Category: Feature
Hikvision HeatPro Thermal Camera: A Preventive Tool for Fire Safety
Fire is a massive safety concern, especially in large areas with combustible ‘elements’ such as charging units, waste and battery storage areas. Often these areas are unmanned at all times, and traditional monitoring methods do not always see a fire in time. The speed at which a fire can take hold is frightening, and so the earlier a warning is given, the better the outcome. Thermal technology is coming down in price and is being used increasingly to detect abnormal heat rises, effectively offering a fire prevention solution, rather than a fire reaction one. A serious problem smoulders According to the U.S. Fire Administration (USFA) the US suffers an annual average of 1.3 million fires resulting in 3,190 civilian deaths, 16,225 civilian injuries, $14.7 billion in direct property loss. It is a great concern to industry too, especially in large buildings with combustible or electronic con tents, like warehouses, fulfillment centers, dispatch centers, and datacenters. Even battery charging stations are higher risk, with Lithium-ion batteries being a particular concern. Existing methods of detection can prove useful, but have limitations with regard to verification and warning time. Smoke detectors will give an alarm when they detect smoke in the air. However, this is only after the fire has already started. The same applies to air sampling devices, which tests the particulates in the air, although these can usually detect smoke before a smoke detector. Optical cameras are also used, but they can only give a warning when flames are visible – in other words, when the fire has already started. Monitoring temperature before flame Thermal imagery can give warnings at an earlier stage of a fire. Because this technology monitors the temperature, rather than the output of a fire (smoke, flame etc.), it can flag a potential issue before it happens. If thermal sensors detect abnormal temperatures, operators can investigate further and take action to avert the fire itself. Cameras can be positioned at certain points around a site to monitor it all, or used to focus on particular risk points, like a waste dump, or an electric charging station. Solution designers use thermal technology successfully in a number of scenarios, including recycling centers, forests, and warehouses. Verification avoids false alarms Many fire systems use different types of sensor in combination, and thermal technology adds extra value by verifying other alerts. For example, it can double-check the temperature of an area where a smoke alarm has sounded. Thermal cameras can also provide support for those checking the alert location. With the use of a bi-spectrum camera, operators in the control center can see if the person checking the alert is in the same place as that alert, reducing the chance of error and missing a potential fire risk. The technology also comes in useful for planning and risk assessment. It can show potential ‘hot spots’ in a building by monitoring it over time. These can then form part of risk mitigation – to pay particular attention to those areas for fire prevention activities and evacuation plans, for example. When there are people in an area, preventing fire becomes even more important. Injuries can be averted, even lives saved, if they get the proper warning in time to act – whether to put out a fire or evacuate. Thermal camera ranges (e.g., Hikvision’s HeatPro series) have models linked directly to sirens or strobe lights. These can give a general warning in the area of the camera, as well as an alert to the system operator. Installation design flexibility Lower cost thermal cameras, like HeatPro, can also provide great flexibility in building a bespoke system for a site. A number of different detection distance options in the cameras provide different fields of view. This means that installers can find the right combination to meet the needs of the space they need to protect. Hikvision also has a Thermal Design Tool – software to guide installers on the best way to place the cameras in an area. Franck Carette, Product Manager Europe Security & Safety Thermal Products at Hikvision, said, “The fact the thermal technology has come down in price means that it’s now a much more sensible fire prevention option from an economic perspective. With the introduction of our latest model, this makes even more sense, since this has a much larger field of view. This means installers need to put in fewer cameras to cover the same area as before.” The maxim ‘prevention is better than cure’ resonates well in the world of fire safety. Fires cause massive damage, and can even be responsible for grave injury or death. However, if a fire risk can be identified early enough, a fire can be successfully managed, or avoided altogether. Thermal technology can provide that extra bit of time that makes the difference between containment and disaster.
Is a Smart Camera Also Smart Home Security?
Smart home device adoption is on the rise as new advancements and technology continue to roll out. According to Interpret, more than half of all U.S. consumers own at least one smart home device with video cameras ranking in the top five most popular. In addition, Parks Associates found that one-third of consumers who own a smart home device increased their use of their devices during the pandemic – noting both indoor and outdoor cameras. But is a smart camera a security system? Let’s explore further… Recent research from Interpret (a global insights firm) found that half of smart camera owners actually consider their cameras as their home security system. Having cameras where people expect to see them as well as where they don’t is what can make the difference between good and great security. But while a camera is a great way to keep an eye on your home and loved ones, by itself, a camera is not a true security system. “A picture may be worth a thousand words, but in the home security market, a camera is worth so much more,” John Owens, Senior Vice President, Sales Strategy and Operations at ADT noted, “Cameras can capture motion, facial recognition, and more, but where they can really be the most impactful is when they are connected to a professionally monitored system.” Professional monitoring offers a profound difference over self-monitoring, and when coupled with indoor and outdoor cameras, can provide monitoring agents and 911 dispatchers with more details to help them send the appropriate first responders in case of emergency. In addition, monitoring agents can use connected cameras to help verify alarms, which is known to help increase first responder response times. So, while cameras alone won’t keep your home safe, they are a great first line of defense to help keep an eye on things. And when coupled with a professionally monitored system, you can have greater peace of mind that professionals are helping to protect your home 24/7.
Impact of AI on Cybersecurity in the Age of Digitisation
By Prashanth GJ, CEO, TechnoBind There will hardly be any IT sector today untouched by the influence of Artificial Intelligence. AI has garnered much debate and speculation, and it continues to do so. It has gone through extensive research and development, which has naturally led to an increase in AI-based products and solutions. These are now slithering faster into our day-to-day life, more than most of us are aware. The drastic shift to digitisation has led to higher adoption of cloud-based solutions. Billions of devices access multiple clouds 24×7, leading to data generation increase to titanic amounts. The proliferation of cloudbased applications, IoT connected devices and the challenges arising from remote working is the foundation of an IT infrastructure that is complex to manage using only humans. AI has therefore become a critical technology in information security, as it can quickly analyze and identify and mitigate multiple cyber loopholes faster and with far more accuracy. AI-integrated cybersecurity systems help tackle data vulnerability steadily growing with businesses expanding beyond their initial technological capabilities. IT architectures are ever-expanding and also becoming more complex. Adding newer solutions to the existing networks increases the intricacy, and there are high chances of leaving gaps in the cybersecurity fabric. So companies must rely on a technology that acts faster on identifying the loopholes and improving the security posture efficiently and effectively. AI-based solutions can help identify the security team on the current gaps and the possibilities for any emerging future lapses and crises. Benefits of amalgamation of AI into Cybersecurity Promptness in detecting threats is one of the key attributes of using AI in cybersecurity. Traditional cybersecurity software cannot keep up with the sheer volume of new malware and cyber threats. AI-enabled cybersecurity systems can process these new threats quickly, and its continual learning the system can train itself to detect malware, run pattern recognition and detect even the minutest change that could be malware or ransomware. Automation of threat detection and its eradication without human interference is one of the crucial features of AI-based solutions. AI in cybersecurity incorporates more sophisticated and robust models and simplifies the existing ones. Data deception is another aspect that hints towards a more secure future, where these organizations can detect, analyze and defend against attacks by predicting and tracking them. Vulnerability management is very crucial to an organization’s network security. Every IT organization today, big or small, is subjected to several risks round the clock. Hence, vulnerabilities must be actively detected and eliminated. Vulnerability management may be aided by analysing and assessing the already existing security measures with the help of AI Investigations. AI can analyse systems much faster than cybersecurity experts or teams, enhancing your problem-solving abilities. What the future holds Advanced technologies make large-scale digitalisation possible. With AI integrated into cybersecurity systems, businesses stay protected from malicious activities. AI provides the necessary threat detection tools to track and identify security breaches and reinforce the security systems. AI in cybersecurity is proving itself to be the ultimate solution for defending cyber-crimes.
Pharmaceutical Crime: First INTERPOL-AFRIPOL Front-Line Operation Sees Arrests & Seizures Across Africa
A pan-African police operation jointly coordinated by INTERPOL and AFRIPOL has identified hundreds of suspects and resulted in seizures of more than 12 million illicit health products. Codenamed ‘Flash-IPPA’ (Illicit Pharmaceutical Products in Africa), the two-month operation, which ended in December, brought together law enforcement and drug regulatory agencies from 20 African countries to dismantle the organized crime networks behind regional pharmaceutical crime. Ahead of the operation, using globally sourced regional data shared via INTERPOL’s secure global police communications network, I-24/7, countries were able to target crime networks producing and distributing illegal pharmaceuticals across Africa. Frontline officers conducted inspections at roadblocks, open markets, pharmacies, warehouses and other locations suspected of producing, smuggling, storing or distributing fake pharmaceuticals. Flash-IPPA seizures at a glance: 2 million illicit anti convulsing tablets. 300,000 other epilepsy treatment tablets. 1,600 rapid COVID tests. More than 208,000 COVID-19 protection masks. The operation’s most commonly seized illicit medicines included antibiotics, anti-inflammatories, analgesics and medication used to correct erectile dysfunction, rheumatism and epilepsy. With the pandemic creating unique crime opportunities for organized crime networks to introduce fake medical products into legal markets, officers were on the lookout in particular for COVID-related vaccines, medicines and medical devices. West African operations revealed the use of counterfeit COVID-19 vaccination certificates in several countries, whilst East African operations saw the use of unregulated and unlawful distribution and sale of genuine COVID-19 vaccines. “COVID-19 has created a parallel crime pandemic and this operation shows how criminals are continuing to take advantage of this health crisis in order to maximize their illicit profits,” said INTERPOL’s Secretary General Jürgen Stock, “Addressing regional needs is a key part of INTERPOL’s global response to crime and our aim here is clear; to build stronger, meaningful capabilities for African law enforcement through our partnership with AFRIPOL.” Benin police authorities seized more than 27 tonnes of a wide range of fake medicines during one raid, triggering regional and global investigations. Investigations across Libya resulted in the seizure of more than 11.5 million painkiller and infantile epilepsy tablets. One raid in Niger saw the seizure of more than 300,000 epilepsy tablets. Zimbabwean police authorities arrested more than 2,000 individuals during its nationwide leg of Operation Flash-IPPA. Front-line officers in Algeria carried out more than 90 searches and inspections at strategic locations suspected of producing and distributing illicit pharmaceuticals. Shaping a coordinated response in African law enforcement operations “ The results of Operation Flash-IPPA are testimony to the strength of AFRIPOL-INTERPOL collaboration, and the importance of INTERPOL support in boosting AFRIPOL’s position as the lead African institution for preventing and combating transnational organized crime, terrorism and cybercrime,” said AFRIPOL’s Executive Director, Dr Tarek Sharif, “Operation Flash-IPPA will boost AFRIPOL’s intelligence collection for subsequent use in member state investigative collaboration.” With organized crime groups frequently engaging in multiple crime areas simultaneously, the operation also saw the seizure of cocaine, cannabis, khat, crystal meth, counterfeit foods, oils, beverages, cigarettes and baby accessories. Ongoing analysis of Flash-IPPA seizures and arrests in Africa is triggering associated investigations in all continents linked to pharmaceutical crime groups operating in Africa. INTERPOL’s Support Programme for the African Union (ISPA) assists AFRIPOL in developing its strategic framework and operational functions across the continent and in fighting transnational crime in cooperation with INTERPOL and other regional policing bodies. The results of Operation FLASH-IPPA follow the ISPA programme’s first in-person mission to AFRIPOL Headquarters from 15 February to 1 March 2022. INTERPOL’s Executive Director of Police Services Stephen Kavanagh co-led the ISPA Steering Committee with AFRIPOL’s Executive Director Dr Tarek Sharif, confirming the importance of cooperation between the two police organizations in boosting security in the African continent. Following intensive discussions, technical workshops and large-scale planning exercises, the Steering Committee adopted a clear work plan and priorities for the coming months. AFRIPOL manages a continental communication system called ‘AFSECOM,’ with access to a selection of INTERPOL’s criminal databases and its secure police communications network enabling it to work with police forces in 195 member countries. FLASH-IPPA participating countries included Algeria, Benin, Botswana, Central African Republic, Congo, Eritrea, Ethiopia, Gabon, Ghana, Libya, Kenya, Mauritius, Namibia, Niger, Rwanda, Sudan, Togo, Uganda, South Africa and Zimbabwe.
How to Manage Multimode Fiber Distance Limits
Multimode fiber optic cable is the backbone of most modern corporate networks. Multimode fiber optic networks are more efficient, easier to install, and significantly cheaper than single mode systems – making them the top choice for everyone from small businesses to large enterprises. There’s just one thing preventing multimode fiber from being the perfect network solution – multimode fiber distance limits. Single mode fiber networks can’t compete with multimode systems on price, but multimode fiber has a much shorter data transmission range. As networks grow and required data transmission speeds and volume increase, network designers and integrators like you must figure out how to manage multimode fiber distance limits to build and maintain fiber optic networks that meet your company’s needs and fit your budget. We’ve put together this short guide to help you better understand multimode fiber distance limits and how you can manage them to ensure your company network is optimized for performance, efficiency, and cost. A quick intro to multimode fiber distance limits Multimode fiber is designed to transmit multiple rays of light simultaneously. It has a larger core than single mode fiber (50-62.5μm vs. 9μm) which allows light to bounce off the walls of the fiber as it travels. This larger core enables multimode fiber to support multiple data protocols and transmit multiple signals at the same time, but it also limits the signal transmission range. As light travels along a fiber optic cable, a phenomenon called modal dispersion occurs. Modal dispersion is a technical way of saying the optical energy gets spread out and the signal loses integrity. It’s worse in multimode fiber because of the more jagged path light takes as it travels. Modal dispersion gets worse the further the light travels. After a certain distance, the signal gets so spread out that it’s no longer distinguishable by the devices it’s being transmitted to. As a result, multimode fiber distance limits are determined by how far the fiber can transmit data before modal dispersion degrades the signal. Three ways you can manage multimode fiber distance limits There’s no way to completely eliminate multimode fiber distance limits, but there are ways to manage them and maximize the range of your multimode fiber network. Let’s take a look at the three most effective strategies. 1.Choose the best fiber for your application The most basic way to manage multimode fiber distance limits is to choose the best multimode fiber for your application. There are five industry-standard multimode fiber grades. As you can see from the table below, they differ in size, optical source, bandwidth, and distance limits at various speeds. They also differ in price – with OM5 being the most expensive and OM1 the least expensive. In general, OM1 should only be used to patch or repair existing networks. OM3, OM4 and OM5 offer higher bandwidths and longer distance limits due to their use of advanced VSCEL (LASER) sources instead of traditional LED sources. OM3 is a good choice for most corporate applications, while OM4 features increased bandwidth and data transmission ranges if you need them. OM5 is the best for data centers and other high speed applications. Don’t forget to think ahead and consider both your current and future bandwidth and distance needs when choosing your multimode fiber. 2.Consider using higher wavelengths Industry-standard multimode fiber bandwidth and distance limits are based on a wavelength of 850nm, but modern fiber optic cables and devices can efficiently transmit signals using three wavelengths: 850nm, 1300nm, and 1550nm. Higher wavelengths can actually be transmitted more efficiently, meaning you get less modal dispersion and longer effective transmission distances. Fiber optics that use 1300nm and 1550nm are more expensive than devices operating at 850nm, but the difference is usually not prohibitive, and the extra range is often worth the extra cost. 3.Take advantage of technology Scientists and engineers haven’t figured out how to change the laws of physics and eliminate model dispersion, but they have developed technology to help mitigate the effects and extend the data transmission range of multimode fiber networks. With the help of technology such as Wavelength Division Multiplexing (WDM) and advanced small form-factor pluggable (SFP) optical fiber transceivers, you can achieve Gigabit Ethernet multimode fiber path lengths of up to 2 km – a significant increase from the industry standard limits. Let ComNet help optimize your multimode fiber use As you can see, there are several things you can do to maximize and manage multimode fiber distance limits, but it’s not easy. Choosing the right fiber, wavelength, and technology requires a high level of technical expertise and professional judgment. Fortunately, you don’t have to figure it out alone. Our ComNet Design Team is ready and willing to help. We offer a wide range of technology designed to help you maximize your multimode fiber range – including an extensive selection of SFPs and WDM optics. We also offer advanced design support from the experts in our ComNet Design Center.
What can AI Cloud do for Enterprises
By Mitish Chitnavis, Chief Technology Officer, iValue InfoSolutions Artificial Intelligence (AI) and cloud computing are at the center of most enterprise solutions today. Individually, the two technologies have evolved to support businesses in handling large data volumes, structuring their IT infrastructure, and accelerating processes and operations. The AI cloud is the natural progression of the technologies, wherein AI is deployed within the cloud environment to enhance decision intelligence while reducing costs. What is an AI Cloud The combination of Artificial Intelligence (AI) and cloud computing, or the AI cloud, is an emerging concept in enterprise software architecture. It addresses the current demands and challenges of storing and processing high-volume data, build and run algorithms in the cloud, integrate advanced machine learning services. Intelligent automation: With the integration of AI and cloud, barriers to enterprise-wide adoption of intelligent automation are removed. AI cloud drives the hyper-automation needs in the face of accelerating digital transformation plans. This allows enterprises to smoothly transition from discrete automation tools to a highly connected automation platform. Deeper Insights: Organizing, managing, analysing, and using data at scale is a challenge for enterprises. The convergence of AI and cloud helps enterprises understand vast volumes of data and consume it as actionable insights such as risk prediction/ detection or new business opportunities. Increased security: Big data brings in several security and privacy risks that could negatively impact any business. AI helps enterprises with an intelligent data security layer that can self-analyze, predict, and respond to threats in real-time. Its self-learning model allows the cloud to detect anomalies quicker and efficiently. Lower costs: Most cloud services provide a payas-you-use payment model. For enterprises considering the upfront costs of AI cloud it is a tremendous cost saving over traditional infrastructure such as managing on-site data centers. So, What does AI Cloud Change The AI cloud is a game changer in our data-driven world. The on-going COVID crisis shifted the gears on cloud adoption. Unlike traditional AI analytical models, the AI cloud enables extensive data management at high capacity without the need for physical servers. With the inclusion of AI, businesses can improve resource management with infrastructure optimization, fault management with self-management models, and load balancing with interconnected neural networks. As we move forward, AI cloud could lead to interesting results. Rise in AI-based platform services: The hybrid structure allows enterprises to harness AI capabilities with an AI-as-a-Service (AIaaS) model. Today, most of our cloud services are available off the shelf; outsourced to third-party vendors. The future could see the availability of AIaaS platforms as new operating systems for digital businesses. The AIaaS market is forecasted to grow at 25.8% CAGR by 2030, that’s a USD43.29 billion market. Incorporating AI cloud strategy: The last couple of years have seen a rising level of investment in cloud solutions. However, enterprises fail to have a holistic plan for AI integration. The next generation cloud computing platforms require an enterprise-grade AI platform strategy backed by a multi-technology stack. Application of cognitive intelligence: Powered by AI, the enterprises of the future would evolve into cognitive enterprises. This involves combining data, processes, and workflows under a single framework. AI cloud has the potential to deliver unrealized data value to a data-driven business platform. Despite the benefits, the AI cloud model is still in its infancy. Enterprises are hesitant to take the plunge owing to technology integration challenges, and lack of skilled professionals. As cloud computing continues to dominate the tech industry, it is time businesses start exploring the capabilities of AI and cloud computing together. All of the statistics about our magnitude, diversity, and years of experience, as impressive as they are, bear little resemblance to the ultimate measure of iValue – the differentiating impact we bring on to our fraternity. Here at iValue, we’re constantly reinventing how we work and how we approach market constraints so that we can keep delivering meaningful, sustainable, and long-term results for our clients and communities. We strive to be the best at everything we do, from assisting customers in realizing their goals to making a positive impact on society with numerous CSR drives apart from maximizing the performance of our employees. This inspires us to come together to make an impact that matters in the world. A market leader in smart, cutting-edge technology solutions who assists businesses in managing, optimizing, and protecting their digital assets. iValue stimulates creativity as a leading Technology Enabler by providing comprehensive services that support Data, Network, and Application (DNA) management for businesses. Our ‘Go to Market’ consists of niche, compelling, and complementary offerings that assist businesses of all sizes and verticals with their optimization and transformation efforts by leveraging the Customer Life Cycle and Product Life Cycle Adoption framework. iValue is proud to have served for over 6000+ customers across industry verticals through 900+ Partners & direct alliances with 65+ ‘Best of Breed’ Technology OEMs. iValue has a direct presence across 18+ locations covering South-East Asia & Africa continents with consulting; solutioning; vertical & horizontal focused teams, addressing technology enablement, pre-sales, sales & postsales needs of customer for private, public and hybrid cloud needs. iValue ASEAN operates with HQ in Singapore, with local entities in Cambodia, Bangladesh, Sri Lanka apart from Nairobi (Kenya) office for Africa foray. We continue to grow at 4+ times market growth rates, at 50%+ CAGR for the last 13+ years.
CEOs of the Future
Harsh Wardhan, Chief Executive Officer, CSC India Evolution promises growth and transformation. This fast-growing contemporary world demands timely conditioning, we need to bring out the best version of ourselves regardless of age or gender. Corporate management is one sector that challenges you, the benefits of which can be reaped if one can overcome a challenge. We need more critical thinkers and problem solvers to mentor corporations to reach the pinnacle of success. Positive reformation in the corporate world requires a shift in the mindset; from profit to purpose, from controlling to empowering employees, from hierarchies to networks, from planning to experimentation, from privacy to transparency. These are some of the fundamentals of the CEOs of today. If strategy-building was the only objective of all CEOs, then all the unicorn companies may have only remained limited to just four walls instead of gaining global recognition. For that, execution is mandatory. Many are the CEOs of today, but very few become the CEOs of tomorrow. CEOs of tomorrow will learn from their fractured policies, level up from good to great by having the ability to take risks and cultivating a unique futuristic vision. Corporate Management is aided with manpower optimization and technological advancement. Without technology, efficient management and customer behavior analysis get blurred rather invisible. The scope of growth mellows down without having the tech-savvy expertise, CEOs need to incorporate necessary changes. In today’s world, we hire employees based on not just experience, but also passion, soft skills, proactive approach, creative thinking to fill the loopholes in the existing corporate culture. Either you can follow rules, or you can modify existing rules. In the next 10 years, this will change drastically. When people hear the word CEO, they tend to visualize a probe of entrepreneurial greatness. A Harvard study revealed that CEOs may not necessarily share the stereotypical qualities that are usually associated with their role. Instead, the chances of sharing the traditional qualities such as prioritization skills, listening, and innovative thinking with cross-functional fellow leaders. Some of the basic qualities entrepreneurs commonly seek in their business partners are risk-taking abilities, the scope of adaptability, walking head-to-head with the latest trends. Liaising with your colleagues and business partners, bureaucrats, requires good communication skills, and a CEO should be qualitative in that. According to McKinsey, CEOs tend to show a greater sense of passion and purpose for what they do, than other members of company leadership. Cameron Herold, a leader in C-suite leadership and business growth said the smartest CEOs are open to hearing new perspectives, are vulnerable, and are always a learner. Only the leaders, in this context CEOs who are open to learning, are capable of growth. When it comes to communication, Navalent study claims that top executives share the ability to remain consistent in their forms of communication. The approach of a remarkable CEO remains neutral with all parties. They create opportunities based on realistic optimism. A clever move can change the dynamics and position of a company. Above all, CEOs of tomorrow should have the desire and ability to lead a company towards competitive success which is often derived from ethical commitment over financial gain. The psyche of a CEO dictates the vision of a company. Assigning tasks efficiently and assertively comes naturally as a by-product. Although a CEO is fuelling the organization, without a smart team of employees, he/ she cannot start the engine alone. Future CEOs will encourage more brainstorming sessions, would be emotionally intelligent and resilient. The proficiency to turn unanticipated situations into positive results is the key objective of a coherent CEO. Catching up to the Corporate Speed A decade later, speed will be the major factor by which growth will be computed – speed of communication, travel time, expansion in network ranges, decision-making, artificial intelligence, technology bandwidth etc. Future CEOs need to be technologically aware and knowledgeable at the least. Advanced robotics, last-mile deliveries, logistical advancement, manufacturing of goods, and so much more discoveries are yet to surprise the world. The active competitors may not take long to dominate the market if strategies went loose. Hence, it becomes crucial for the first in line to keep leveling up and remain ahead of the game. IT-related businesses will be one click away to find out analytical data for any or all purposes, from targeted strategy-making to easy integration of marketing automation workflows. Not many business reviews and performance reviews will be required. For a CEO, building constructive networks would be a common phenomenon to enable mutually benefitted relationships. Reading the capabilities of employees through personality development methodologies based on a CEO’s smart experience will be considered as a nurtured skill. Fostering dispositional evolvement Transparency is a key factor to gain the trust of the executives, further amplifying the accountability of the company’s employees. Overall, it assembles a common vision within the organization for efficient results. The uprising CEOs will be multifunctional, intelligent enough to bounce back from failures and push forward towards exponential growth. CEO’s demeanor complimented with honesty and humble attitude will be appreciated. Work will speak for itself, as the entire generation will become smarter, self-reliant, and most importantly skillful. Internet expansion will be a catalyst to make it possible. A pompous attitude is likely to take a back seat, and humility amongst the management will be in the forefront. Philosophical rationalizations won’t stand any ground without the factual description of thought – further envisaging the conceptual employability. Start-ups and businesses are going to face a revolutionary change on the global front. B2B, B2C, and D2C – all will be streamlined progressively towards business development. Based on the current patterns of surfacing industries like Fintech, IT, a distributive blueprint of the future can be drawn. New entrepreneurs of any dialect or pastoral regions from all over India will co-exist without any classification, simultaneous to the entrepreneurs of metropolitan cities. This will stock up the start-up market with potential untapped fields. Knowledge distribution via marketed artificial intelligent means will streamline the innovators of…
Eagle Eye Networks Targets Smart Cities, Education, Public Safety to Fuel India Expansion
Eagle Eye Networks, the global company in cloud video surveillance and artificial intelligence, recently announced its 2022 expansion plans in India will focus on the country’s tech-savvy industries, smart cities, education, and public safety. Headquartered in the U.S., with customers around the world, Eagle Eye began its expansion in India in 2021 when it acquired artificial intelligence (AI) leader Uncanny Vision, based here in Bangalore. Since that time, Eagle Eye has doubled the size of its sales staff with the goal of building a sales organization with exceptional technical knowledge, vertical experience, and deep expertise in the local market. The company is also expanding its India engineering team as part of its broader goal to increase innovation, development velocity, and the breadth of applications supported. The team will focus on product development, research and design as well as data science and machine learning. “India has a fast growing economy; its businesses see the benefits of cloud video surveillance leveraging artificial intelligence (AI) to improve operations and security,” said Dean Drako, Eagle Eye Networks CEO, “Backed by a global organization, the Eagle Eye Cloud VMS (video management system) is the perfect match for India’s cities, educational institutions and growing businesses, providing an open, flexible and powerful system that will meet their current and future needs.”
Security Industry World-Wide Preparing & Bracing for the Expected Crime Wave that May Occur Because of the Russian & Ukrainian Affair
Kunwar Vikram Singh, Chairman, Central Association of Private Security Industry (CAPSI) The pandemic resulted in an economic meltdown with various crime related issues. The Russian and Ukrainian saga is a global threat because it impacts globally on the energy security. Oil and natural gas are the foundation to all costs for living. Besides these, Ukraine exports grains to many countries which will add and impact the cost of food such as cooking oil, bread and beer. A second economic meltdown after the pandemic that initially lip-slapped the economy would be a massive blow to all financial sectors and industries. The private security industry is larger than any military force in the world. The private security has the skills to manage the behaviour of the population. Furthermore, the industry has the skills, technology and equipment to find the crime and stop it more effectively. Simply put, the security industry is providing more eyes on the ground therefore supporting the police in locating and catching criminals. The security industry must be acknowledged as a vital partner by the regulators. CAPSI (Central Association of Private Security Industry), ISIO (International Security Industry Organization) and SASA (South African Security Association – representing 9.15 million practitioners) call upon all security regulars world-wide to take certain steps to ensure a wider market for the legitimate traders. The regulators must protect the industry against illegitimate security companies and practitioners besides criminal elements that could attempt to penetrate the industry. Learning from History The economic meltdowns of the past have recorded long lines of unemployed and hungry people. The recent statistics related to the meltdown due to the pandemic affirm once again that many are jobless. Every country could be the same or their unique issues relating to the associated crime. One could deduce that whatever the stats were regardless of location, the levels of crime escalated – an example of recent demonstration and riots. These occurred in certain countries that experienced massive mobs against vaccinations. In specific locations there were mass groups looting under the guise of a politically induced narrative. There were small mob attacks directed towards migrant owned small business besides increased number of pro-nationalist demonstrations on businesses that employ migrants under the banner ‘give the jobs to the citizens.’ The practitioner should consult their own crime statistics in their location and may be surprised at the escalation overall but pay attention to specific crime. Possibilities of crime in this economic meltdown The biggest threat on the ground would be in the field of logistics. Gangs of people are hijacking and stealing tankers carrying petrol, food and for that matter anything. These are soft targets on wheels carrying high value goods already without effective security systems. Any interruption in the logistic chain could cause chaos. Each location and field of interest more than likely experience bribery and corruption of any kind for jobs. Consider expanding your crime research for such when considering the vulnerability landscape because this crime could lead to major reputational damage that obviously effects revenues. Tony Botes of SASA said, “When a country has major job losses then desperate people can do anything. It is vital to protect the entire logistic chain from warehouses stocking all goods, the vehicles as well as the route because empty burnt trucks could shut the road for days causing high anxiety for the population.” Profit protect clients and security companies clients should avoid reputational damage and lawsuits by using unlicensed security practitioners, as follows: When using an unlicensed security company then consider that there is no oversight and governance besides their staff being vetted. This could lead to organized or gang crime using the assets of the business for their needs or the staff adding to the loss of profits in some way or the other. Avoid reputational damage by using professional companies. When security companies cut rates to clients by cutting costs then they may not be training their staff properly or managing the site professionally. People carry phones that can record bad behaviour and social media could destroy reputations which could be costly. False Alarms: Attending to false alarms costs money. AI (artificial intelligence) saves the client money because the technology is able to read and distinguish between a false and positive alarm. Notify appropriate people to respond, thus not wasting money on irrelevant people that also cost money in transportation besides their time. Some perpetrators could be stopped before the crime is fully realized or caught, quickly saving money and anxiety. Reducing the percentage of budget for loss prevention. AI could identify an individual perpetrator or mob formation and could activate counter measures to reduce the collateral damage and related costs. Using AI provides the opportunity to increase the number of security investigators that are focused on looking for crime or handling aggressive and violent behaviour and stopping it. Avoid chaos: There are some sites that could experience specific issues because of the desperation of people. There are sites that could have a high probability of issues related that could demand for strategic security. Chaos can be expensive when the collateral damage is related to staff being hospitalized, assets destroyed or stolen besides the time needed to repair all besides the loss of revenue. The professional security company would ensure that the workforce at the entrance control is layered by specific skillsets to reduce the probability of aggressive and violent behaviour. The economic meltdown can deliver a larger number of criminals and a wide scope of criminal methods on the stage and into the spotlight. This calls for heightened security measures. Criminals may attempt to penetrate buildings for nefarious reasons such as home invasions, burglary, rape, murder or kidnapping. It is costly dearly to emotionally repair people or replace assets. AI can assist using applications such as allowing entry to only recognized approved people on their own or escorting others. Obviously. all entry and exit points need to be covered. Stop tailgating entry by opportunistic perpetrators Protect specific assets: The theft of company…
IT Security Leaders Lean on External Support for Most Aspects of Threat Intelligence
Threat intelligence has become a must-have for incidents’ prevention and an important area for organizations to invest in. At the same time, this new specialty remains challenging for IT security teams because it requires constant tracking, analyzing and interpreting of large amounts of fragmented data in addition to regular re-evaluation and adjusting of appropriate skills, sources and tools. The new study, evaluating threat intelligence practices among firms with mature cyber security functions, revealed that although 83% of decision-makers recognize the crucial role of threat intelligence in building a resilient cybersecurity program and plan to invest in the area, TI remains a challenging specialty for all firms. Close to two-thirds of IT security leaders (64%) said their firm struggles to align their threat intelligence program with their risk management program, and 62% face difficulties implementing measurement procedures to track threat intelligence effectiveness. Other major concerns include improving knowledge of the threat landscape, prioritizing multiple stakeholder requirements for information, and identifying gaps in data. To tackle these challenges and improve their threat intelligence program, IT security decision-makers plan to implement a range of measures internally and leverage vendors’ offerings. Respondents believe it is more efficient to lean on external vendors for the majority of TI needs. Six in ten (61%) would put support in place for processing raw intelligence information, 60% for collecting human intelligence and 59% for integrating data feeds with other security tools. However, firms still prioritize developing in-house capabilities for choosing and aggregating data sources. The top two benefits of using vendors’ support are quicker threat detection, remediation and response (56%) and improved efficiency with automated reporting processes (52%). About half of respondents also said external solutions can reduce the number of breaches and lower associated costs. “Threat intelligence program strengthens a company’s defense, contributing to visibility over the threat landscape by providing relevant and applicable insights. Facilitating threat intelligence processing and analysis it enables companies to make timely and fully-informed decisions. However, evaluating TI services and choosing among the innumerable available market options is another challenge that confronts IT security teams,” commented Artem Karasev, Product Marketing Lead, Corporate Product Marketing at Kaspersky, “Our experience in threat research suggests that while there are virtually no criteria perfectly applicable for all organizations, the guiding principle for choosing external threat intelligence sources should be quality over quantity.” Kaspersky suggests paying special attention to the following points when evaluating external threat intelligence solutions: Information sources the vendor uses: Vendors that aggregate information from around the world can provide more visibility over actual threats and efficiently correlate fragmented activities. Capability to provide context: Contextual data helps reveal the ‘bigger picture,’ further validating and supporting the wide-ranging uses of the data. Relationship context such as domains associated with the detected IP addresses or URLs for where the file was downloaded from etc., boosts incident investigation and supports better incident ‘scoping’ by uncovering newly acquired related Indicators of Compromise in the network. Compatibility with existing solutions: An examination of vendor’s delivery methods and integrations systems ensures smooth integration of threat intelligence into existing security operations. Vendor’s experience: Proven track record of threats investigation ensures efficacy of proposed solutions. Saying that the findings of the study were not surprising at all, Dipesh Kaura, General Manager, Kaspersky South Asia, added, “Given the nature of the job, TI is a highly dynamic, highly specialized field in which greater your access to information about what is happening around the world, stronger your security systems can be. For this, it is best to rely on the experts. At Kaspersky, we have a global research team dedicated to spotting and analysing cybersecurity trends in real-time. We have a platform to share their findings with our enterprise clients and the ability to customize our offerings in response to these threats.”