securitylinkindia

MassMediaLink India LLP SecurityLink India

VIVOTEK Vast 2

Enhanced user experience with new VMS VIVOTEK has recently unveiled the latest release of its video management software VAST 2. Built on the underlying powerful software engine of VAST, VAST 2 reveals a brand new intuitive user interface and boasts an extended range of user-centric functionalities including auto setup, advanced search and custom layout, as well as additional add-on functions for fail-over protection, transportation and transaction solutions. The new VAST 2 is designed for efficient video management, allowing security operators to reduce both operational and maintenance costs. “VIVOTEK has run through a series of alpha and beta tests before the launch of VAST 2. We have collected feedbacks from our customers and significantly improved both the usability and functionality to make VAST 2 a better experience for our users. For VAST 2, we designed a problem feedback mechanism, allowing the system to detect problems automatically, and enabling the security operators to send feedback manually via a popup window. This feedback is delivered directly to VIVOTEK’s field application engineer team and accelerates our customer service,” says Perkins Chen, Director, Research and Develop Division 2, VIVOTEK Inc. Benefits Easy to use: VAST 2 makes it simple to set up surveillance systems by utilizing automatic configuration wizards. Users can adjust layout by simply dragging a corner of the window, a feature that also supports VIVOTEK fisheye dewarp. With the addition of the evidence-lock function, it is now even easier to manage numerous investigation scenarios by manually extending the retention time of recorded videos. These videos are easily exported with custom layouts. A quick snapshot function is also available to instantly preserve this critical evidence. Efficient search: VAST 2 offers two types of search – smart search and thumbnail search. Both are designed to help security operators quickly filter scenarios from any suspicious scene. With smart search, users can select specific regions of interest and the system will show an array of thumbnails representing footage in which motion is detected. In addition to the thumbnail search, the feature allows the user to browse thumbnails based on time frame. Security operators can narrow down any investigation by rapidly identifying the clips of interest. Extensive add-ons: VAST 2 also supports additional functionality in advanced features by licensing. It is equipped with fail-over protection, a system that transfers video recording to secondary sites in the event of any system outage, network error, or other malfunction, and ensures that video recordings are never interrupted. Recognizing the growing needs of vertical markets, VAST 2 demonstrates the strengths of fast integration to customize specific functions. In the transportation field, VAST 2 can track and display vehicles’ real-time location from GPS receivers and playback videos with recorded paths. Finally, VAST 2 supports retail markets by showing any transaction on both live and playback video, and allowing users to search transactions by entering different criteria.

Read More

HIK VISION New Launches

Height Strip Camera Height Strip Camera, Hikvision’s latest covert camera range can be easily adjusted to eye level, giving a clearer view of the face, even when a person is wearing a cap or hood. The camera is ideal for scenarios like shops, hotels and banks where a fleeing person’s detailed facial image could be captured for post-search. Traditionally, ceiling mounted cameras are used in these scenarios, but often, due to the viewing angle, facial features cannot be clearly seen. Having a covert camera mounted at eye level solves this problem. The camera pan angle can be adjusted to ±15 degrees, so that the optimum viewing angle can be found for every scenario. The camera features also include: 1/2.7” progressive scan CMOS. Max. 1920×1080@30fps. WDR, up to 120dB. DC 12 V, PoE. Built-in micro SD/ SDHC/ SDXC card slot, up to 128GB. New Network Cables The two new network cable models – DS-1LN5E-S and DS-1LN6-UU, are high-quality, industry-rated network cable for multiple applications. The 305m indoor PVC cables are made from oxygen-free copper (OFC), widely accepted as the best cabling material in the industry. They have core diameters of 0.5mm and 0.565 mm respectively, and guarantee long distance transmission – up to 250m, which lower quality cables cannot deliver. Both the sheath and support cord on the cables are flame resistant – recognized by the global CM standard. In fact, the material can stop burning immediately after it catches fire, an essential element in cable safety. With its easy cabling nature and its customisation possibilities, the cabling will tick a number of boxes for installers.

Read More

Milestone Snap Surveillance Analytics

A Certified Milestone Integration Milestone Solution partner Snap Surveillance has achieved the status of Milestone Certified Solution with its automatic learning analytics integration to XProtect Corporate IP video management software (VMS). Snap’s unique user interface (UI) allows customers to get more effective use from their medium-to-large (100+ camera) networks. It automatically finds relationships between the camera fields of view – both overlap and near overlap. It then presents the camera network to the user in a variety of ways that reduce information overload. Snap’s integrated solution gives users a highly intuitive video UI for seamlessly tracking persons-of-interest from camera to camera across widespread locations like an airport or shopping center – for both live and recorded video. To determine the inter-camera relationships, Snap uses straightforward video analytics on individual video streams as a pre-processing step (to determine scene occupancy), then processes the occupancy signals from across the camera network in concert. Snap could be called ‘multi-camera analytics,’ whereas the vast majority of existing analytics process single cameras in isolation. Snap’s patented technology allows this learning approach to scale across thousands of cameras. Key Snap capabilities include Peripheral vision: The camera that is the current focus of attention is presented with visually related cameras laid out around it, giving the operator visual context to the scene. Video streams are thereby seen in relation to neighboring video with the unique ‘Peripheral Vision’ display – improving the situational awareness for security personnel. Video pursuit: As a target moves out of the current focus camera, they appear in one of the peripheral cameras. Clicking on that camera switches focus to it, allowing the target to be followed easily throughout the network. The neighboring video streams act as a menu for navigating the network, improving operator ability to follow the action moving around a site, without needing to memorize camera names or positions. Evidence videos: Just by following the action, users can produce consolidated videos of everything suspects do while on site, providing rapid and compelling support for investigations. Virtual walkthroughs: Security staff can browse around an area of interest, moving from camera to camera, without needing to be physically present or to know each camera’s location. Scalability: Snap scales to networks of thousands of cameras. The larger or more complex the camera network, the greater the benefit for operators in understanding and navigating through that network with Snap. Camera-agnostic operation: Snap’s software requires no special camera functionality and interfaces only to the VMS platform – if Milestone supports the camera, then Snap also will. The Snap back-end middleware is integrated with live or archived video so it can analyze the video to determine the relationships between camera fields of view. Snap’s end user functionality is integrated with the Milestone XProtect Smart Client user interface, and for both the archived and live video signals, to deliver the peripheral vision, video pursuit and other functionality. The Snap certification documentation includes test parameters and a results summary as well as specifications for optimal installation/ operation. The tested versions of the products from both Milestone and Snap Surveillance which were included in the solution certification were Milestone XProtect Corporate 2016 video management software in operation with the Snap Surveillance Force Multiplier.

Read More

New Range of Positioning Cameras

For Enhanced Responsiveness in Wide Area Surveillance Axis has launched a new generation of positioning cameras, giving operators faster and more accurate pan and tilt capabilities to monitor large-scale sites, perimeters and borders in real-time and are able to respond instantly to security alerts and incidents. Thanks to their enhanced capabilities, the new range of positioning cameras enables surveillance across vast sites with fewer cameras, with the potential for 360-degree unobstructed field of view, and at all times, and 135-degree field of view from ground to sky Axis Communications has delivered against some of the most pressing surveillance needs of organizations across the private and public sectors in launching new visual, bispectral and thermal positioning cameras. “At their core, the needs of many of our customers can be distilled to the same thing – the need to rapidly identify and respond to incidents and breaches along perimeters and of course within their site. Our job is to empower them to do theirs, and our new range of cameras does just that,” commented Michael Chen, Global Product Manager at Axis Communications, “The sites that require monitoring can be vast – many thousands of hectares with perimeters hundreds of kilometers in length – and to give a comprehensive field of view using static cameras can be unfeasible. Pan and tilt capabilities are therefore essential, and our new range of positioning cameras takes these and other capabilities to a new level of performance.” Features in the new positioning cameras include: High speed and jerk-free PTZ movements with continuous pan. Built-in electronic image stabilization (EIS), helping against vibration caused by an unstable mounting surface or a wind-sensitive mast. SFP slot for easy cable management, and quick and effective installation for fiber-optic connection over long distances. Powerful positioning capabilities even at high wind and wide temperature range. Flexible mounting options on columns directly, or against walls and poles with robust accessories. The new range includes thermal positioning cameras, visual PTZ positioning cameras and bispectral PTZ positioning cameras that combines both visual and thermal images. AXIS Q8641-E and AXIS Q8642-E PT Thermal Network Cameras: The thermal positioning cameras offer outstanding thermal contrast and 10° field of view, which together with analytics, enables long-range detection and immediate visual confirmation for the operator. AXIS Q8685-E/-LE PTZ Network Cameras: The visual PTZ positioning cameras, offer high-video quality with HDTV 1080p, 30x zoom with focus recall, and extreme light sensitivity. The combination with Axis’ Forensic WDR (wide dynamic range) and low-light sensitivity ensures the highest image usability in challenging lighting conditions. AXIS Q8741-E and AXIS Q8742-E Bispectral PTZ Network Cameras: The bispectral PTZ positioning cameras offer a combination of two live video streams, one from a thermal sensor – used for detection and verification – and one from a high-definition visual sensor – for identification of colors and details. The cameras also feature 30x zoom, Forensic WDR as well as low-light sensitivity. Additionally, AXIS Q8741-LE, AXIS Q8742-LE and AXIS Q8685-LE include long-life and long-range IR for improved visibility during nighttime. In places where there is a high risk of window contamination from dust, salt, sand and emission of soot from vehicles such as in traffic monitoring, airport, harbor and public area surveillance, these cameras are equipped with remote-maintenance against rain and dirt using wiper and washer.

Read More

Dahua Marks Opening of India Subsidiary with Six Roadshows

Dahua Technology started their official operations in India by opening their first subsidiary in Gurgaon on 5 June   2017, followed by organizing six road shows in six major cities across the country during June 6 to 21. Dahua organized a grand opening ceremony in Gurgaon on June 5 where Michael Chen, Vice President and General Manager of Overseas Business, Dahua graced the ceremony by cutting the inaugural ribbon and lightning the ceremonial lamp. As the subsidiary, Dahua India will support regional customers by providing fast, localized marketing and sales services as well as technical support from product experts. To affirm its presence in the region, Dahua organized six roadshows respectively in New Delhi, Chennai, Bengaluru, Mumbai, Ahmedabad, and Kolkata from June 6 to 21. The roadshows attracted more than 3000 participants and received tremendous response. The shows were held in association with Aditya Infotech Ltd (AIL) – the technology arm of Aditya Group delivering technology driven security solutions. “The main objectives of the roadshows are to create awareness of the company’s advent in India, and to demonstrate its technological prowess in the security sphere by providing an attractive and enjoyable viewing and ‘hands-on’ experience of its products,” said Michael Chen after lighting the lamp. In all six cities, Dahua displayed its smart building, smart public transportation, smart city, and other solutions and products. It also unveiled new transmission, display, video conferencing, and machine vision product lines. In addition, it highlighted salient features of its patented HDCVI and IP Solutions. Prospective customers and security conscious people who attended the roadshows were excited at the innovative solutions Dahua offered. Commenting on the successful completion of the first leg of roadshows, Robbin Shen, Sales Director of India & SAARC countries at Dahua said, “It was a great success. The response to our entry in India and to our video surveillance solutions has been marvelous. We made our presence quite clearly and emphatically. Our solutions received excellent reception in all the six cities. We also understood the needs and concerns of customers. They were interactive, inspirational and impressive and helped us to propel our brand.” The grand opening of Dahua’s India operation and the completion of 6 roadshows demonstrates Dahua’s commitment to digging deep into the Indian market. The Dahua India service station will soon be opened to better serve local customers. Over the coming months, Dahua plans to cover many more cities in hopes of becoming a nationally recognized brand that gives Indian customers a new experience. With a mission of ‘Safer Society, Smarter Living,’ Dahua will continue to focus on ‘Innovation, Quality, and Service,’ as well as globalization, to serve partners and customers around the world.

Read More

Thermal Camera Trend [India]

The estimated overall market size of thermal cameras in global market can be estimated to be around USD 7 Billion. In India, thermal cameras are still more often used in Military and Defence Applications. However, gradually since the past year or so, there is an upscale trend and a lot of commercial, government and industrial projects are seeking to install thermal cameras. The application pre-dominantly is for perimeter security, maritime, transportation and other applications. The main reason for this rise in demand for thermal cameras can be price optimization by several OEMs so as to cater to several vertical segments and fit into their project budgets. However, in this context, several manufacturers have emerged over the past few years and there are several unorganized brands available in this zone selling thermal cameras. Since thermal cameras are specialized cameras, their long term performance and quality depends on several factors, and it is very essential that selection of a thermal camera brand is done wisely and not just on price. Infinova has encountered several projects demanding thermal cameras.  There are several factors to be considered when choosing a right thermal camera. It is very essential to understand requirements such as detection distance of human or a vehicle, lens selection, fixed or PTZ cameras, resolution such as 640p x 480p or 320p x 240p, pixel size – 17µ or 25µ, cooled or uncooled, motorized zoom, DFOV or fixed athermalized lens, thermal sensor camera or dual sensor camera and several other factors. Thermal sensitivity is becoming one of the most important parameters that cannot be neglected when selecting a thermal camera. Some projects demand technologies such as Laser Range Finder, GPS and Gyro stabilization, built-in to the thermal cameras, thus exploring additional features within the camera. Thermal cameras, like other conventional cameras should be able to seamlessly integrate with other third party systems such as radar systems, fence protection systems etc. “Infinova has recently launched its thermal range of cameras in the Indian market. We possess complete range of thermal solutions for all kinds of applications. All these cameras are seamlessly integrated with our VMS. The solution offered by Infinova can be compared to any recognized thermal camera manufacturer brands. We work on designing a solution for the customers rather than pushing the product as an off-the-shelf product.” – Milind Borkar Vice President, India, Middle East and Africa  

Read More

Yoga Guru Ramdev Forays into Security Business

Formed Parakram Suraksha (Valour Security) Pvt. Ltd. to build an army of security guards Baba Ramdeo, the Yogo Guru and India’s reigning consumer business giant, has recently launched Parakram Suraksha (Valour Security) Pvt Ltd to supply guards and provide security services. The venture will focus to build young aspirants under the guidance of experienced security officials to provide security to the people in need. The company has recruited former Indian Army personnel and police officers to train youngsters. “This security agency will work to evoke the nationalist spirit in every citizen and create an atmosphere of healthy physique and psychological competence among the country’s youths,” the Patanjali spokesperson stated. Rapid growth of India’s economy over the past few decades has raised the demand for security arrangements manifold for industrial complexes, offices, IT parks, and other public infrastructure such as airports, metro stations, shopping malls, and public utilities. Baba with a huge business mind, evaluated the lucrative business opportunity in the field and decided to set off. When enquired about Baba’s new initiative, Kunwar Vikram Singh, Chaiman, CAPSI said, “There is a huge need for private security, particularly to protect infrastructure, women, homes, and airports. There are some 200 smart cities coming up in India, and we will need at least one million smart security force for that.” “With massive infrastructure growth, private security is a huge growth area,” added Vikram Singh, “Across the world, too, there is a shortage of skilled security men, and that also provides opportunities for Indians to work abroad. Of course, the massive opportunity has attracted Baba.” Central Association of Private Security Industry (CAPSI) is the leading association of private security industry in India, which has set up the Security Sector Skill Development Council (SSSDC), in association with National Skill Development Corporation, a government body, which trains security personnel at several ‘centres of excellence’ across the country. “Security is a very important issue either for a man or a woman. Our aim is to prepare individuals for self and country’s security, and for this we have formed Parakram. This will help develop military instinct in each and every citizen of the country so as to awaken the spirit and determination for individual and national security.” – Acharya Balakrishna Managing Director, Patanjali  

Read More

‘POWERS’ The Lighting Standard For Video Surveillance

The security industry has long suffered from a lack of accepted standards for the measurement of illumination distances. Published illuminator distances have been left to the subjective interpretation of individual manufacturers – resulting in varying claims. This has always made it virtually impossible for consultants, installers and end-users to specify surveillance lighting with confidence to reliably compare products and achieve a consistent level of performance. After facing this challenge for last 25 years, Raytec have tackled this problem head on by publishing the industry’s first open and transparent standard for surveillance lighting – POWERS. The need for a lighting standard In conjunction with your choice of camera and lens, the right lighting is the most powerful tool in helping you to achieve outstanding night-time performance from any professional video surveillance system. But with many different lighting solutions available in the market today, it can be difficult to accurately compare the performance of one illuminator to the next. At one level, this may seem fairly straightforward – just look at the claimed distance performance from the manufacturer. However, until now there has been no standardized way to evaluate different illuminators and their performance claims – particularly infra-red lighting, and crucially, there have been no standardized testing methods for manufacturers to adhere to. Traditional lighting industries i.e., street/ urban/ commercial lighting etc., have long established and standardized testing methods allowing all illuminators to be accurately compared. Sadly, this is simply not the case with lighting for surveillance and security. Why is it so difficult to compare illuminators? Manufacturers currently publish very limited technical information on the performance of their surveillance lighting – most only quoting a maximum distance. Without standardization, methods for calculating performance, especially distance, have always been left open to interpretation – leading to varying claims. It is not uncommon to have two illuminators with a similar light output, that are quoted with wildly different maximum distances, because each manufacturer has a different opinion on what is classed as an acceptable image quality. One manufacturer may take a realistic view and quote 150m (492 ft) but the other may take an overly optimistic view and rate this same product for 250m (820ft). Since both products actually deliver exactly the same light output, it is obvious that the illuminator from the realistic manufacturer is going to provide a much better picture at its quoted distance. But where does the agreed and acceptable performance benchmark lie? Let’s look at this another way… same light output, different distance…which is correct? 1st Problem: Most manufacturers don’t provide calculation data to support their distance claims. Consider these images produced with two different infra-red illuminators (subject at 70m). Both could claim to deliver 70m+. Clearly one significantly outperforms the other with more clarity and detail – ultimately leading to better subject identification and analytics. But it’s all subjective – without calculation data, we don’t know how much light each illuminator is actually delivering at its maximum distance. 2nd Problem: Most manufacturers don’t state the camera specification used. This is especially important if you are comparing one illuminator against another that promises almost identical image quality at a similar distance. How do you know that both illuminators are truly equal? In reality, one illuminator may have actually been tested with a much higher performance camera – which in effect boosts its capability. Beware – this is often how a lower performance/ smaller illuminator can ‘appear’ to outperform a higher performance illuminator on paper. To claim better distances a lighting manufacturer may have used or accepted a much more expensive and sensitive camera, a much more expensive and higher performing lens, a more highly reflective surface and a low quality picture, to quantify the published distance. Illuminator performance – the important information Distance is only one area of lighting performance to consider. Other criteria to consider include, angle, flexibility and adaptability, integration capability, consumption, environmental impact, reliability, lifetime, warranty, customer support, and lighting partner credentials. In short, when looking at an illuminator for video surveillance, people want to know: How far does the illuminator shine? How wide does it shine? Is it efficient and reliable? What features does it have? Will the manufacturer support me with warranty/ certification/ technical support? And  so the POWERS standard was born – to answer all of these questions and more. Introducing the POWERS standard As the world leader in LED lighting, Raytec has taken the lead and published the industry’s first lighting standard for video surveillance – ‘POWERS.’ The standard is based on decades of practical industry experience and sets a lighting performance benchmark backed up by consistent scientific testing methods. It highlights the relevant criteria to consider, enabling security professionals to more easily specify and reliably compare the performance of different illuminators. It also helps them gain an understanding as to how their chosen lighting product will perform. ‘P’ for Peak power The first ‘P’ of POWERS stands for Peak Power. It is the measurement that should be used by all manufacturers to scientifically calculate their quoted performance distances and is therefore one of the most important areas of the standard. The Peak Power of an illuminator is measured at the centre point of the beam using an appropriate light or power meter. At Raytec, we measure all our units at 3 metres from the light source. Why Peak Power? The peak power of your illuminator and the lighting power you wish to achieve on scene, together with the principles of inverse square law (a law at the heart of scientific lighting calculations), are used to calculate the true usable distance of your illuminator. Calculating maximum distances should be based on adhering to a consistent level of lighting power on scene at your required distance – a vitally important part of the POWERS standard. This is to ensure that you achieve the same quality of image from your illuminator, every time. But what lighting levels should you adhere to? Raytec recommend a minimum lighting power on scene of 0.35 μW/cm2…

Read More

State of Security Training in India

The Private Security Sector (PSS), which employs the second largest manpower in India after the agriculture sector, is a moderately motivated sector of the country. The sector engages approximately seven million people today and is growing at an annual rate of 25 per cent. But unfortunately, majority of job-seekers and already employed members of the sector are found unwilling to adopt security profession and resort to it as their last option. The employment normally comprises youth who lack in education and training, and hail from the weaker sections of the society. They are either school dropouts, or are unable to afford the huge cost of education and training which can enable them to meet their inherent desire of living a respectable life. The unwillingness is attributed to the presumed less respect to the role, as well as the miserable salary drawn which is fixed at bare minimum wage for unskilled/ semi-skilled labor. Education and training not only elevate respect and livelihood, but also enhance the efficiency of the sector. Self-respecting and confident personnel are highly focused and more competent, and with their world class executions they could be able to get recognitions all around the globe. This also opens the global scope for employment. The current government has also taken upskilling of the security persons seriously and designed several pertinent policies and institutions including Skill India, NSDN, SSSDC, PMKVY and so on. Employee problems appear in various shapes and sizes such as complaints of sexual harassment, money missing from employee lockers, workplace accidents, employee sabotage, and so on. Workplace disputes often have personal importance to the employees involved, as well as they also impact their livelihood adversely. This makes the employees sometimes tending to tell lies and hide facts. From these differing accounts employers must arrange to thoroughly investigate the issue and determine what really has happened. Any workplace investigation requires judgmental calls about what issues to investigate, who to include in the internal investigation, and ultimately who to believe on. The goal should be to conduct the investigation in the fairest way possible. But do the employers have an efficiently educated and trained team to successfully resolve such issues; or they need to arrange training? There is surely a gap. Security education and training is a serious concern and need of the time, with a wide scope, of course. Proactive call by Lancers Network Limited Lancers Network Limited, under the leadership of Kunwar Vikram Singh, a security veteran, has proactively taken up the challenge and been engaged in facilitating security trainings for several years. Lancers Network Limited is South Asia’s leading Risk Consulting firm, operating in the high-on-risk countries of the region. Established in 1980, the firm continues to pursue its founding principles of integrity, confidentiality and value addition, and thus has created a strong client base across the globe. Equipped with a highly experienced operational team of over 120 professionals drawn from the financial sector, armed forces, police, security services and industry professionals; the company has developed a reputation for providing quality driven, customer focused, and highly successful actionable intelligence and security solutions. They have achieved unmatched client retention levels across Automotive, Chemicals, FMCG, Banking, Insurance, and IT Industries. Lancers impart security training in partnership with the following international organizations: ARC Training International Academy for Security Management Arc Training is the UK based leading international providers of security management training courses. They work with security professionals from all over the world, providing fully-accredited qualifications in subjects that are current, interesting and internationally relevant. Tavcom Training Part of the renowned Linx International Group, Tavcom Training is also the UK based world’s leading provider of accredited security systems training courses. They provide award winning BTEC certificated courses to installers, operators, managers, and designers of CCTV, Network IP, Intruder alarm, Access control, Fire alarm and all other types of electronic security systems. Perpetuity Academy Another UK based Perpetuity Academy is specialized in the fields of security, crime and risk management worldwide, offering accredited training courses designed for managers, supervisors, and practitioners. Strongly supported by universities and professional bodies, their courses provide the latest thinking and best practices, combined with academic knowledge that is required for today’s security professional. Courses Lancers, in collaboration with their partners, offer various levels of courses to cater to different categories of on-job as well as off-job aspirants. They provide both BTEC (Business and Technology Education Council) level, as well IQ level courses. Some of their offerings are as follows: Corporate Intelligence Management (3 Day Programme) The effective analysis and communication of commercial intelligence is a rapidly developing area of responsibility for security managers. This course provides a critical introduction to the key ideas, techniques and issues that make up the effective use of intelligence within a corporate environment. The course is of immediate benefit to security managers, security supervisors or multi-tasked managers, and those who are seeking to make a career in security management. Risk, Crisis & Disaster Management (BTEC Level 4: 3 Day Programme) Acting confidently in a crisis is vital in protecting the business. This short course prepares staff at all levels in how to effectively manage a crisis, and to help prevent unexpected incidents. It aims to equip security professionals with a broad spectrum of knowledge relating to risk, crisis and disaster management within their organizations. It also deals with all aspects of crisis and disaster management including the composition and operation of the crisis management team. The course immediately benefits those who are working as security managers, or those seeking to make a career in security management with an inclination to crisis management. Managing Security Surveying (BTEC Level 4: 3 Day Programme) Conducting a security survey is an essential skill for security managers. This course provides a step-by-step guide to the process of conducting an effective survey, and supplies a template for conducting one’s own security surveys. The course shows how to identify the particular threats to the business, premises and staff, and how one can protect against them. The course…

Read More

Paradigm Shift in the Security Threat Landscape

With the evolution of Internet of Things (IoT) the security challenges for industrial security are increasing exponentially. The 25 billion globally connected devices in 2015 are expected to double by 2020. On an average, each individual is expected to be connected to six things online in terms of sensors, smart objects and device clustered systems. Under this scenario, and given the fact that the weakest link will continue to define the robustness of any organizations security architecture, security vulnerabilities are poised to increase manifold, in terms of the scale, intensity and complexity of the attacks. The effects of these attacks, however, will not be restricted to the cyber domain alone. They will also impact the physical security of the people and infrastructure, in spite of having the best ‘physical security’ controls in terms of people, processes and technology to mitigate these threats. Holistic approach to address the security threat landscape This calls for a multidimensional integrated security concept, holistically encompassing physical security, cyber security, information security, business continuity, risk management, compliance and privacy protection, and emergency & crisis management. The convergence between logical and traditional physical security will entail a cascading effect on these seemingly different dimensions, with the impact multiplying at every stage. For instance a cyber-breach can impact safety, which in turn would impact compliance, as also may cause physical damage by aggregating the compound effect impacting business continuity, thereby directly impinging on the bottom-line. A combination attack using multiple threat vectors can adversely impact the market sentiments in no time. This will lead to long term brand erosion, as well as economic loss to the business, which in turn will have an adverse impact on the industry and the nation at large, especially if critical infrastructure is targeted. This has necessitated that we create synergy across the threat landscape to deal with a combination of physical and cyber-based threat vectors. In order to achieve this objective it is important to act in a concerted manner. As a result, chief security officers need to take care of the physical as well as the digital aspects of security and simultaneously address the increasingly complex area of compliance. Convergence not only helps in providing enhanced level of security but also results in cost saving by integrating disparate systems and optimizing resources; both in terms of personnel, processes and technology platforms. Case studies Hackers targeted Sony Pictures and wiped out half of their global network. They erased everything stored on 3,262 of the company’s 6,797 personal computers and 837 of its 1,555 servers. At the same time, they ensured that nothing could be recovered by using a special deleting algorithm that overwrote the data seven different ways. Subsequently the code targeted each computer’s start up software and rendered the machines brain-dead. A group of cybercriminals successfully targeted 100 banks in 30 countries globally including US, Russia, Ukraine and China after phishing its targets with infected email attachments. The criminals used their computer exploits to dispense cash from ATMs or transfer cash digitally to accounts they controlled. The USD 1 billion haul was unprecedented in its scope, which Kaspersky reported as under investigation. LinkedIn confirmed in 2016 that the impact of a 2012 breach in which 6.5 million users’ passwords were compromised, is now likely to be closer to 167 million users, 117 million of whom had both their e-mails and passwords exposed. The 1768 km long Azerbaijan – Georgia – Turkey (Baku-Tbilisi-Ceyhan) crude oil pipeline connecting the oilfields in the Caspian Sea to the Mediterranean Sea was blown up by hackers. They exploited the vulnerabilities of the IP cameras communication software, to gain entry and move deep into the internal network, to blow the pipeline by over pressurizing it. This resulted in a loss of USD 1 billion in export revenue for Azerbaijan and the pipeline was out of action for 20 days. The stuxnet virus that was used for spinning several centrifuges out of control at an Iranian nuclear facility was believed to have been transmitted using a thumb drive that was physically inserted into a computer within the facility. Critical infrastructure is the most vulnerable with high impact Thus, in future, critical infrastructure in particular is likely to be targeted by both terrorists and state sponsored actors, as it provides an easy option to them. Future wars will be asymmetric in nature. Economically weaker nations will inflict heavy economic loss on their adversaries to include both life and property, by using meagre resources, as compared to achieving the same using conventional means at a huge monetary cost and loss of lives. All it takes to target critical infrastructure is a bunch of highly trained cyber hackers who require hardware, software and a high-speed internet connection, and all of this cost not more than a few hundred thousand dollars, and will to execute. The best part is that it can be done sitting anywhere in the world and one need not be physically present at the target location. The victim organization/ country cannot be very sure of the identity of the perpetrator group/ individual/ country and retaliate immediately, thereby they can virtually go scot free in terms of facing any consequences, and enjoying virtual immunity against any adverse action due to lack of stringent laws dealing with sharing of data and lack of collaboration at the global level. Need for public private partnership and restructuring of the traditional security organization There is a need for public private partnership to effectively deal with such scenarios, wherein we pool in the resources of the government and the private sector to address these security challenges to our critical infrastructure and the industry at large. At the same time, there is a requirement to create a CXO level appointment within the organization who should be responsible for addressing the security challenges to include both physical security as well as cyber security. The CXO should also be integrated with the Government agencies both at the national and international level, for exchange of relevant information,…

Read More