a spirit of cooperation among its members and with all those engaged in law enforcement; and to further and establish a mutual feeling of trust, goodwill and friendship amongst agencies throughout the world. WAD is registered in Colorado, USA. SecurityLink India: How was WAD conceptualized? Kunwar Vikram Singh: All nations, around the globe, have their own internal intelligence organizations such as RAW, CBI, FBI, KGB, or CIA and so on. However, their investigations and related activities are focused and dedicated to the government, government organizations and the safety of the country. Especially during those days, the private corporates and economic leaders across the globe who generally generate finance and employment, and who have the major contribution in making the nation’s economy, did not avail adequate facility and infrastructure to protect them. They lacked proper assistance and support in procuring intelligence either about the rivals or about the internal and external frauds caused especially in banking and financial sectors, or about any other private crimes for that matter. That caused huge economic losses to them and consequently to the respective nations. That conspicuous vacuum germinated the seeds of organizations like WAD. Retired police officers and intelligence professionals all over the world conceptualized and set up a pan-world organization called WAD to work together and exchange relevant information to settle the issues and help establish an environment of ease of doing business. Over the period, the flavor of the crime has drastically changed. For example, corporate, cyber, IPR crimes, financial frauds etc., were not there earlier. Several banks, companies and corporations have failed owing to internal frauds. For last three conferences, I impressed upon them to start a certificate course for young people who may even not essentially be an investigator. Several other professionals such as chartered accountants, lawyers may also opt for this field and become an investigator, as they are the experts of finance and laws respectively. Today we need huge number of young investigators, but that needs training and training facilities which are available only for the government personnel. – Kunwar Vikram Singh Global President, WAD  Today the world has shrunk and become one village. People have multiple operations in various countries including import, export, banking and all kinds of…

Read More

Building a Structure for Growth

India is well on the way to digitisation helped along by consumer adoption of mobile devices and technologies, availability of high speed internet, and a strong push from the Government. Unfortunately, this comes at the cost of cybersecurity. With the country becoming a favourite target of cyber criminals, it is imperative that Indian enterprises and institutions secure themselves against cyber attackers who are becoming smarter and bolder with days. Although most business organisations have made some provision for security, it usually exists as a complex maze of vendors and solutions that rarely integrate or even communicate with each other. Managing overall security in such an environment is challenging, expensive and not fully effective. What Indian organisations need to aim for is an integrated security solution that is open, automated and simple. Perceptions Despite escalating threats, confidence in security technology is riding high in Indian organizations. In 2016, 69 percent of CISOs and security operations professionals in India said that their security infrastructure is very up to date and is constantly upgraded with the best technologies available; in the previous year, this figure stood at 61 percent. Note that the number is also significantly higher than the 58 percent of respondents in the global Cisco 2017 Security Capabilities Benchmark Study who said the same thing. Only 26 percent of respondents from India, compared to 37 percent globally, said that they replaced or upgraded their security technologies on a regular cadence but were not equipped with the latest and greatest tools. Constraints Despite being equipped with the right solutions to detect threats and minimize their impact, security professionals in India find it a challenge to fulfil their agenda. Contrary to the global situation where budget is the primary constraint, in India, budget is no longer a key issue, having slipped to the joint 8th position in 2016, from 2nd place in the previous year. In 2016, the biggest barrier to adoption was organizational culture and attitude to security, closely followed by compatibility issues with legacy systems, and certification requirements and competing priorities in equal measure. Lack of knowledge about advanced security processes and technology was in fifth place. In 2016, 30 percent of security professionals in India said that organisational culture and attitude to security was the biggest barrier to adopting the latest security technology and processes. This is sharply up from the 2015 figure of 21 percent, when organizational culture issues ranked a low 9th among 10 obstacles. Incompatible legacy systems came 2nd, named by 28 percent of respondents. Last year, this was the top barrier, named by 36 percent of security professionals in India. Globally too, incompatible legacy systems were voted the 2nd biggest barrier in 2016 after budget constraints. Although they realize the importance of securing the business, Indian organisations seem to view security as an  impediment to business growth, which creates some amount of resistance to adoption. The presence of a large number of disconnected legacy security solutions makes it hard to implement a cohesive security policy. Having to meet the certification requirements of so many solutions is another challenge. Last but not least,organisations find it hard to stay abreast of the rapid advancement in security processes and technology. Ironically, too many point solutions can increase an organization’s vulnerability to attack if they don’t communicate and integrate with each other. Unfortunately, most security professionals in India, like their counterparts in other countries, have a tendency to juggle products from many vendors. This opens up gaps in time and space that cyber criminals can exploit, and prevents organisations from presenting a seamless defense to attack. A sizeable majority of companies – 56 percent of the total – use more than 5 vendors, and 69 percent use 6 or more products; these proportions are very similar to the global figures, which stand at 55 percent and 65 percent respectively. However, when it comes to using a very large number of vendors and products, Indian organisations are ahead of their global counterparts – about 19 percent use 21 or more vendors and almost 30 percent of companies have at least 26 security products, compared to 10 percent and 17 percent respectively, globally. A cause for concern is that the strong security infrastructure of Indian organisations is not translating into strong governance. The reasons include incompatibility of solutions, unavailability of trained staff, and a lack of knowledge about the latest advances in security processes. Only 63 percent of alerts are investigated, of which 39 percent are deemed legitimate. Finally, only 47 percent of legitimate alerts are remedied. This is only marginally better than the global performance – globally, 56 percent of security alerts are investigated, of which 28 percent are legitimate. Only 46 percent of legitimate alerts are remedied. The following hypothetical example illustrates the seriousness of the issue. If an organisation in India records 5,000 alerts every day: It investigates 3,150 alerts (63 percent) and ignores 1,850 (37 percent). Of the 3,150 alerts that are investigated, about 1,229 (39 percent) are found to be legitimate, while 1,921 (61 percent) are not. Of the 1,229 legitimate alerts, the organization remedies only 578 (47 percent) and does not remedy the remaining 651 (53 percent) alerts. It is worrying that approximately 1 in 3 security alerts go uninvestigated. Organizations must introspect to understand what types of alerts are ignored and why. Do these alerts signal relatively trivial threats that might only spread spam, for instance, or do they pertain to much more serious issues such as a possible ransomware attack or critical damage to a network? Clearly, there is a need to raise the level of investigation. However, given the large number of alerts a typical organization receives every day, it would not be possible for an already burdened security team to investigate them all manually. The solution is to use automation and properly integrated security solutions to probe and analyse a greater area of the threat landscape. The fact that Indian organisations ignore so many threats each day creates doubts about their…

Read More

SSSDC Offers for A Designate Safe and Sound School

The brutal murder of seven year old Pradyuman Thakur at Ryan International School, Gurgram has left the Nation shocked and horrified. While the entire country is sharing grief with Pradyuman’s family, parents are raising concerns about the security and safety of their children in schools and other academic organisations. Frequent similar cases of security and safety lapses substantiate that institutions are not able to carry out due diligence in their premises on their own, and they need the assistance of expert agencies/ individuals to guide them in this endeavour. Security Sector Skill Development Council (SSSDC) has sought to engage with the Central Board of Secondary Education (CBSE) to educate school management and administrators to provide them with the objective and expert based school safety and security principles, and help them become ‘a designate safe and sound school’ as enumerated in CBSE safety guidelines. SSSDC works under the aegis of National Skill Development Council (NSDC) and Ministry of Skill Development & Entrepreneurship (MSDE) in the security domain. Maj. Gen. K. Sakhuja (Retd.), CEO, SSSDC said, “The Council is responsible for standardization of security training across the country. It has the expertise in training ‘security risk management auditors’ for both physical and electronic security systems. The auditors so trained are professionally competent to identify the gaps in security and advise the stakeholders on optimum solutions. They are fully aware of the statutory guidelines enumerated in Government directives, thereby contributing in the national focus of crime prevention.” The Council offers to help schools in identifying security gaps, upgrading their safety and security mechanisms and systems, and creating, updating and exercising emergency preparedness and crisis management plans. This is done through security audits, deployment of security guards through PSARA licensed private security agency, training and assessment of presently employed security guards under Recognition of Prior Learning (RPL) program, and psychometric testing of the deployed workforce, if necessary. “SSSDC has devised a two day special audit module for security auditors whereby experienced security personnel will be taught about specialized ways of dealing with safety and security of school children,” said Kunwar Vikram Singh, Chairman, SSSDC. The Ministry of Human Resource Development, Govt. of India has issued a comprehensive set of guidelines vide D. O. letter No. 10-11/2014-EE.4 dated 09.10.2014 (Annexure-1) regarding preventive mechanisms and procedures for institutionalizing a system to ensure safety and security of children in schools. From time to time the CBSE Board has also issued instructions to the affiliated ones to implement and sensitize the schools towards ensuring the safety and security of students during school time and while in transit to school and back home. It is a fundamental right of a child to engage and study in an environment where he/ she feels safe, and is free from any form of physical or emotional abuse or harassment. As the children spend most of their time in school, the concern of parents about their safety in schools is obvious. Growing incidents of child abuse are increasing their anxiety day by day and they are more concerned about the physical safety, and mental & emotional health of their children. The onus for safety and security of children in school campus solely lies upon the school authorities. Schools should strive to promote a better understanding amongst their teachers and staff on the laws protecting the safety, security and interests of the students, and devise means to take immediate remedial and punitive action against such violations. The staff members should be educated to recognize their protective obligation towards students and to ensure safety and well-being of children in schools. The Board has recently reiterated to all schools affiliated with CBSE to strictly adhere to all the guidelines issued by MHRD and Board from time to time. Any violation/ lapses with regard to safety and wellbeing of children in school campus would invite appropriate action including the disaffiliation of the school as per the provisions under Affiliation Bye-Laws of the Board. Guidelines Get the security/ safety audit done of their premises and personnel from their respective local police station, and follow the security related advice for the safety of school children. This may be compiled and reported online on CBSE website www.cbse.nic.in within 2 months of receipt of the circular. Install CCTV cameras at all vulnerable areas/ points in the school premises and ensure they are functional at all times. They must get the police verification and psychometric evaluation done for all the employed staff. Ensure that supporting staff is employed only from authorized agencies, and proper records are maintained. Constitute a parent-teacher-students committee to address the safety needs of the students and to take regular feedback from parents in this regard. The access to school building by outsiders should be controlled and visitors monitored. Provide training and development for staff to address their responsibilities to protect children from any form of abuse. The school shall constitute separate committees for redressal of public/ staff/ parents/ students grievances; internal complaints committee on sexual harassment, and committees under POCSO (Protection of Children from Sexual Offence) Act, 2012; and details of the these committees along with contact details shall be displayed prominently on school notice board and conspicuously on the school website for information of all stakeholders. After the unfortunate incident of the death of Pradyuman, many schools have approached us to help them carry out security audits of their institutions. Since SSSDC supervises and guides the government approved institutes where security guards are taking trainings today, we decided to collaborate with the CBSE to help schools strengthen their safety and security apparatus Kunwar Vikram Singh Chairman, SSSDC  

Read More

Securing Outdoor Assets with Trusted Alerts

Safeguarding outdoor assets in a reliable and cost-effective manner often comes down to a single requirement – accurate intruder alerts and timely information about the unfolding event. While there are many technologies available for outdoor security, smart cameras with video analytics have emerged as the solution of choice for detecting intruders in real time outdoors. Yet the best technology will be handicapped if the alerts generated cannot be trusted. Repeated false alarms can eventually condition security operators to ignore real intrusions, undermining trust in the perimeter security system. In most cases the shortsighted response is to single out the security force as scapegoats, which ignores the real problem – alert fatigue. After responding to hundreds of perimeter breach alarms that turn out to be nothing more than small animals or windblown branches, even the most conscientious security guards lose confidence in the system and start to ignore its warnings. There is no longer any reason for this situation to exist. This design guide relates how smart video security technology, when properly deployed according to best practices, can cost-effectively protect outdoor assets with high accuracy and low nuisance alerts to help security forces stop intruders before they act. Start with the best detection: Use smart thermal cameras Viable outdoor security must start with a sensing system that is accurate, 24-hours per day. For this reason, conventional wisdom asserts that smart thermal cameras are the best system for detecting intruders outdoors. This is because thermal cameras see heat rather than light, so they are a perfect ‘human detector,’ and will ignore headlights, reflections off water, and other light-based activity, expanding their usefulness from their traditional role as night vision cameras to 24-hour intrusion detection solutions. Smart thermal cameras with built-in video analytic software offers several advantages: They detect in the dark with no need for costly artificial lighting. They work 24 hours/ day. They ignore reflections, shadows, moving headlights, direct sunlight, and other light-based phenomena that can trigger alarms in a visible camera detection system. Because humans give off heat, thermal sensors are far more effective in spotting a person than visible cameras. They detect body heat as far away as 600 meters – a third of a mile. A single thermal camera can protect an area the size of a football field. Proper physical design makes them immune to the effects of weather and other environmental factors. In the past, the higher price for thermal technology limited their use in commercial applications, but as costs continue to fall, many organizations are now able to choose thermal cameras as the foundation for their outdoor detection applications. Geo-registration and detection accuracy Smart thermal cameras are designed to detect movement, but outdoors, everything moves. A smart camera must be able to tell the difference between small objects such as leaves or debris and a person entering a secured area. One of the best ways for a camera to make this determination is through ‘geo-registration’ which provides the actual location and true size of all pixels in the camera’s field of view. Consider how human vision works: Our eyes give us depth perception – we can tell which object is close and which is far. But a ‘one-eyed’ camera can’t, unless it’s geo-registered. For example, a small animal near the camera will look much larger than a man at 300 meters away. (Figure 1) A smart camera needs to ignore the animal at right while alerting on the distant person, even though the animal will cover more of the camera’s field of view. The same approach applies to blowing trash, clouds, and other moving things which are always present outdoors. With a camera that is geo-registered, such non-security related movement will be ignored and will not send alarms. Essentially, geo-registration enables a three-dimensional capability for a smart thermal camera. From this information, geospatial analytic rules can be used to eliminate movement based on size while still detecting human-sized intruders under all conditions. Geo-registered analytics in action: From-to Zones Motion zones are often used by video analytic systems to detect the movement of objects and to send an alert to notify security that an intruder has been detected. By default, any object moving within a motion zone triggers an alarm. However, when used for outdoor applications, motion zones can lead to an abundance of nuisance alerts because they lack the discriminating intelligence to recognize the difference between ‘unimportant’ movement caused by the natural environment and ‘relevant’ movement that represents a security threat. Cameras that are geo-registered can create more intelligent rules called From-To Zones, an important tool for reducing nuisance alerts while maintaining a high probability of detection. Targets detected in a From-To Zone will only trigger an alarm when a specifically sized object – such as a person – moves from one zone into another defined area of the camera’s field of view. Correspondingly, objects that are not detected coming from one zone into the other are ignored. From-To Zones are a very powerful method for reducing unwarranted alarms. Importantly, they can be configured to detect zones that are geo-registered to the ground. This means From-To Zones will only alarm when a person’s feet have been in the ‘From’ and then enter the ‘To’ area, while ignoring detections that only show a part of a person such as their head. This is particularly useful when the security area includes a fence, and you only want to detect pedestrians who have crossed over the perimeter into the security zone. To see how From-To Zones work in the real world, consider an application where you need to detect pedestrians approaching the perimeter, but are not concerned about people leaving the building. With From-To Zones, the camera will only trigger an alert when intruders move towards the facility – ignoring everyone else, and greatly reducing unnecessary alarms. For another example, consider a windy perimeter around an active construction site where trash blows around the scene. Inevitably, the trash will collect along the fence and grow in size…

Read More