securitylinkindia

MassMediaLink India LLP SecurityLink India

Reliance Protects Retail Staff

The maintenance division of this blue-chip customer supports over 6.5k sites across the U.K. This division employs circa 1400 engineers and frontline management staff. In November 2016 Reliance was awarded a contract to deliver a personal safety solution to protect staff. All staff are provided with a Personal Safety Device (PSD) which they wear as part of their compulsory PPE whilst at work. This device enables the user to raise various safety alerts and alarms 24/7 to specialist operators at the Reliance High Tech monitoring centre. The bespoke solution addresses important customer needs including the enhancement of the Reliance Protect Monitor proactive services to provide additional safety for staff, including when they out of mobile phone coverage. The solution utilises the Reliance Protect customer portal which incorporates online smart-forms and a unique e-Learning platform to assist device users and facilitate quicker deployment. Additional benefits include ‘super user’ training for managers, bespoke guidance booklets, attendance to Health and Safety events and bespoke usage reports for managers.

Read More

Intersec Looks Ahead to Further Success

Intersec is set to celebrate two decades of remarkable success when it opens doors in January 2018 in Dubai. The 20th anniversary edition will feature more than 1,300 exhibitors from 58 countries, while over 31,000 visitors from 128 countries are expected to attend as they seek the latest solutions across seven show sections of Commercial Security, Fire & Rescue, Safety & Health, Homeland Security & Policing, Perimeter & Physical Security, Cyber Security, and Smart Home & Building Automation. Intersec 2018 has added a new Drones Pavilion and indoor Drone Zone, while a wearable Security Pavilion will put the spotlight on advanced textiles including head-up displays, body cameras, embedded sensors, exo-skeleton communications and more. Ahmed Pauwels, CEO of Messe Frankfurt Middle East, the organiser of Intersec said, “Intersec continues to scale new heights as the world’s premier showcase of the latest security, fire, and life safety solutions. “Societies, governments and corporates are increasingly pulling out the stops to combat various threats and ensure the security of people, infrastructure, property and information. This has led to a resultant surge in demand for the latest safety and security products and solutions. “From the beginning, Intersec has paved the way for leading safety and security providers to access regional markets and facilitated many of the beneficial partnerships and relations forged over the years. By continuing to prioritise the showcasing of the cutting edge new developments and the latest technologies, we hope to continue to play a constructive role in making the region a safer and more secure place,” Pauwels added. According to analysts Frost & Sullivan (F&S), the Middle East homeland security market, comprising monitoring and surveillance systems, restricted entry systems and perimeter security solutions, is estimated to reach US$17.05 billion by 2021, growing at a compound annual growth rate (CAGR) of 15.6 percent between 2015 and 2021. “The commercial security market too has witnessed an upswing throughout the region creating opportunities for suppliers of video surveillance, access control and intrusion detection. Valued at US$1.93 billion in 2015, the market is expected to grow at a CAGR (2016-2021) of 17 percent, reaching US$4.82 Billion by 2021,” says F&S, “Meanwhile, the Middle East fire safety market is expected to be worth US$4.4 billion by 2021, growing at a CAGR of 12.4 percent between 2016 and 2021.” With more than 580 exhibitors, Commercial Security is the largest section at Intersec 2018, with more than two-thirds of the world’s top 50 security solutions players on board including Hikvision, Bosch, Dahua, Assa Abloy, Tyco, FLIR, Hanwha Techwin, Axis Communications, Avigilon, Panasonic, Infinova, IDIS, and Milestone Systems. Fire & Rescue is the next largest section with 400 exhibitors including NAFFCO, Fike, Honeywell, Hochiki, Oshkosh, and Siemens. Safety & Health and Homeland Security & Policing (both with 100 exhibitors), and Perimeter & Physical Security, Cyber Security, Smart Home & Building Automation (50 exhibitors each) wrap up the dedicated show sections. Returning features include the safety design in Buildings Pavilion in the Fire & Rescue section, as well as an outdoor demonstration zone of the latest fire rescue applications in action. A comprehensive three-day conference programme will also discuss and analyse new developments, innovations, legislation and changing paradigms within the Middle East safety and security industry.

Read More

IHS MARKIT on New Camera and Display Mirrors

Enhance Vehicle Safety and Fuel Efficiency Rear-view and side-view mirrors on new vehicles will begin to see major changes over the next decade, according to new analysis from business information provider IHS Markit. Combining high-definition cameras and displays in place of – or to complement – traditional mirror designs offers a compelling case for automakers to improve on fuel efficiency and battery range, while increasing visibility and safety with high-value technology-driven content. These technologies will catch on quickly over the next decade, according to the recently published Camera and Display Mirrors Report from IHS Markit. The first production applications of rear-view display mirrors have been successful, with the substantially wider field of vision helping to eliminate blind spots from rear seat occupants or roof pillars. General Motors was first to market this technology in 2015 with the Cadillac brand before expanding to Chevrolet and upcoming Buick models. However, other automakers are taking notice and making plans to bring similar solutions to market soon. Nissan announced plans to introduce the technology on the 2018 Armada, and other automakers will soon follow. A substantially wider field of vision also contributes to improved driver comfort and awareness. The device also appeases regulators and drivers alike with a toggle to switch between a traditional reflective mirror and the camera view. With regulatory approval and early signs of customer acceptance, rearview display mirrors are expected to reach nearly 1.8 million units produced annually in 2025, led by markets in Japan and North America, according to IHS Markit global forecasts. Cost remains a major barrier to widespread implementation of this new design, however, as relatively inexpensive traditional rear-view mirrors are replaced with more complex camera display systems. While cost and complexity will limit the market to an extent, the opportunity for differentiation and improved visibility will attract a number of automakers. Cameras recognized as viable replacement for traditional side mirrors Aerodynamic improvements and enhanced visibility are the primary reasons behind emerging mirror replacement applications, while designers will welcome newfound freedom after having explored novel exterior mirrors in concept vehicles for decades. Now that the regulatory environment is taking shape to support this concept, production applications will soon follow. The market for dedicated side-view camera display mirrors will grow as a result, with initial production expected within the next 12 to 24 months, according to IHS Markit. By 2025, nearly a half million side-view camera display systems will replace side mirrors annually in new vehicles designed to support the added technology content. Implementation will not be uniform, however. “Suppliers and automakers are investigating several different ways to replicate the camera view with an in-vehicle display. These side-view images could feed through an instrument cluster display of some sort, or even a traditional center stack display,” said Brian Rhodes, automotive technology analyst with IHS Markit, “However, the majority of concepts to this point have focused on new, dedicated side-view displays located either in the door panels or A-pillars because they offer the driver the most familiar line of sight for this safety-critical aspect of driving.” From a driver assistance perspective, augmenting mirrors with cameras is already common today – from familiar rear camera park assist to applications such as Honda LaneWatch that enhance visibility. “Current side camera systems merely enhance the driver’s view today and provide marginal added safety as a result, but there is much more opportunity,” said Jeremy Carlson, principal automotive analyst with IHS Markit, “Camera sensors allow machine vision software and artificial intelligence to constantly detect, track, and recognize objects over a wide field of view, and that can be important input to autonomous driving solutions.” “Alongside the autonomous use case, which has varying levels of interest from different automakers, improving aerodynamics will improve fuel efficiency no matter the fuel used – and that should be of interest to every automaker given regulatory pressures around the world today,” Carlson said. In 2025, more than 1.8 million vehicles will be produced with side-view camera sensors to support drivers or contribute to automated driving systems, while more than 23 percent of these systems will completely shed the traditional side-view mirror, according to IHS Markit forecasts. New opportunities for content differentiation, suppliers These mirror replacement solutions offer automakers a new opportunity to add value for consumers and to deliver content in an entirely new area of the vehicle. In addition, they create opportunities for a new set of suppliers to meet this demand – including those with expertise in automotive camera systems, display modules, system ECUs, and mirror modules, all of which could see new business opportunities take shape as this market develops. “Automakers will have the flexibility to integrate safety features such as a pedestrian highlight or warnings for fast-approaching vehicles to bring the driver’s attention to these outside factors and allow them – or the vehicle itself – to respond accordingly,” Carlson said, “That next level of innovation will push this emerging technology beyond the ‘nice to have’ cost constraints and into an integral part of a comprehensive in-vehicle user experience, whether you’re driving yourself or watching your vehicle drive you.”

Read More

Comprehensive Cybersecurity Education at Dallas

Global subject matter experts from government and industry to share best practices, leading approaches to mitigate cyber, information security threats including data breaches, grid security ASIS International in conjunction with InfraGard and the Information Systems Security Association (ISSA), has recently released the cybersecurity focused sessions that featured during the 63rd ASIS International Annual Seminar and Exhibits (ASIS 2017), during Sept. 25-28 in Dallas, TX. ASIS 2017 attendees not only obtained best practices from security experts but also explored current issues such as the recent Equifax breach. The newly added, “There’s Been a Consumer Information Breach. What Do I Do?” panel has examined the impact of data breaches on consumer confidence and businesses, as well as ways to address a data breach crisis. This is just one session of more than 180 education offerings that took place during ASIS 2017, the security industry’s most robust conference, covering all aspects of security – from active shooter scenarios to asset protection. The Malwarebytes SMB Threat Report recently indicated that small- to medium-sized businesses in all 50 states have experienced a 165% increase in the number of malware detections, and a 231% increase in ransomware incidents, quarter-over-quarter – with Texas coming in at or near the top in both categories. Cybersecurity is one of the most pressing issues facing organizations of all sizes, and it is a major focus area during ASIS 2017. “Combining the expertise of InfraGard and ISSA with ASIS subject matter experts offers a wide range of cybersecurity-related content for attendees,” said Shayne P Bates, CPP, Principal Consultant, Stratum Knowledge LLC and IT Security Council Chair for ASIS International, “ASIS 2017 gives attendees the flexibility they need to create a schedule tailor-fit to their experience level and career objectives. So, whether you are an operational security professional seeking to better understand the intersection of physical and cybersecurity, or an information security professional with years of experience, we have you covered.”

Read More

Identity Theft and Poor Internal Security Practices

Gemalto has recently released the latest findings of the Breach Level Index, a global database of public data breaches, revealing 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last six months of 2016, the number of lost, stolen or compromised records increased by a staggering 164%. A large portion came from the 22 largest data breaches, each involving more than one million compromised records. Of the 918 data breaches more than 500 (59% of all breaches) had an unknown or unaccounted number of compromised data records. The Breach Level Index is a global database that tracks data breaches and measures their severity based on multiple dimensions, including the number of records compromised, the type of data, the source of the breach, how the data was used, and whether or not the data was encrypted. By assigning a severity score to each breach, the Breach Level Index provides a comparative list of breaches, distinguishing data breaches that are not serious versus those that are truly impactful. According to the Breach Level Index, more than 9 billion data records have been exposed since 2013 when the index began benchmarking publicly disclosed data breaches. During the first six months of 2017, more than ten million records were compromised or exposed every day, or one hundred and twenty-two records every second, including medical, credit card and/ or financial data or personally identifiable information. This is particularly concerning, since less than 1% of the stolen, lost or compromised data used encryption to render the information useless, a 4% drop compared to the last six months of 2016. “IT consultant CGI and Oxford Economics recently issued a study, using data from the Breach Level Index and found that two-thirds of firms breached had their share price negatively impacted. Out of the 65 companies evaluated the breach cost shareholders over $52.40 billion,” said Jason Hart, Vice President and Chief Technology Officer for Data Protection at Gemalto, “We can expect that number to grow significantly, especially as government regulations in the U.S., Europe and elsewhere enact laws to protect the privacy and data of their constituents by associating a monetary value to improperly securing data. Security is no longer a reactive measure but an expectation from companies and consumers.” Primary sources of data breaches Malicious outsiders made up the largest percentage of data breaches (74%), an increase of 23%. However, this source accounted for only 13% of all stolen, compromised or lost records. While malicious insider attacks only made up 8% of all breaches, the amount of records compromised was 20 million up from 500,000, an increase of over 4,114% from the previous six months. Leading types of data breaches For the first six months of 2017, identity theft was the leading type of data breach in terms of incident, accounting for 74% of all data breaches, up 49% from the previous semester. The number of records compromised in identity theft breaches increased by 255%. The most significant shift was the nuisance category of data breaches representing 81% of all lost, stolen or compromised records. However, in terms of the number of incidents, nuisance type attacks were only slightly over 1% of all data breaches. The number of compromised records from account access attacks declined by 46%, after a significant spike in the 2016 BLI full year report. Biggest industries affected by data breaches Most of the industries the Breach Level Index tracks had more than a 100% increase in the number of compromised, stolen or lost records. Education witnessed one of the largest increases in breaches up by 103% with an increase of over 4,000% in the number of records. This is the result of a malicious insider attack compromising millions of records from one of China’s largest comprehensive private educational companies. Healthcare had a relatively similar amount of breaches compared to the last six months of 2016, but stolen, lost or compromised records increased 423%. The U.K’s National Health Service was one of the top five breaches in the first half with over 26 million compromised records. Financial services, government and entertainment were also industries that experienced a significant jump in the number of breached records, with entertainment breach incidents increasing 220% in the first six months of 2017. Geographic distribution of data breaches North America still makes up the majority of all breaches and the number of compromised records, both above 86%. The number of breaches in North America increased by 23% with the number of records compromised skyrocketing by 201%. Traditionally, North America has always had the largest number of publicly disclosed breaches and associated record numbers, although this is poised to change in 2018 when global data privacy regulations like the European General Data Protection Regulation (GDPR) and Australia’s Privacy Amendment (Notifiable Data Breaches) Act are enforced. Europe currently only had 49 reported data breaches (5% of all breaches), which is a 35% decline from the previous six months.

Read More

FICO as Category Leader in Enterprise Fraud and AML Solutions

Silicon Valley analytic software firm FICO has been named a category leader in financial crime risk management solutions by research firm Chartis Research. Their report Financial Crime Risk Management Solutions: Market Update 2017 discusses the increased reporting requirements for financial institutions and the need to use analytics to map out increasingly complex relationships. “For FIs, managing these efficiently and effectively can be costly and complex,” the report states, “Alongside pressure from regulators, and financial crime itself, processing the increasing volume, variety and velocity of the data FIs need requires customized, cutting-edge technology.” “The Chartis report calls out the priority for using advanced analytics and artificial intelligence to map out relationships between entities and to perform transaction-level analysis,” said Bob Shiflet, Vice President for fraud and financial crime solutions at FICO, “We have been pioneering the use of AI in fraud detection for 25 years, and have recently applied it to entity resolution, AML and cybersecurity. Nobody in the market knows better how to apply AI and machine learning to get results in financial crime risk management.” FICO’s portfolio of enterprise fraud solutions includes the FICO® Falcon® Platform, which protects 2.6 billion payment cards worldwide, and the FICO® TONBELLER® Siron® Anti-Financial Crime Suite. FICO has introduced AI models for AML and KYC to better detect money laundering and more efficiently operationalize teams to stop this activity.

Read More

Cloud Computing: More Data Loss on the Horizon

By now, it’s a familiar story! A company puts massive amounts of data on a remote cloud server – then someone finds a way in, gaining access to sensitive business documents or the personal information of millions of people. It happened to Verizon; it happened to WWE; and it happened to the political data company Deep Root Analytics. Most recently it happened to the accounting firm Deloitte. According to a news report, hackers tapped into the company’s email system simply by logging on as an administrator. And it will keep happening, experts say, especially when companies neglect data security in their eagerness to convert to the cloud. “They inherently believe they get all these magical properties of security by moving (to the cloud), and it just doesn’t happen,” said Josh Douglas, Raytheon’s Chief Strategy Officer for Cyber Services. Cloud computing is an increasingly popular option for businesses. The cloud-services market could generate as much as $236 billion in revenue by the year 2020, according to Forrester Research. The reasons are clear – the cloud cuts the cost of hosting and maintaining on-site servers, it allows employees to work seamlessly from anywhere, and it adjusts to the size of the organization. “But just like any other connection to the internet, it creates ample opportunities for cybercriminals to attack,” Douglas continued, “As we tell our clients, cloud computing puts your information on someone else’s computer. So it’s vital to protect the cloud exactly as you would your own servers.” The Verizon, WWE and Deep Root Analytics breaches, all appear to stem from improper cloud-security settings. Media reports on all three incidents said the databases were accessible to anyone who had the URL. In the Deloitte breach, news reports said the attackers signed onto a server that required only a login and password – less protection than many people have on their social media pages. A common measure known as ‘two-factor authentication’ would require both a login/ password combination and another means of verifying identity such as a fingerprint or PIN code that appears on a secondary device. “It is a basic part of cyber hygiene, and while it might not have prevented the intrusion altogether, it would have at least slowed the attackers and forced them to use more sophisticated methods,” Douglas said. He also mentioned other common mistakes in converting to the cloud that include failure to scan old code for vulnerabilities, failure to segregate systems and forgoing ‘red-teaming,’ also known as adversary emulation testing, where security consultants play the role of hackers and attempt to breach systems critical to the business. “But data security in the era of cloud computing isn’t just about setting things up correctly. It’s also about the behaviour of employees,” said Matt Moynahan, CEO of Forcepoint, a cybersecurity company jointly owned by Raytheon, “Using technology to monitor employee activity, identify possible errors and sniff out malicious intent can help reduce risk.” “Regardless of whether organizations are securing data using on-premises or cloud-based technology… organizations need to balance protecting privacy and understanding how their employees interact with critical business data and intellectual property,” Moynahan concluded. Even with all the risks cloud computing can present, businesses shouldn’t fear conversion to the cloud. Companies often over-correct after cybersecurity problems, with security measures so strict they impede the growth of business. That, Douglas said, is also a mistake. “If the pendulum swings too far to the right, security puts a standstill to the innovation and technology,” he said, “It’s important to adopt things like clouds, because that innovation is what helps our society grow.”

Read More

HID New Temporary Access Card

HID Global® has recently introduced new standards-based identity and access management (IAM) solution for government agencies to more easily comply with the mandate to improve physical access and digital identity security. At the heart of this IAM solution is the new HID Crescendo® temporary access card, which gives visitors a more secure credential to enter government buildings. HID developed this temporary access card to provide a visitor credential that has the same level of security as the standard government-issued PIV and PIV-I cards used by all U.S. government employees. The new HID Crescendo temporary access card creates a PIV-like access experience for people who, unlike a full-time government employee, only need temporary access. Because visitors to U.S. government agency buildings are not eligible to receive a government-issued PIV card for access, government agencies have been using traditional physical access technology for visitor IDs, thereby creating an unnecessarily higher risk of intruders trying to gain entry, likely from badges being cloned. A call within the U.S. federal government to start moving away from traditional visitor management based on proximity-based technology cards has intensified with rising concerns about potential vulnerabilities to government buildings. This follows the U.S. Office of Management and Budget (OMB) mandate through OMB M11-11 for U.S. federal government agencies to move to PIV cards for access to facilities. “The U.S. government has recognized the need to make sure that visitors to government agency buildings are using the most secure credentials available and can be trusted,” said Brad Jarvis, Vice President and Managing Director of the Identity & Access Management Solutions (IAMS) business within HID Global, “No other access card technology on the market today can do what our new HID Crescendo temporary access card can do with a digital identity certificate for a PIV-like experience to increase security of visitor access.” The HID Crescendo temporary access card is based on public key infrastructure (PKI) technology, which means a digital certificate is embedded on each visitor ID access card, providing an extra layer of trust that the card holder is authorized to access a building. Federal government building managers are moving to ‘PKI-at-the-door’ based on mandates to discontinue using traditional physical access credentials. New-generation technologies are needed. However, most government agencies have limited resources to deploy a full PKI/ credential management system solution on their own. This is why HID’s new IAM solution is significant and timely, delivering a simplified, cost-effective way for agencies to deploy a ‘PIV-like’ PKI-at-the-door experience right away to address today’s potential vulnerabilities. The HID Crescendo Temporary Access Card uses HID’s advanced credential management, which is particularly beneficial for government agencies that do not have their own credential management system. The solution can be deployed seamlessly onto FIPS 201-compliant physical access systems at any government building and does not require the installation of complex software.

Read More

ASSA ABLOY Acquires MERCURY

ASSA ABLOY has signed an agreement to acquire Mercury Security, a leading OEM supplier of controllers for physical access control. “Mercury Security is a strategic technological addition to the ASSA ABLOY Group. The company reinforces our current offering, where Mercury Security considerably enhances the Group´s position within physical access control and will provide complementary growth opportunities,” says Johan Molin, President and CEO of ASSA ABLOY. “The acquisition of Mercury Security will advance HID’s global leadership in the physical access control industry, adding Mercury Security’s high-quality controllers to HID’s product portfolio while extending HID’s installed base of millions of users beyond the readers and smart cards that we are already well known for,” says Stefan Widing, President and CEO of HID Global. Mercury Security was founded in 1992. It is headquartered in Long Beach, California and has some 45 employees. Sales for 2017 are expected to reach USD 60 million (approx. SEK 500 million) with a good EBIT margin. The acquisition will be accretive to EPS from start. The transaction is conditional upon regulatory approval and satisfaction of customary closing conditions and is expected to close during the fourth quarter of 2017.

Read More

APAC WildFire Cloud Unveiled

Enables customers to receive full threat analysis and prevention within Asia-pacific borders while benefiting from global threat prevention. Palo Alto Networks® has unveiled its APAC WildFire™ cloud, located in Singapore. The service allows customers in the region to benefit from Palo Alto Networks WildFire cloud-delivered threat analysis and prevention capabilities, while addressing customer’s data privacy concerns, via an APAC-based cloud. WildFire is now available with regional-specific clouds in Asia-Pacific (APAC), the European Union, Japan, and North America. As cyberattacks grow in complexity and sophistication, threat prevention has become more difficult, time-consuming and expensive, especially when done in isolation. Today, this is not a fight any one organisation can win alone. A global, cloud-delivered, community-driven approach to aggregated threat analysis is crucial to achieving the best possible threat intelligence and prevention, to effectively defend against a community of attackers who share information, attack methods, and techniques. However, recent developments in data regulation – both globally and in the region – have heightened concerns about data transfer, protection and sovereignty. By offering customers the ability to submit their unknown content to the APAC WildFire cloud for analysis and verdict, customers will have more control and certainty over the location of their data, in order to better comply with their data sovereignty and privacy requirements, while continuing to capitalise on the benefits of globally shared threat data. Additionally, with the APAC WildFire cloud, security teams across the region can accelerate threat hunting, analytics, and response efforts, with globally correlated intelligence from the entire WildFire community, made directly accessible through the Palo Alto Networks AutoFocus™ contextual threat intelligence service. The launch of the APAC WildFire cloud is part of Palo Alto Networks commitment to customers in Singapore and the wider APAC region, following the opening of its new APAC headquarters in Singapore earlier this year. The investments made in Singapore into local cloud infrastructure, and an on-site threat intelligence team – Unit 42 – will provide customers in the region, and globally, the opportunity for increased protection against advanced cyberattacks. As businesses in Asia-Pacific continue to grow at a rapid pace and modern networks evolve, so too will the threat of cyberattacks. Our APAC WildFire cloud allows organisations to tap into global prevention capabilities and counter increasingly sophisticated threats, while addressing their data sovereignty and privacy concerns – Simon Green Senior Vice President, Asia-Pacific, Palo Alto Networks  

Read More