securitylinkindia

MassMediaLink India LLP SecurityLink India

Securens Forays into Warehousing

The E-surveillance service provider having its market leadership in ATM and banking security, spreads its footprints in Warehousing and Logistics industry Securens System has expanded its services in logistics and warehousing with its specially designed solutions. With its award winning state-of-the-art central monitoring station, Securens monitors premises of the leading banks, top retail stores, and popular QSRs. Securens have now spread its reach in warehousing with it’s specially designed products ACTIHEALTH, ACTICARE, & ACTIDETER. Warehouses by their very nature are located in remote areas and are ever prone to burglary and shrinkages. Man guarding is an unreliable, inefficient and expensive solution to secure premises. Securens 5th generation e-Surveillance solutions with active deterrence monitors the premises 24/7 that not only improves efficiency considerably but also reduces the cost substantially. ACTIHEALTH aids in the supply, installation and commissioning of all surveillance equipment on a PAN India basis and provides comprehensive AMC along with ACTICARE service on a SaaS (Surveillance as a Service) based model. ACTICARE takes preventive measures through regular health-checks, which ensure that your surveillance equipment works exceptionally well so that they prove to be of great help during the time of forensic analysis of a crime. ACTIDETER is a time proven system that guarantees results. It not only detects attempted crime, but proactively prevents it from happening, by using video verification and 2-way audio. Sunil Udupa, Chairman and Managing Director of Securens Systems, said, “Warehousing plays a vital role as far as the supply chain is concerned. It acts as the backbone of the supply chain. Our aim is to provide value added 360-degree surveillance solution to our customers on a SaaS model to help them not only efficiently detect shrinkages but also help them reduce costs in this competitive market space.” Securens has the largest network of surveillance systems spread across the country. Popularly known as the Central Alarm Monitoring Station (CAMS), the technologically advanced control room is built on highly redundant and fail-safe architecture known for preventing crime before it happen. The CAMS monitors more than 21,000 sites 24/7across India and houses over 100 monitoring personnel.

Read More

How to know Access Control in The Cloud is Secure?

Access Control as a Service (ACaaS) has grown into a mainstream product offering from many access control manufacturers, and it is gaining significant growth in the market. With the adoption of this technology, end users and integrators need to ask several pertinent questions. It is extremely important to understand the security of the communications, the quality of service, who the provider of the cloud service is, the redundancy of the servers, disaster recovery, scalability of the platform, and finally the stability and availability of the service. With this information end users and system integrators can make a sound decision on which product to select and if the provider can be trusted to deliver the critical action of physically opening and closing doors successfully. At ISONAS we take each of these issues very seriously and have worked tirelessly to provide the most transparent service to a customer while leading the industry in security and scalability. When selecting an Access Control as a Service provider, we recommend looking for the following best practices to ensure clarity in the decision making process. 1. Overall structure Where is the platform hosted? Amazon Web Services has created a business solely around hosting services. ISONAS Pure Access Cloud is hosted on a complex structure within Amazon Web Services. We chose AWS because of their best in class cyber security infrastructure and their extensive global flexibility in hosting and deployment of Pure Access. 2. Perimeter security Does the platform have perimeter security? Typical first line of defense is through the firewall that can deny or allow traffic. Networks should be surrounded by firewalls and reverse proxy units, which protect the systems within. Intrusion detection and prevention measures should be set up to alert and mitigate potential risks before they can get into the network. All perimeter security logs should be reviewed daily as well as alerting on key terms for a rapid response to threats. At ISONAS, we measure and monitor 430 individual metrics 24/7 with real time alerting to our technical team and we use an industry leading service to provide this comprehensive level of IT infrastructure. 3. Internal security How the cloud provider manages their internal systems is a good reflection on how they manage additional systems and will prevent another avenue for an attack. Systems should be under a network access control layer as well as local firewalls limiting only the required ports for operation to be active, and only responsive to specified networks. As a second layer of protection, host intrusion detection and prevention act as a threat reduction as well as Antivirus and Malware mitigation. Internal team access to systems should be group based and only granted on an as needed basis via a secure password manager portal where access can be granted and revoked at any time. 4. Encryption One of the most basic pieces of security is ensuring the web application has an SSL (Secure Sockets Layer). An SSL establishes an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private. Pure Access Cloud utilizes SSL encryption governed by the reverse proxy. Even the passwords used by the web servers to access the database are encrypted to mitigate against data leakage. Automated file watchers keep a close eye on configuration details in the servers to ensure no access is granted without administration approval. All information on ISONAS hardware is encrypted using AES-256 bit algorithms. Communication between Pure Access Cloud and each connected access point can also be AES 256 bit encrypted. 5. Data protection The worst time to find out backups didn’t work is when you need them the most so employing backups and snap shots of the database is vital. This will ensure that data cannot be lost due to failure or even accidental deletion. All recovery methods should also be tested on a regular basis to ensure that restore and recovery is fast and accurate if required. 6. Testing All products should undergo thorough and rigorous automated and manual testing to ensure that the product that is placed in front of customers is stable without issue. ISONAS utilizes 3rd party penetration testing on a regular basis to subject our systems and configurations to the highest level of cyber security standards. 7. Monitoring All systems should be monitored heavily. A good practice here at ISONAS is that each server has up to 30 points monitored from services to configuration files to up/ down time. Ports are monitored as well as web services. Our services are monitored by Selenium style scripts that not only see if the web services are up but actually log in and click links and log out measuring the performance of the services. These checks are done every 5 minutes from locations in the US and internationally as well as internal network monitors. 8. Redundancy and load balancing As systems scale and grow, there is risk that traffic to the platform could create performance issues, therefore the ability to load balance information is critical to preventing an overload. Systems should be redundantly load balanced using affinity in the virtual IP configuration to ensure a seamless customer experience. In addition, applications should be stateless and share cache information so if a system stops responding the customer will not be affected and it can be repaired without downtime being a factor. 9. Support philosophy Is there a support program and team in place to assist if there are issues? Here at ISONAS we don’t believe in traditional tech departments where there are separate network, server, security, cloud and support teams. We fundamentally believe that a rapidly scaling business and application needs a team that can manage all systems, anytime and anywhere. Our team is empowered and trained to handle all facets of the support process from the customer to SaaS application. At ISONAS, security is taken seriously. The patented Pure IP hardware products from ISONAS offer a technologically advanced solution that eliminates the…

Read More

Change Approach to Vulnerability Management

Skybox™ Security has announced the availability of threat-centric vulnerability management (TCVM) for the Skybox™ Security Suite, signalling a fundamental shift in the approach to managing and prioritizing vulnerabilities. TCVM changes vulnerability management from an exercise of trying to patch ‘everything all the time’ to focused, intelligent action that considers real-world threats. TCVM does this by correlating multiple factors to determine vulnerability risk, including: The context of an organization’s environment such as potential attack paths and security controls in place, each asset’s exposure and importance to the business, and details of existing vulnerabilities. Intelligence on vulnerabilities being exploited in the wild. With the prioritization center in Skybox™ vulnerability control, security leaders can automatically analyze the thousands, even millions of vulnerabilities in their environment (including cloud and virtual) to pinpoint those that are truly putting their organization at risk. This means narrowing a huge volume of ‘known’ vulnerabilities that are potential threats down to a small, manageable number. They are identified as imminent threats known to be exploited in the wild. In addition, TCVM enables a systematic approach for ongoing, gradual risk reduction of potential threats that could escalate in the future. Skybox TCVM leverages ongoing intelligence of the active threat landscape produced by the Skybox™ research lab. The lab aggregates information from more than 30 security data feeds along with research of exploits available on more than 700,000 dark web sites and validated by Skybox’s security analysts. For example, Skybox analysts have been closely monitoring three major event categories impacting organizations today – the use of a specific, commercialized set of exploit kits, the rise of targeted client-side vulnerabilities, and the continued popularity of Internet of Things (IoT) botnets. A small, targeted number of exploit kits are dominating the dark web. In the first part of this year, five major exploits kits dominated chatter on the dark web, targeting nearly 70 vulnerabilities in Firefox, Adobe Flash, Microsoft Internet Explorer and Edge, Java, Microsoft XML Services and more. These vulnerabilities are known to distribute different malware as payload – for example, popular ransom ware and banking trojans. Threat actors continue to target specific vulnerabilities included in exploit dumps by hacker groups such as The Shadow Brokers. The group, notorious for allegedly leaking the National Security Agency (NSA)’s hacking tools, continues to pepper the dark web with exploit dumps like the major one on April 14 that contained many OS and server-side exploits. These dumps and targeted vulnerabilities impact web apps built with Apache Struts plus VMware, Cisco, Oracle and Microsoft products, to name just a few. Poor IoT security is still vulnerable. Botnets are exploiting vulnerabilities in network devices, gateways, cameras and other internet-connected devices, delivering distributed denial of service (DDoS) attacks through things like the ‘HTTP Port 81 Botnet’ and the Amnesia botnet which is the next generation of Mirai malware after source code was published and shared online. “Security leaders understand that the threat landscape is always changing. The difference now is that we’re seeing the growth of an increasingly commercialized cybercrime market. This is making it easier than ever for threat actors to attack, adjust and attack again until they accomplish their objective,” said Skybox CEO, Gidi Cohen, “They tend to aim for the easy targets – and the biggest ROI – by exploiting a surprisingly small number of vulnerabilities, many of which current vulnerability management approaches don’t consider as priorities. This has to change. Security leaders have to be smarter and way more targeted in their approach – aligning it to what’s happening in the real world – if they are to stay ahead of cybercriminals.” Skybox TCVM makes focused action possible by combining attack surface visibility, threat-centric vulnerability intelligence, and attack vector analytics to identify and prioritize an organization’s biggest risks according to vulnerabilities known to: Exist and are exposed in the network. Be actively exploited in the wild; or known to be attacked within a specific industry or geography. Have an exploit available, but are not known to be part of an active exploit campaign. Exist but are not exposed in the network. Threat-centric approaches to vulnerability management require the use of multiple technologies using several different types of security analytics.

Read More

Cyber Range Simulation Training Center in Tokyo

The facility, powered by the Cyberbit Range platform, will train cyber defenders in preparation for cyberattacks during the 2020 Olympic Games and beyond Cyberbit, whose cybersecurity solutions protect the world’s most sensitive networks, and Ni Cybersecurity, the Japanese cybersecurity service provider, have recently inaugurated the new Cyber Range training facility in Toranomon, Tokyo. The training center will provide hands-on simulated training for cybersecurity professionals and help address the growing shortage in cybersecurity experts, especially in preparation for the 2020 Tokyo Olympic and Paralympic games, which are expected to bring with them a sharp rise in the intensity of cyber-attacks. Ni Cybersecurity has conducted preliminary training courses, after which 100% of surveyed trainees responded they would recommend the facility to their colleagues. The Cyber Range training and simulation center in Toranomon, Tokyo, is the first fruit of the recent Cybersecurity cooperation agreement signed by the Japanese and Israeli governments on May 3rd, 2017. “We invite Japanese enterprises and government agencies to experience a new way to train cyber security professionals and improve their skills,” said, Takeshi Mitsuishi, President and CEO of Ni Cybersecurity, “This is another milestone in establishing Ni Cybersecurity as an innovative provider of cybersecurity services in our region, bringing the most relevant and up to date technologies to organizations in Japan.” The training facility will be powered by the Cyberbit Range, the most widely deployed cybersecurity training and simulation platform. Cyberbit Range enables trainees to practice responding to attacks in real-life settings including security tools, network architecture and traffic that reflect their actual work environment. The Cyberbit Range provides a rich and up-to-date catalog of simulated attack scenarios, including ransomware, enabling cybersecurity experts trainees to improve their skills and accelerating the on-boarding process for new team members. The Cyberbit Range powers cybersecurity training centers in North America, Asia and Europe. “Japan is expected to train tens of thousands of new cybersecurity experts while improving the skills of existing ones, all within a very short timeframe,” remarked Cyberbit CEO, Adi Dar, “I am confident the initiative led by Ni Cybersecurity and powered by our Range platform, will contribute to Japan’s cyber readiness for the 2020 Olympic Games, and for years to come.”

Read More

GJD Acquires Radiovisor

GJD, the leading global manufacturers and designers of professional external detector equipment and LED illuminators has acquired the infra-red beam and barrier technology plus all related intellectual property rights of Radiovisor Limited t/a Lazer Systems. Radiovisor’s ‘PREDATOR’ range of dual, quad and tower active IR beam sets plus the ATEX approved GS100 beam for use in hazardous areas will be manufactured at GJD’s factory in Heywood, and will undoubtedly enhance GJD’s perimeter security product range. Radiovisor Parent Limited was established over 90 years ago and was one of the innovators of the active infrared beam. The innovative high security PREDATOR system has been accessed by the CPNI panel and has met their requirements to be included within the catalogue of security equipment (CSE), ‘approved for UK Government use.’ The integral MM100 beam sets additionally hold NATO codification. Radiovisor’s IR beam technology will complement GJD’s product range instantly. It will provide installers, specifiers and consultants with a ‘one stop shop’ for IP connected detectors, active infrared beams, alarm devices and CCTV LED illuminators for all aspects of external security detection and illumination. Mark Tibbenham, Managing Director of GJD said, “We are extremely proud to make this announcement. A strategic acquisition of this nature will enable the company to substantially develop and grow in terms of security technology innovation. There is a huge demand for high-end and intelligent IR beam sets as well as reliable detectors that can be used in hazardous areas.” He added, “It is our sincere belief that GJD’s perimeter detection equipment is at the forefront of security in terms of detection ability, reliability, and freedom of false alarms. The inclusion of Radiovisor infrared beam technology will even further enhance our product offering.” Stephen Lasenby, Managing Director of Radiovisor Limited commented, “GJD is a professional and well respected company and is ideally placed to take our IR beam technology forward. We are confident that our customers and suppliers will benefit greatly from the ‘GJD’ brand, their focus on technology innovation and world class service.” He continued, “This change is fantastic news for our customers and partners. Radiovisor will continue to support our customers during the transition process to ensure it is as smooth as possible.”

Read More

Dahua International Academy, Poland

Dahua Technology has established the first Dahua International Academy in Poland in May 2017 for both internal and external trainings. The academy aims to provide comprehensive and systematic trainings to  Dahua local employees and customers to let them acquire deep understanding of Dahua products & solutions, local storage & logistics capability, as well as access to technical support services in local market. Dahua Poland Academy covers all the training programs in Central & Eastern Europe and Nordic regarding company information, sales & marketing strategy, channel policy, products & solutions and so on. So far, it has successfully held two sessions of external trainings, attended by customers from countries such as Czech Republic, Hungary, Croatia, Romania, Norway and Sweden. Training to a group of 16 people from Finland highlighted the initial stage of this academy. Dahua Poland Academy is scheduled to hold one training every month. Customers and employees from Central & Eastern Europe and Nordic are welcome to register for attendance. In future, they will constantly adjust the courses to better deliver the targeted information to the attendees, which mostly are Dahua customers. Dahua International Academy is not only a way of showcasing Dahua leadership in global security surveillance industry, it serves the purposes of enhancing customer adhesiveness and further promote localization progress in Central & Eastern Europe and Nordic. Customers in the region highly recognized the Academy and expressed their gratitude to the strong support from it. With a mission to build a safer society and promote smarter living, Dahua continues to focus on ‘Innovation, Quality and Service’ to serve partners and customers all around the world.

Read More

Integrating ACTEnterprise & Eventys

Following the recent acquisition of Dublin-based company ACT, one of Vanderbilt’s latest product offerings blends access control and video together – ACTEnterprise access control software, now supports integration with Eventys EX network video recorders (NVRs). Eventys NVRs offer methodical video recording of up to 16 IP cameras. Now, thanks to ACTEnterprise, cameras connected to an Eventys EX NVR can be associated with access control doors, making the security solution’s rewards considerable. Vanderbilt believes this blend of access control and video surveillance will make the day-to-day management of multiple security systems more efficient. This is because it minimizes the use of different systems for different tasks by combining operations in a single interface. Information is structured in one place therefore improving situational awareness. The integration also improves response times as the single system interface makes monitoring alarms and events more effective and efficient. The combination of both products also provides greater monitoring capabilities by linking the live video to real-time access logs. For example, this feature enables users to see who has badged at the door to get in but has been denied access. If someone attempts to use an inactive tag to gain access to a restricted area, an alert is triggered by ACTEnterprise and the Eventys cameras will record who was at the door trying to badge through. Up to 500 Eventys EX NVRs and 4000 IP cameras can be connected to ACTEnterprise without the need for an additional PC or a server. In applications that include Eventys EX NVRs,  ACTEnterprise software fully integrates the NVRs into the access control system, which makes verifying alarm events very easy.

Read More

Gemalto Finalizes the Acquisition of 3M’s Identity Management Business

The company in-sources biometric technology for government and commercial applications Gemalto has recently announced the closing of the acquisition of 3M’s identity management business after approval by the relevant regulatory and antitrust authorities. This strategic acquisition rounds out Gemalto’s government programs offering by adding biometric technologies and more secure document features, and it ideally positions the company to provide solutions for the promising commercial biometrics market. The identity management business will be integrated into Gemalto government programs business. In 2016, the acquired business generated $202 million in revenue and an estimated $53 million in profit from operations. “With the acquisition of 3M’s identity management business, Gemalto makes a strategic move by in-sourcing biometric technology. Combining our market access, technologies and expertise will enable Gemalto to further accelerate the deployment of trusted national identities and to offer strong end-to-end biometric authentication solutions throughout the digital economy,” said Philippe Vallée, Gemalto CEO, “I warmly welcome the new teams joining Gemalto and we look forward to working closely together towards success.”

Read More

Highly Secure Encryption-Technology Platform for Device Security

Platform enables easy and economical FIPS 140-2 Level 3-compliant solutions that satisfy ever-increasing security requirements in healthcare, home automation, secure-access control systems, and portable data storage STMicroelectronics and ClevX, an intellectual-property innovator and technology developer for portable storage and mobile device manufacturers, have announced the availability of a FIPS 140-2 Level 3 compliant Encryption Technology Platform reference design for security applications using commercial/ industrial-, rather than military-grade chips. The STM32 microcontroller-based platform will aid designers and manufacturers to design and build highly secure FIPS-compliant solutions suited for applications that require certified cryptographic functions. These application domains include consumer, corporate, and industrial applications in healthcare, home automation and security, secure-access control systems, and portable data storage. “Using the STM32’s advanced security features helped ClevX fortify their secure portable-storage reference platform,” said Tony Keirouz, VP IoT Strategy, Security, and Microcontrollers, STMicroelectronics’ Americas Region. “With the reference platform’s quality independently proven through its FIPS 140-2 Level 3 certification, and the benefit of using high-quality commercial-grade products instead of military-grade ones, designers and manufacturers can meet their application’s security needs on time and on budget.” The new ST/ ClevX reference design is based on the ClevX-patented DataLock/ DataLock BT technology platform for secure portable-storage media. The design uses ST’s ultra-low-power STM32 MCUs and Bluetooth® Low Energy chips (BlueNRG), along with both ST/ ClevX-based hardware, firmware and the related smartphone/ wearables app is immediately available for licensing and partnerships. “With ever-increasing public and corporate requirements for privacy and security,” said Lev Bolotin, Founder/CEO, ClevX, LLC, “The DataLock and DataLock® BT Security solutions use ST and ClevX technologies to allow designers and manufacturers to create and build cost-effective FIPS 140-2-compliant solutions that are simple to use while allowing legitimate operators to authenticate themselves to the devices and systems they need to use with FIPS-compliant solutions.”

Read More

Microsoft Azure Virtual Network Integration Boosting Cloud Security Visibility

New integration improves network visualization and the assessment of security controls in the public and private cloud Skybox™ Security has recently announced new inter-operability with Microsoft Azure Virtual Network (VNet), enabling customers to gain security visibility into virtualized networks created in the Azure Cloud. The Skybox™ Security Suite easily integrates with Azure VNet, incorporating the virtual environment in its network model to provide normalized visibility and access simulation capabilities across public, private and hybrid IT networks. This capability improves configuration security and enables security teams to quickly understand Azure’s role in the integrity of an entire network. “We’ve reached the tipping point for cloud with more than 60 percent of organizations now pursuing a hybrid IT approach. Cloud security, however, remains a challenge for most,” said Skybox VP of Products Ravid Circus. According to the Cloud Security Alliance (CSA), one of the top threats to companies in cloud environments is the risk of exploited system vulnerabilities. “The only way to effectively prioritize those vulnerabilities is by having visibility of the organization’s entire attack surface, regardless of the environment,” Circus explained, “And, you need context. We not only show how the virtualized network contributes to an organization’s attack surface, we give the context needed to understand where potentially exploitable vulnerabilities exist.” Skybox automatically integrates Azure VNet data into the network model, including gateway routing, VPN connections, subnets, hosts and security groups. Through one normalized view, security teams can analyze network access paths, both north-south (into and out of the data center) and east-west (within it). This improves access troubleshooting and understanding of potential attack paths. Skybox previously announced integrations with Amazon Web Services and VMware NSX. The addition of support for the Microsoft Azure Virtual Network provides even more visibility into virtualized networks strengthening the hybrid network security management capabilities of the Skybox Security Suite. Skybox Security™ arms security professionals with the broadest platform of solutions for security operations, analytics and reporting. The Skybox™ Security Suite merges data silos into a dynamic network model of the organization’s attack surface, giving comprehensive visibility of public, private and hybrid IT environments. Skybox provides the context needed for informed action, combining attack vector analytics and threat-centric vulnerability intelligence to continuously assess vulnerabilities in your environment and correlate them with exploits in the wild. This makes the accurate prioritization and mitigation of imminent threats a systematic process, decreasing the attack surface and enabling swift response to exposures that truly put your organization at risk. The award-winning solutions in vulnerability and threat management, automated firewall and security policy management and attack surface visibility increase operational efficiency by as much as 90 percent and are used by the world’s most security-conscious enterprises and government agencies, including Forbes Global 2000 companies.

Read More