securitylinkindia

MassMediaLink India LLP SecurityLink India

Reasons to Upgrade Access Control Technology

The security landscape continues to evolve in new and complex ways. This evolution brings change on many levels, which offers an opportunity for improvement rather than an interruption or a distraction. This concept has never been more important as you face today’s combination of new technologies, escalating security threats and the need to derive greater value from the access control infrastructure while solving increasingly complex system integration challenges. Upgrading from older, legacy technology to a new access control standard is a significant initiative. However, recent advancements have made this transition easier. Organizations can now move from solutions to more dynamic access control technologies that provide greater value. Adopting a new technology standard allows organizations to take advantage of enhanced functionality and a higher level of security. Access control is moving to more integrated systems with multi-layered security that can include multiple facilities. Today’s more dynamic solutions allow organizations to embrace new levels of convenience and utility. Organizations need not only support the requirements of today, but must also look ahead to the needs of tomorrow. The initial motivation to adopt a new standard of access control may be to improve security or to consolidate multiple locations under a single standard. Now is the time to use advances in access control to build a foundation for addressing unanticipated change and evolving security threats. Strong organizations will take full advantage of the opportunities that upgrading to a more modern solution affords. Reasons to upgrade Data privacy As a result of new legislation or regulatory requirements, an organization may be required to increase its security. Similarly, if a company acquires a new client needing a high level of safety, there may be requirements to improve access control. New building tenants may also trigger the need for greater building or campus security, either to protect the parent organization or to comply with the tenant’s requirements. Implementing new, more dynamic access control technologies provides many benefits over maintaining older, more static ones. Organizations are facing an environment of evolving threats, and the challenges of maintaining the security and privacy of identity data are ever greater. Growing demand for a higher level of security and the convenience of using mobile devices for access control is driving change and spurring innovation. The unfortunate reality is that sometimes it takes an unexpected event or security breach to prompt an organization to upgrade their access control system. By making the right steps in moving toward a more reliable, upgraded access control standard, organizations can meet the need for security and privacy with confidence, leveraging investment well into the future. User convenience The freedom to move access control to phones, tablets, wristbands, watches and other wearables offers choice and convenience to end users, along with new and more convenient ways to open doors and gates. Today, smart devices are always on hand. Users do not have to maintain and carry multiple cards or keys. In parking garages or at driveway gates, for example, the longer reach of the Bluetooth smart communications standard makes it possible to drive up to the gate without having to roll down the car window and reach out to activate a reader. Some smart device sensors, most notably the gyroscope and accelerometer, enable gesture detection. This offers an additional benefit for access control – the ability to open doors from a distance by performing intuitive gestures. This provides an extra layer of authentication for added security. It is predicted that there will be nearly 155 million smart wearable devices in use by 2019. These truly ‘always-on’ devices are even more natural candidates for access control applications because of the ready-to-use convenience of a wearable device. Flexibility Organizations need a platform that is flexible enough to support multiple applications for managing not only physical access (e.g., buildings) but for managing logical access (e.g., computer/ software login, time and attendance, etc.) as well. Organizations that want to add new applications such as time and attendance, secure print management, biometrics, cashless vending and more, will need to issue an associated card to users. This requirement can be used as an opportunity to migrate to a contactless wearable or smartphone that combines access control with these or other functions, enabling employees to carry a single device for many purposes. Administration of these functions should be centralized into one efficient and cost-effective system to enable organizations to create a fully interoperable, multi-layered security solution across company networks, systems and facilities. In the future, they can migrate to the convenience, editability, and security of carrying digital keys and credentials on smartphones and other mobile devices. Data privacy, user convenience and flexibility go hand in hand Organizations have been tasked with keeping up with a variety of technology changes that impact the physical access control (PACS) infrastructure. These changes include accommodating two-year PC refresh cycles, 18 month average mobile device lifespans and policy changes surrounding the move to ‘Bring Your Own Device’ (BYOD). Additionally, there is increased network access via mobile devices due to the rapid growth of tablets, laptops and smartphones. Legacy security solutions often use proprietary technology that is static, providing little or no possibility for functional enhancement, or the ability to offer higher levels of data privacy. This inability to adapt makes them easy targets for attack. Often, legacy technologies are anchored to obsolete software, devices, protocols and products, making it difficult for the access control infrastructure to facilitate change. Built on breakthrough technologies, the latest high frequency access control systems ensure security is independent of hardware and media. This makes it much easier for organizations to support new functionality and higher levels of data privacy. They also enable the provisioning of secure identity credentials to smart devices, offering organizations the choice to use smart cards, mobile devices or both. Additionally, they offer functionality for access control beyond the door, which may include secure print release, network access, time and attendance or cashless vending. Upgrading your access control technology: A solid investment If you continue to invest in outdated…

Read More

CVEs Abound But Not Enough for Enterprises

A recent article by Taylor Armerding of CSO Online explores the current state of the Common Vulnerabilities and Exposures (CVE) program managed by MITRE. He expands on the creeping belief that the CVE, the old-guard vulnerability ‘dictionary,’ is falling behind and leaving security teams and technologies that rely on it open to risk. And although MITRE is taking measures to close the gap – including dedicating more resources to vetting and assigning CVE identifiers to vulnerabilities – the response among some experts is that these will not be enough to rectify the outdated model. MITRE has certainly made strides to bolster the system, logging 6,592 new vulnerabilities with CVE IDs in the first half of 2017 alone – compare that to 6,431 CVE IDs logged in all of 2016. From January to June of this year, MITRE has published on average 1,133 new CVE IDs each month. That’s a 210 percent increase over the 536 new CVE IDs per month average of 2016. While increasing the number of vulnerabilities catalogued by the CVE system is generally good (many technologies use CVE IDs and some baseline vulnerability management programs rely on them almost entirely), it still doesn’t solve the issue of prioritization. Enterprises already have hundreds of thousands – even millions – of vulnerabilities in their organization. Assigning more CVE-IDs doesn’t directly lead to better security or even signify that more vulnerabilities exist today than in the past – it means more efforts are being dedicated to discovering, analyzing and cataloging vulnerabilities. Combined with a technology environment in a state of constant proliferation, this inevitably means more CVEs and vulnerabilities in general. Currently, organizations are overwhelmed with too many vulnerability alerts to manage proficiently, so many of them are looking to advanced vulnerability management programs to help them better prioritize. In a recent report on vulnerability prioritization, Gartner analyst Craig Lawson points out that the lofty goal of ‘patch everything, all the time, everywhere’ is not only rarely fulfilled, it’s causing friction between IT security and IT operations. Focusing on the right vulnerabilities Vulnerability teams, however, don’t need to patch everything all the time. The same report states, “Only a small number of vulnerabilities go on to be exploited in real-world attacks.” This means vulnerability management programs should be structured to help teams zero in on the vulnerabilities most likely to be used in an attack – a smaller portion than all CVEs. Exploited vulnerabilities only make up a single digit of CVE-ID vulnerabilities published each month. (The spike in March 2017 in the chart below represents the vulnerabilities leveraged in the Eternal Blue exploit, famously used in WannaCry and NotPetya.) Vulnerabilities with a published proof-of-concept exploit (but inactive) represent a slightly larger portion, but still total less than 100 vulnerabilities published per month. With this information, security teams can: Focus resources on the vulnerabilities that are actually exploited in the wild first, as those are the ones that pose imminent threat to the organization. Employ mitigating controls (e.g., intrusion prevention systems, network segmentation, application controls, privileges management) to prevent lower priority vulnerabilities from being exploited when those vulnerabilities can’t be patched in a reasonable period of time, or when there is no patch available. To help classify vulnerability risks even further, the Common Vulnerability Scoring System (CVSS) was developed over ten years ago to help organizations prioritize vulnerability remediation. It is a reasonable approach to vulnerability remediation in theory; however, implementation was never fully realized because of the lack of vendor resources. So, only base CVSS scores have been used and have proved insufficient for prioritizing vulnerability remediation. Unfortunately, this is the method many vulnerability management programs rely on. For all of its shortcomings, CVSS scores don’t consider the organization’s unique environment, the current threat landscape and other situational factors. For example, a vulnerability with a ‘high’ CVSS score may not be exploitable in a particular network if the surrounding architecture and security policies provide sufficient defense. Similarly, a CVSS high-severity vulnerability on a low value asset is less of a priority to fix than a CVSS medium severity vulnerability on a business critical asset. Cyberattackers frequently leverage vulnerabilities carrying a medium severity CVSS score, perhaps because they know many vulnerability management programs are only capable of fixing CVSS critical vulnerabilities, never making it to the lower ranking items on their to do list. The 2016 Verizon Data Breach Investigations Report also points out that successful exploits from the previous year targeted a large number of vulnerabilities with CVEs assigned more than five years ago – presumably, that organizations never got around to fixing. How Skybox is improving vulnerability prioritization At the Skybox Research Lab, our team of analysts daily scour more than 30 security data sources and investigates more than 700,000 sites, including in the dark web. With this research, the Lab provides insight to active and available exploits, vulnerabilities being packaged in ransomware, exploit kits and other tools in use by various attackers. The Research Lab has its own vulnerability catalog, which includes CVE vulnerabilities. But roughly 10 percent of this catalog also covers vulnerabilities with no CVE ID, including many on technologies in the IoT domain. This gives Skybox users a more complete scope of the vulnerabilities that could threaten their security. With the added intelligence of how vulnerabilities are being targeted in the wild, the Research Lab provides much needed context to improve prioritization in terms that put vulnerabilities posing an imminent threat at the top of your to do list. By focusing on vulnerabilities with active or known exploits as well as vulnerabilities that are exposed in your network (no mitigating controls in place), organizations can more effectively use existing resources to minimize the risk of a breach. However, this should be augmented with gradual risk reduction over time of the other vulnerabilities in the network i.e., through mitigation or patching, which could turn into threats over time. While both CVE and CVSS provide relevant information to vulnerability management programs and technology, they fall…

Read More

Weak Adoption of Wireless Intrusion Sensors

IHS Markit estimates that 68 million intruder alarm sensors were sold globally in 2016; of which 41 percent were wireless, according to the latest intruder alarm and monitoring database. However, just 4 percent of those wireless sensors were destined for the large commercial sector. Residential and small-medium business sectors jointly accounted for the remaining 96 percent of the wireless sensor market. Although the use of wireless sensors remains limited in the commercial sector, the popularity of these products is on the rise for several reasons. Wireless sensors carry significantly lower installation costs as the installation process is much simpler and quicker. The lower installation cost allows companies to allocate a greater portion of their security budget to hardware, enabling them to invest in additional or higher-quality sensors, or upgrades for the system such as integration with video surveillance. Wireless solutions are also more practical in unique installations like remote areas without easy access to the power mains. To overcome range issues, mesh networks, which act as signal repeaters, are used for larger installations. Moreover, as the use of wireless sensors proliferates across commercial applications, consumers may choose to adopt wireless control panels, to allow for easier future addition of extra sensors, as they won’t require on-site IT configuration to add to the system. Prices of wireless sensors have also fallen fast, decreasing by 16 percent since 2012. Battery lifespan of wireless sensors has also improved in recent years, now lasting between one and five years depending on circumstances. Although enhancements have been made, limited lifespan of sensor batteries will put pressure on the security systems manager, necessitating the procurement of software that will allow to easily manage battery statuses. More wireless sensors are available with UL certification, a prerequisite for many professional monitoring and insurance providers. Although wireless sensor technology is making inroads into commercial projects, concerns remain such as encryption, sensor price and ongoing maintenance costs. Despite improvements to encryption for wireless systems, the risk of being hacked is still a common concern amongst large commercial end users. For example, wireless sensors are susceptible to jamming and signal interference, and if the system’s control panel is compromised the entire network of wireless sensors can be rendered useless by disabling the wireless module. Wireless sensors are also more expensive than their wired counterparts. For example IHS Markit found that globally a wireless PIR sensor costs 30 percent more than a wired variant on average. The maintenance costs of wireless sensors are also higher, with the requirement to buy and maintain a set of spare batteries for replacement or re-charging. Despite the challenges facing wireless security sensors in large-commercial applications today, manufacturers and installers that promote and install wireless sensors will likely reap the long-term benefits of the devices. Vendors with strong after sales service, such as customer service and maintenance, would be able to improve efficiency and speed of service by capitalising on the greater ease with which wireless sensors can be added to the system. This will lead to shorter installation times allowing them to serve more customers in a set period of time. As wireless sensors are adopted on a wider scale the significance of battery management system solutions will become apparent. Suppliers with the best battery management software, that is easy to use with interactive interface, are likely to seize the best of this opportunity. Manufacturers of wireless sensors could further improve their products’ market opportunities by working closely with insurance providers and educating them about the benefits of wireless systems in commercial applications as well as their technological features. Entering into partnership with insurance providers may provide avenues for long-term impact.

Read More

Protective Clothing for Firefighters

High-quality equipment is important for fire services because this provides the best possible protection when fighting a blaze. Post-deployment hygiene should not be neglected. This is because contamination can lead to considerable health hazards. The A+A as the world’s leading trade fair with congress for safety, security and health at work presents everything revolving around modern protective clothing for firefighters in Düsseldorf from 17 to 20 October 2017 International studies show that firefighters are at a greater risk of cancer than the average population. It is assumed that the reason for these risks are fumes whose poisonous particles are deposited in protective clothing after fires and which can enter the bodies of emergency personnel through their skins or respiratory organs. “New findings on the dangers of contamination of the most varied kind lead both to uncertainty, and at the same time, rising demands concerning the nature and implementation of care, control and repair,” says Daniel von Chamier, COO at the LHD Group Deutschland GmbH. “Basically the clothing should be cleaned more regularly but then it also has to be able to withstand this washing,” says Klaus Hawerkamp from the Heinsberg protective wear supplier S-Gard. Washability is extremely important – this is also confirmed by Austrian work and firewear manufacturer Texport, “It is the whole package that affects the durability and waterproof seal of the seams just as it does repair suitability,” says Sales Manager Uwe Heinemann summing up, “We have, for a long time already, been intensively involved in emergency hygiene – a topic the fire service will also have to increasingly deal with in the future so as to be able to test and evaluate the solutions offered.” On the other hand, there is also the issue of stricter European environmental legislation which might ban specific polyfluorised chemicals and thus the impregnated finishes that reduce the soiling of clothing at present. At the same time, soiling that penetrates the fibres making it rather hard to remove represents safety and health risks for the users. Measures against contamination There are different approaches to deal with the issue of soiling and contamination. Post-deployment firefighters should already remove their outer jackets and trousers at the deployment site and ensure they first remove clothing and then air supply. If it was an intense, very demanding fire they should even shower at the deployment site to prevent any spread of contamination. Another measure is separating black and white clothing. This aims to keep soiled clothing away from clean areas, such as deployment vehicles and fire stations. However, there are no binding rules and regulations about when and how often fire fighters should have their clothing cleaned. Despite all the logistical challenges, approaches are already emerging where members of fire brigades are offered a change of clothing already at the deployment site. The fire service in the Swedish city of Göteborg has developed another concept. Here the outer fabric of the protective clothing can be separated from the other layers so the firefighter enters the vehicle just wearing insulation lining and membrane. Furthermore, there is a tendency to purchase two sets of equipment per firefighter which meet different levels of protection. Since on most deployments technical assistance is required such as evacuating an accident site, removing oil or saving the oft cited cat up a tree, less insulating clothing with a flame-retardant outer fabric is usually enough. Berlin fire brigade is already using a two-level approach with heavy-duty equipment for firefighting and a lighter version for technical assistance. Different materials, different colours To prevent soiling and any potential accompanying contamination the dark coloured items are on the decline. “There is an increasing switch to pale colours so you can see any soiling,” explains Texport Sales Manager Uwe Heinemann. “Sand tones or gold are being sold more and more frequently in Germany,” echoes Klaus Hawerkamp from S-Gard. This is also due to the increasing proportion of PBI® or Nomex® outer fabrics used. Nevertheless, classic navy is still accounting for the lion’s share of firewear, followed by red. Furthermore, workwear is also having an impact on protective clothing where increasingly two-colour jackets are offered. Orange is now practically out of the picture. Materials are a very important topic because they contribute considerably to performance and weight. They are becoming ever lighter and more functional. Furthermore, they should be highly tear-resistant and visible thanks to high-vis materials. In view of the debate on soiling, in particular, they need to be easier to wash or withstand regular washing without losing any functionality. Layering plays an essential role. Moisture must be able to diffuse as quickly as possible to the outside. Because, along with thermal protection, effective moisture management has significant advantages for firefighters. If sweat is quickly transported outwards the risk of heat accumulation and thus the risk of burns is significantly reduced. This gives firefighters more time to react. Furthermore, there is a new generation of reflex stripes that meet EN 469 flame-retardant requirements and which can be washed at 60°C. Their greater breathability also makes for greater wear comfort. HuPF guideline no longer binding The German guideline for the manufacture and testing of firefighting garments HuPF is one that is no longer binding on its own anymore in many German federal states. For this reason things have changed somewhat when it comes to design as there is more freedom now. “It has been conceded that padding and pockets reduce breathability. What’s more they add weight,” says S-Gard-Sales Manager Klaus Hawerkamp. Generally, pockets are specially adapted to their function being smaller and adjustable for digital radio or other radio devices. According to Texport, patch pockets are among the trends so as not to reduce freedom of movement and wear comfort. “Every fire service also has different requirements,” explains Uwe Heinemann. Flaps are becoming ever more popular – microphones, gas alarms and the like can also be attached to them and they themselves scarcely weigh anything. In addition, weight appearance is also gaining importance even though protection is…

Read More

Cyber-Threat Intelligence and Information Sharing

Cyber-attacks continue to increase in frequency and sophistication, presenting significant challenges for organizations that must defend their data and systems from capable threat actors. These actors range from individual, autonomous attackers to well-resourced groups operating in a coordinated manner as part of a criminal enterprise or on behalf of a nation-state. Threat actors can be persistent, motivated and agile, and they use a variety of tactics, techniques, and procedures (TTPs) to compromise systems, disrupt services, commit financial fraud, and expose or steal intellectual property and other sensitive information. Given the risks these threats present, it is increasingly important that organizations share cyber-threat information, and use the community’s experience to improve their security posture. Cyber-threat information is any information that can help an organization to identify, assess, monitor, and respond to cyber-threats. Examples of cyber-threat information include indicators (system artifacts or observables associated with an attack), TTPs, security alerts, threat intelligence reports, and recommended security tool configurations. Most organizations already produce multiple types of cyber-threat information that are available to share internally as part of their information technology and security operations efforts. By exchanging cyber-threat information within a sharing community, organizations can leverage the collective knowledge, experience and capabilities of that sharing community to gain a more complete understanding of the threats the organization may face. Using this knowledge, an organization can make threat-informed decisions regarding defensive capabilities, threat detection techniques and mitigation strategies. By correlating and analyzing cyber-threat information from multiple sources, an organization can also enrich existing information and make it more actionable. This enrichment may be achieved by independently confirming the observations of other community members, and by improving the overall quality of the threat information through the reduction of ambiguity and errors. Organizations that receive threat information and subsequently use this information to remediate a threat confer a degree of protection to other organizations by impeding the threat’s ability to spread. Additionally, sharing of cyber-threat information allows organizations to better detect campaigns that target industry sectors, business entities, or institutions. NIST has published Special Publication (SP) 800-150, Guide to Cyber-Threat Information Sharing, to assist organizations in establishing and participating in cyber-threat information sharing relationships. The publication describes the benefits and challenges of sharing, clarifies the importance of trust, and introduces specific data handling considerations. To show how sharing and coordination can increase the efficiency and effectiveness of an organization’s cybersecurity capabilities, NIST SP 800-150 presents some scenarios that describe threat information sharing in real-world applications. The goal of the new publication is to provide guidelines that improve cybersecurity operations and risk management activities through safe and effective information sharing practices, and help organizations to plan, implement, and maintain information sharing. Basics of Cyber-threat information sharing NIST SP 800-150 introduces basic cyber-threat information sharing concepts including types of cyber-threat information and common terminology. The publication also examines potential uses for shared cyber-threat information and explores the benefits and challenges of threat information sharing. Threat information is any information related to a threat that might help an organization protect itself against a threat or detect the activities of an actor. Major types of threat information include the following: Indicators are technical artifacts or observables that suggest an attack is imminent or is currently underway or that a compromise may have already occurred. Tactics, techniques, and procedures (TTPs) describe the behavior of an actor. Security alerts, also known as advisories, bulletins, and vulnerability notes, are brief, usually human-readable, technical notifications regarding current vulnerabilities, exploits, and other security issues. Threat intelligence reports are generally prose documents that describe TTPs, actors, types of systems and information being targeted, and other threat-related information that provides greater situational awareness to an organization. Threat intelligence is the threat information that has been aggregated, transformed, analyzed, interpreted, or enriched to provide the necessary context for decision-making processes. Tool configurations are recommendations for setting up and using tools that support the automated collection, exchange, processing, analysis, and use of threat information. The primary goal of the publication is to foster similar threat information sharing practices across organizational boundaries – both acquiring threat information from other organizations, and providing internally-generated threat information to other organizations. Threat information sharing provides access to threat information that might otherwise be unavailable to an organization. Using shared resources, organizations can enhance their security posture by leveraging the knowledge, experience, and capabilities of their partners in a proactive way. Allowing ‘one organization’s detection to become another’s prevention’ is a powerful paradigm that can advance the overall security of organizations that actively share threat information. Organizations that share cyber-threat information will benefit by gaining situational awareness, which will, in turn, help to improve security posture and risk management practices. As seemingly unrelated observations are shared and analyzed, those can be correlated with data collected by others, helping to mature community knowledge. This improved community understanding helps organizations remain better informed about changing TTPs and how to rapidly detect and respond to threats. Such agility creates economies of scale for network defenders while increasing actors’ costs by forcing them to develop new TTPs. While sharing threat information clearly has benefits, certain challenges remain. Some challenges that apply both to consuming and to producing threat information are: Establishing trust; Achieving interoperability and automation; Safeguarding sensitive information; Protecting classified information; and Enabling information consumption and publication. NIST SP 800-150 identifies several information challenges that apply only to the consuming of threat information and other challenges that apply only if an organization wants to provide its own information to other organizations. Establishing sharing relationships NIST SP 800-150 recommends the following planning and preparation activities in relation to launching a threat information sharing capability: Define the goals and objectives of information sharing; Identify internal sources of threat information; Define the scope of information sharing activities; Establish information sharing rules; Join a sharing community; and Plan to provide ongoing support for information sharing activities. Throughout this process, organizations are encouraged to consult with subject matter experts both inside and outside their organization. Such sources include: Experienced cybersecurity personnel; Members…

Read More

Putting Physical Security Systems on the Cloud

The cloud era has the potential to change every aspect of physical security, offering alternative ways of doing things, opportunities to realise greater long-term value from legacy systems, and capabilities that have simply never existed before. Working together, smart devices and IP networks can realise remarkable benefits in diverse areas, including cost, installation, efficiency, integration, business automation, monitoring, situational awareness and ease of use. Software is always up to date without the need for on-site work and systems can be quickly and easily adapted to user requirements. One of the perhaps unexpected effects of cloud is that, for many organisations, and particularly those operating or moving towards ‘smart’ environments, security systems are shifting from being ‘grudge purchases’ – made only when they absolutely must be – to desirable investments that can secure specific, tangible, measurable business benefits. The security sector has been slow to adopt cloud technology, in part because of natural, but now somewhat out of date concerns over putting security services ‘out there’ rather than keeping them ‘safely’ in-house. The extent of this shift and the speed with which it can take effect, though, are dependent on how effectively security providers address the challenges arising for organisations wishing to take advantage of the new capabilities and benefits offered by cloud. This is particularly the case when a move away from a traditional systems approach is being considered. Choose the right provider Many long-standing security providers simply lack the necessary skills and knowledge to address the complexities inherent in the integration of diverse systems, particularly over IP networks. Conversely, new entrants to the market from the world of IP networks, while bringing networking expertise, often lack understanding of security systems. Furthermore, they often do not fully understand, or sometimes even perceive, the complex legal and technical issues that can arise. It is beyond question, though, that in the world of physical security, the cloud is here to stay, just as it is in the consumer world of smart watches, fitness trackers and satnavs. Earlier this year, Gartner predicted that in 2017 we would see 8.4 billion connected ‘things’ – an increase of over 30% on 2016. It would be foolish indeed to ignore such growth and the immense benefits that the technologies driving it can deliver as they connect previously disparate devices and data sources. Nevertheless, the security sector has been slow to adopt cloud technology, in part because of natural, but now somewhat out of date concerns over putting security services ‘out there’ rather than keeping them ‘safely’ in-house. Cloud integration essentials Appropriate expertise and experience are essential when it comes to cloud integration. Decisions must be made as to which facilities, services and infrastructure to move to the cloud right away, which to move later, and which should stay on-premises for the foreseeable future. There will be pros and cons for each device and service, which need to be fully understood to make the right decisions. Often a hybrid or staged approach is the right choice – for example, embracing secure hosted services now with a view to full cloud migration as part of a longer-term plan. When planning the implementation of new and migrated systems, a seamless transition is usually essential. Risks must be fully understood and mitigated, and users and others brought up to speed rapidly, and then supported effectively on the new facilities. Such issues mean you need a security partner that can provide expert counsel on both technical and commercial matters from the very start of the engagement. Exploring the idea Often, the first major challenge with any new technology comes at the exploratory stage, before any actual migration is even planned. Exploring potential risks and benefits, and convincing key players within the organisation that a move towards cloud should be made, can be challenging indeed without specialist knowledge in a variety of arenas, including IP networking, cloud infrastructure, applications and services, legacy systems integration and, of course, the cloud-based solutions available. A capable, experienced security systems integrator (like Reliance High-Tech) will work closely with you to fully understand the detail of your existing infrastructure, and your aims and objectives, as well as budgetary, technical and other constraints. Working from that basis they can then advise on strategic options and help you communicate the benefits to interested parties across your organisation.

Read More

Seven Top Reasons to Use Multi-Tier Storage Solution for Surveillance Content

1. Lower your storage spend –  Organizations are keeping as much as 40% of their inactive data on their most expensive infrastructure. With unstructured video growing exponentially, fueled by the rise of new video surveillance programs, you can’t afford to have this kind of inefficiency. Then the solution is to adopt a multi-tier storage system that automatically migrates your video to the most cost efficient tiers of storage. Whether that’s high-performance disk storage, object-based storage or high-capacity primary storage, file-based tape or the cloud – your organization can cost-effectively store data based on various policy requirements. 2. Easy, immediate access Finding a file in your system should be no more difficult than finding a document on a C: drive. Quantum’s solution for video surveillance is a single file system, built specifically for video applications. On the backend, retention and access policies can be set to handle data migration and simplify organization and file recall. 3. High performance Storage performance that performs inefficiently prevents companies from capturing usable data. Quantum’s StorNext software retains data cost-effectively, supports complex video management systems and analytic applications, and ingests video from 4 times as many cameras per server to deliver time-to-decision results, allowing proactive protection and crime prevention. Quantum’s storage infrastructure not only handles this sheer volume of data with ease, but also delivers streaming performance regardless of whether it’s on disk, tape, or in the cloud. 4. Scale with your storage needs The ability to seamlessly integrate more sources of information into modern analytical tools is becoming more important, as is the capacity to scale and accommodate increased camera and sensor counts, panoramic coverage and higher image resolution. As more cameras are added, image resolutions increase and retention times become longer, Quantum’s solution can scale to handle the need for more capacity. 5. Compliant with your current infrastructure Quantum’s storage solutions support all major platforms, operating systems and networks, and integrate seamlessly with VMS and other systems. This enables security professionals to integrate the solution into their existing infrastructure without being locked into a single vendor or platform as well as to configure the file interface to receive input from a variety of devices and systems. 6. No trade-offs necessary To gain more insight and an increased return on investment from video surveillance data, a storage solution must balance high performance, high capacity and high retention. These three parameters can be flexed to provide the best trade-off between budget and mission whilst minimizing sacrifice of redundancy, accessibility or scalability. 7. Gateway storage architecture Upgrading storage capabilities while also satisfying budgetary restrictions is a challenging part of building a comprehensive storage infrastructure. Instead of replacing your pre-existing storage system, why not to build onto it! Artico™ offers an easy, nondisruptive choice for adding Quantum tape, FlexTier™, and Lattus™ scale-out storage to an existing security environment. Quantum’s StorNext platform is a policy-driven tiering software, allowing users to extend primary storage with scalable, more cost-effective tiers of storage. Our multi-tier solution is ideal for security and surveillance organizations with large amounts of video dealing with the challenges that come with scaling storage with your data growth. End users can set up policies to automatically migrate data across tiers, utilizing less costly types of storages like file-based tape and cloud, thus delivering the total capacity needed more cost effectively.

Read More

25k Crore Scheme for India’s Internal Security

Government approved INR 25k crore scheme towards internal security The Cabinet Committee on Security (CCS), headed by PM Narendra Modi, has recently approved a `25,000 crore internal security program to strengthen law and order, modernise police forces, and fight terrorism during  2017-18 to 2019-20. The scheme focuses on internal security, law and order, women’s security, availability of modern weapons, mobility of police forces, logistical support, hiring of helicopters, upgradation of police wireless, national satellite network, crime and criminal tracking network and systems and e-prison. This is introduced to assist states in upgradation of police infrastructure, forensic science laboratories and related institutions, and making equipment available to strengthen the criminal justice system. Mr. Singh further explained that a central budget outlay of 10,132 crore has been earmarked for internal security related expenditure for J&K, northeastern states, and those affected by the Left-wing extremism (LWE) under this plan. A scheme for special central assistance (SCA) for 35 districts worst hit by LWE has been introduced with an outlay of3,000 crore to tackle the issue of underdevelopment. This is the biggest ever internal security scheme in the country. The financial outlay for the scheme over the three years period is 25,060 crore, out of which the central government’s share will be18,636 crore and states’ share will be `6,424 crore  Rajnath Singh Minister of Home Affairs, Government of India  

Read More

Salman Khan Signed as CP PLUS CCTV Ambassador

CP PLUS has recently signed up Salman Khan, the Bollywood star, as the brand ambassador for their CCTV products. The association strengthens their innovative campaign called ‘Upar Wala Sab Dekh Raha Hai,’ already prevailing for past few years. CP PLUS, with this partnership, aims to reach out to masses to make them aware about the need for the intelligent security and surveillance in the society at all levels. The brand will come up with the next level of its communication on security and surveillance through its new campaign, with Salman Khan in action. Aditya Khemka, MD, CP PLUS said, “We are excited to partner with Salman Khan, as the super star of Bollywood exhibits the same level of passion, trust, and reliability as CP PLUS. Both Salman and CP PLUS are action-oriented brands and believe in re-inventing from time to time. With Salman Bhai, we intend to reach out to the masses and generate awareness on security and surveillance in India, and also inform people about the intelligent security systems available with us that are of immense importance in contemporary times.” CP PLUS range of solutions and products are monitoring millions of locations across India in diverse geographies from highly sensitive defence locations, government buildings, vital infrastructures, transportation, hotels, and educational institutes to homes with a satisfied customer base.

Read More

Videonetics Participated in TrafficInfraTech

Videonetics Technology, India’s leading integrated visual computing platform development company, showcased its complete portfolio of intelligent traffic management system (ITMS) including automatic number plate recognition (ANPR), red light violation detection (RLVD), over speed detection, E-challan and so on at the 6th edition of TrafficinfraTech Expo, held during 13 to 15 September in Hyderabad. The expo focused on educating target customers in the benefits of intelligent traffic monitoring, law enforcement, parking management, vehicle entry and exit management, and thus co-ordinated to provide safer roads to any city across the world. Nearly 4000 visitors from the traffic industry, enforcement authorities, Central Road Transport and Highway Ministry, National Highway Authority of India, various government & transport departments, infrastructure companies, infrastructure/ traffic institutes, municipal corporations etc., attended the expo. We have set a benchmark by highlighting our end-to-end intelligent traffic management system on our pavilion. The system is specially designed and architected to replace tedious manual processes like tracking, regulating and analyzing vehicle movement on roads, and to enforce traffic rules for safety of citizens and their properties. The system is integrated with video analytics solution in unified monolithic system architecture so that video surveillance and traffic monitoring services can complement each other and address the field issues with a holistic approach. – Arun Khazanchi CEO, Videonetics Being a part of TraffifinfraTech Show has always been a pleasure, and this year has been no different. Such vertical centric shows are important for us as they provide a platform to meet focused customers and understand their requirements. As our country’s mission is to build safe & smart cities and create safer environments for all, we at Videonetics have been innovating state-of-the-art technologies to meet versatile requirements of traffic management, aiming to deter traffic violations, reduce accidents and provide road safety to all. Avinash Trivedi VP, Business Development, Videonetics Technology  

Read More