Category: Feature
Private Security Industry – A Perspective on Occupational Stress
Anil Puri CMD, APS group A first generation serial entrepreneur, thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, an innovator and a strategic thinker. He has used this combination to innovate and implement on-ground many new business ideas. His rich experience in various businesses has enabled him to nurture & mentor innovative ideas and scale them up. Introduction Occupational stress and burnout are emerging as possibly the biggest threats to the security industry. Long hours, coupled with ‘alert overload’ along with a perceived unfavorable opinion of business value are taking a toll on the industry. One of the reasons for this is that since security does not produce revenue it is considered a ‘Cost Center.’ Security operations may negatively affect profitability and throughout the years have been considered a ‘necessary expense’ of doing business. One of the ways good security was explained in the retail industry years ago was – what you don’t see on the monthly P&L (Profit & Loss Statement). Organizations tend to ‘forget’ about security until something ‘untoward’ happens and many times, ‘such untoward’ things happen because of security employee occupational stress and/ or security employee burnout. It doesn’t matter whether security is in-house or outsourced, occupational stress remains the same. Security is a profession that requires strict attention to detail & specifics and focused attention at all times. Many times, complacency tends to cause those working in the industry to miss important indicators or clues that there is a security issue. Accountability is a key factor. It doesn’t matter whether or not security personnel have limited security experience or are seasoned veterans, accountability in the security industry remains the same. Where is the Epicenter of Pain? Many times, security policies, protocols and procedures are unclear, not specific enough, or there is very limited training, so when security personnel complete a task or activity believing that they are operating within the scope of their job responsibilities, they later learn that they are being held accountable for a situation they were not trained to handle or a situation where they had no control over the outcome. This results in stress. Broadly the major component of the PSI which comes under intense stress is man guarding – the security guard whom we term as the ‘first responder’ is the one who faces the brunt. Others in chain and in fire lane are the entire echelon of the operations and training but they feel the heat much later. Private Security industry is facing immense pressure on account of the clients who are very demanding and is resulting in challenging environments. In day to day functioning, the occupational stress in PSI does not confine only to the security guard but impacts the entire team – security supervisor, field area officer, operations manager, branch manager, regional manager and senior level functionaries like VP and COO as well. Anatomy of the Stress in Private Security Domain Under the broad spectrum of surveillance activities, information protection, and risk management, the private security guards proactively prevent passage of drugs/ narcotics, violence, antisocial behaviors, thefts, and white color crimes at the workplace. Furthermore, the private security officers assist other crews during disasters and emergencies, and check doors, locks, windows, fences, and signs of fire hazards. As part of their responsibilities, private security officers screen and escort visitors, search employees and vehicles, manage car parks, provide first aid, and perform reception duties. The security personnel also offer access control, closed circuit TV monitoring services, and enforce rules and administer sanctions. Additionally, the security personnel also respond to offenses and deal with emotionally disturbed individuals, respond to calls for assistance, and attend to verify activated alarms. However private security personnel do lack adequate training. The majority of security personnel have insufficient knowledge of handling incidents appropriately. Insufficient training and failure to handle security matters properly accentuates pressure and stress on private security personnel. Types of Stress Acute Stress: The most common type of stress, resulting in a ‘fight or flight’ response where symptoms disappear as soon as the stressor is gone. Episodic Stress: When acute stress occurs regularly and a person does not have time to recover from the stressor, which can result in a lower overall tolerance of stress and increased sensitivity to stressors. Chronic Stress: Long-term stress from situations where a person feels he or she does not have control over the outcome, potentially causing serious effects to mental and physical health. Indicators of the Stress Some of the indicators of stress which are easily identifiable could be – sudden and frequent mood changes, the feeling of agitation without being able to pinpoint why, changes in the way you talk to people, dreading the same types of activities that you have been managing before, and a sudden dread feeling of not wanting to going for work. Causes of Stress Some of the factors that may place a role or location at a higher risk of stress include night working or shift working, working in adverse environmental conditions such as poor weather, noise or air condition, high work rate imposed demand, insufficient rest periods between work cycles, repetitive work related activities, conflict or violence in the workplace, lack of control over work duties, unmanageable workload and lack of employee engagement or consultation. Salary deduction or unduly delayed payment of salary also have accretive impact on occupational stress. Stressors Associated with Private Security Duties The security work environment is one of the primary sources resulting in the work-related stress security personnel suffer. Other stressors include working variable shifts, hazards associated with the job, public expectations, lack of clear guidelines, excessive workload, lack of adequate training, exposure to violence, and dealing with intruders and unlawful. Identified several categories of stress relate to security work. The stress categories are the nature of law enforcement work, dealing with the public, and the impact of stress on officers’ personal lives. Job content and employment context are two sources of stress…
Digital India 2022 Major Technology Trends for Indian IT Industry
Vikas Bhonsle, CEO, Crayon Software Experts India Every company is already an IT company today. Corporates or SMEs, every workplace today is accessing digital tools and solutions most organically. We are adapting to futuristic technologies faster than ever, thanks to the disruptive year of 2020. And India is one of the fastest-growing IT markets in this race, after the US and China. The IT industry here has witnessed growth in the last two decades, and soon, it is expected to touch the $100 billion mark. The Government of India has also been pushing for rapid digitization, leading to increasing investments in the IT sector. In the recent Union Budget of 2022-23, the Government of India has made a few announcements which will lead to some major developments in India on the digitization front. Apart from direct digitization in banking, higher education, and health sector, the country will soon have its own Digital Currency issued by the Reserve Bank of India, the country’s apex bank. Also, the government has announced that datacentres will be given infrastructure status in the country allowing it to play a key role in enabling a digital economy. Here are some of the major technological trends that will continue to transform the Indian IT industry in the present year are – the Internet of Things, artificial intelligence, blockchain technologies, cloud adoption, and data security & cyber protection. Internet of Things (IoT) The Internet of Things is a network of devices, vehicles, home appliances, and other items embedded with electronics, software, sensors and network connectivity that enable these objects to collect and exchange data. In 2022, the IoT will be firmly entrenched in people’s everyday lives. The number of devices connected to the IoT will triple by 2022, reaching 25 billion. Most cars and homes will be connected to the internet by 2022. Both individuals and companies will benefit from this connectivity. IoT makes the autonomous collection of big data possible, which helps businesses get insights into customer behaviours and product performance. IoT also facilitates the continuous optimization and automation of business processes and even helps to improve employee engagement and performance. Artificial Intelligence (AI) AI has been one of the most buzzing technologies in recent years. This has led to significant advances in many areas such as speech recognition, natural language processing, robotics, machine learning and computer vision. According to Gartner, AI and machine learning (ML) will be used in over 80% of IoT activities in enterprises by 2022. Hyper Automation is one of the major outcomes of AI, and this will be one of the driving forces behind digital transformation in 2022. Hyper-automation ensures streamlining of processes to increase efficiency, accuracy, and productivity. In 2022 we will see AI and ML increasingly active, infusing more automation and taking over most mundane tasks, freeing us to focus on activities that shall require more human touch and intervention. With AI and humans working together, the workforce is becoming an augmented one. AI will not replace humans but will be working along to add efficiency to our work. Blockchain Technologies Blockchain is a technology that enables digital information to be distributed but not copied. It is a vast and globally distributed database, which can be applied to anything from payments and banking to complex computer programs. A report by trade association IDC predicts that worldwide spending on blockchain technologies will reach $9.7 billion in 2022. Blockchain is a highly disruptive force for enterprise software. One of the most intriguing applications of blockchain technology is supply chain tracking, which gives the ability to track products from the time they are created to when they are stored in warehouses and finally sold to customers. Blockchain is also used to reduce fraud in digital contracts and create faster data retrieval for distributed ledgers. The technology is continuously developed, with some of its latest applications being Smart Contracts and crypto-currencies. In the future, blockchain technology will be used to manage personal health records, deliver payments, and even Smart buildings. Cloud Adoption Cloud computing has become an increasingly popular way to store and manage data, which means more sensitive information is on the cloud than ever before. Cloud computing is often looked at as a more secure alternative to on-premise solutions. It is also a better choice for most businesses, as it reduces hardware and maintenance costs by paying for resources only when needed. By moving some of the infrastructures to the cloud, companies can also significantly improve their security posture. Also, companies using single cloud resources earlier are now exploring multicloud options. With single cloud earlier, companies were often suffering in vendor-lock ins, and it was also risky and costly to store all data in a single server. Multicloud is a better option when it comes to disaster recovery. Instead of establishing a traditional on-premise disaster recovery capability, cloud resources can be used as and when required. As each provider will be coming up with their unique selling propositions, be it in AI, machine learning, or analytics, a multicloud strategy will give organisations the advantage of each platform’s competitive edge. Data Security and Cyber Protection Data security and data protection will remain areas of highest concern in 2022. Businesses in the last two years were riddled by constant ransomware attack threats, data breaches and major IT outages, which became even bigger nuisance than supply chain disruptions, or the COVID-19 pandemic, all of which have heavily impacted businesses in the past year. 2022 will still be a difficult year, as there is still a large talent pool to fill up for efficient cybersecurity management. Also, it is estimated that cyberattacks will be relentless in attacking small and medium scale businesses. End-to-end encryption is already becoming mainstream along with zero-trust policies when it comes to network security, and data access control. However, things will continue to look grim for the coming years as ransomware attacks are gearing up menacingly. As per research agency, Cybersecurity Ventures, the frequency of ransomware attacks on a consumer or…
How to Provide Dynamic Engagement in Distance Learning
Digital learning has emerged in a gigantic way in the past few years, and the pandemic situation has further propelled its growth. The education providers who had adopted online learning methods during lockdown are leveraging it in their future plans. In a recent EU report polling educators on this topic, it was identified that as many as more than 96% plan to continue with distance learning technology after the pandemic1 . The cost and flexibility benefits are evident – with teachers being able to take lectures for different classrooms in different parts of the world from a single location, and even students studying from the confines of their homes. This is probably why the topic of using technology to enhance learning, and more importantly, access to learning is being encouraged around Europe. Follow the teacher But what about engagement? There have been a number of studies finding that ‘educator’ presence is crucial in online lessons in order to engage students. They need to be seen, react to questions and, in general, evoke the feeling that they are actively a part of the learning process. Traditional methods of distance learning fall down a bit here. Most platforms tend to have a static view – even if you can see the teacher, they feel disconnected. There may be limitations in what teachers can do. The use of smart cameras can really make a difference here. A camera trained on the teacher as they move around the classroom can really help to make students, especially children, to feel part of the experience. For example, following them as they approach the whiteboard and seeing teacher explain something makes a student feel more like they are in the room too. This can be cleverly managed to be more dynamic, with close-ups of presentations, split screens and ‘live’ diagrams to provide interactive, and more interesting, viewing. Interactive screens can also play a part – with their ability to ‘stream’ whiteboard activity live, and store it for future use. In fact, a teacher can have a wide range of resources to build an engaging, memorable and effective lesson – from videos and images to traditional whiteboard explanations and diagrams. They can also respond to questions from students in real time – just as they would in a traditional classroom lesson. Include remote students Another important part of the engagement is accessibility. You could have the best, most engaging lesson on the planet, but if students cannot see it, it’s not going to help them! A smart distance learning solution using cameras can give educators flexibility. They can be teaching a class face-to-face, a remote classroom and students online – all at the same time. Students who cannot get to the main classroom, for example, because they are in a partner school in another city, or they are at home nursing a broken leg, do not need to miss out on education. In fact, they can be in exactly the same class. Some could even be accessing the lesson through a mobile, or tablet, further extending the reach of education. Today’s web cameras like the ones from Hikvision also improve learning experience with vivid and high quality images. Make materials available There are other benefits too of a centralized digital distance learning solution. The classes, including explanations and questions, can be saved to be accessible to students in the future, for recap or clarification. The resources used by the teachers – like videos, diagrams, and articles can also be stored for future reference. Enter Hikvision Hikvision’s Distance Learning Solution can provide all these benefits, tailored to the needs of the education provider. A Teacher PTZ camera follows the teacher (if they have given consent) as they move around the classroom. The teacher camera is 4K, for HD images and provides a close-up view of the teacher. In fact, this alone can really improve engagement, and has been a popular option for educators through the pandemic. Smart interactive screens can also be used to enhance the interactivity of the lesson, and provide the teacher with another way to explain and demonstrate. An Education Sharing Server brings all of these devices together, helping to manage lessons, and synchronizing the multimedia assets used. The server can also store the lessons and assets for students to access at a later date, through whichever sharing method they want. The solution is also fully-compatible with a wide range of 3rd Party software enhancements, further supporting the flexibility of the bespoke solution built to cater for the needs of the education provider. A specially-designed education version of Hikvision’s HikCentral software will also soon be available to help coordinate and disseminate lessons and assets. With so many aspects of our lives becoming digitized and more disparate, it is important to retain the engagement element in education. With the help of smart cameras, screens and management tools, engagement can advance hand-inhand with accessibility to create a new benchmark for learning. “Practically all those respondents already using distance online learning before the crisis plan to continue doing so after the crisis (96.2% in the sample ‘All countries’ and 100% in the sample ‘Without RO’).” EU Digital Education Action Plan 2021-2027.
The Future of Drones and How They can Transform the Defense and Homeland Security Sector in India
Rohit Dey, Architect – Drone Solutions, Mistral Solutions Pvt. Ltd. Drones, also known as Unmanned Aerial Vehicles (UAVs), Miniature Pilotless Aircrafts, or Flying Mini Robots, are fast gaining popularity and have become the weapon of choice in modern warfare, used by both state and non-state organisations. Drones are becoming increasingly indispensable, considering their high level of efficacy, low cost, and low visibility. Drones are still in their infancy in terms of mainstream adoption and usage, but they have already broken-down traditional boundaries in industries that were previously thought impenetrable by similar technical advancements. Drones have become crucial to the functioning of numerous enterprises and governmental organisations over the last few years, piercing through sectors where specific industries such as industrial, defense, oil and gas, search and rescue etc., were either stagnant or lagging behind. Drones have been around for more than couple of decades, however, their origin can be traced back to World War I, when the United States and France collaborated to develop autonomous, unmanned warplanes. Drone technology has evolved and thrived in recent years, from technically staffing critical military regions to enticing enthusiasts all over the world. The last decade has been noteworthy in terms of drone acceptance, industry utilisation, development, and worldwide awareness. Types of Drones and Their Applications Typically, Drones are categorised into three major platforms – Fixed wing, Rotary wing, Hybrid VTOLs (Combination of fixed and rotary wing Vertical Take-off Landing). Further, they are also classified based on their Size (nano, micro, small, medium & large), weight, flying characteristics, type of energy source etc. Fixed wing UAV platforms, which are already operational in leading defense forces worldwide, are used for long range missions due to their characteristics like high speed, fuel consumption, flying altitude, and far greater payload capabilities. Fixed wing UAVs require moderate to larger space to take-off and land as they are launched either by hand, catapults or airstrips depending on the wingspan of the aircraft. Rotary wing UAVs, commonly known as Helicopter or Rotorcrafts, can be classified in to sub categories such as Single rotor (similar to conventional helicopters with main rotor and tail rotor), Multirotor (more than one rotor – bi, tri, quad, hexa, octa etc.) & hybrid platforms. Rotor UAVs, due to their unique ability to take off & land vertically from very limited and compact space, is finding increased applications in homeland security and military applications. The ability of these drones to hover for long duration make them ideal for search and rescue operations, small-cargo delivery, ISR, and border surveys, among others. VTOL is a very unique platform with massive capabilities and extensive operationality for Defense applications. This platform can take off and land like helicopters, hover and also fly around in Heli-mode, and can also be switched to fixed wing and fly like an airplane with speeds higher than helicopters. Drones have proved to be incredibly advantageous in locations where humans cannot access or function in a fast and effective manner, be it making rapid deliveries during rush hour or rushing supplies to an unreachable military post. Increased efficiency and productivity, reduced workload and production costs, enhanced accuracy and minimal security challenges are just a few of the many benefits drones provide organisations throughout the world. Drone technology adoption across sectors jumped from the fad stage to the standard operational stage very fast, as more and more firms realised their potential, scope, and applications. Drones, whether operated by a remote or a smartphone app, have the capacity to reach the most remote regions with the least amount of effort, time, and energy. This is one of the primary reasons that they are being accepted globally, particularly by sectors like: military, commercial, personal, cinema, agriculture, police, government, AI based applications. Some of the Drone applications include: Long distance ISR. Law enforcement and border surveillance. Self-destructing target systems. Short range armed drones for combat. Swarm operations for both military and entertainment applications. Network connectivity system. Emergency/ disaster management. Search and rescue operations. Rapid fire fighting aerial system. Express shipping and delivery. Perimeter surveillance and safety inspections. Geographic survey and mapping of inaccessible terrain and locations. Precision crop monitoring. Storm tracking and forecasting hurricanes and tornadoes. Drones in Defence Ecosystem Today, Drones have become an integral element of armed forces across the world, serving as target decoys, combat operations, research and development among others. Military spending, according to recent projections, will continue to be the primary growth driver for drones in the coming years. According to these projections, worldwide military spending on drones is expected to cross $70+ billion in 2022, and these drones will play a critical role in resolving future wars replacing human pilots. Military funds also tend to come in bigger amounts, with a single US Predator drone costing around $4 million, and overall programme spending estimated at nearly $2.4 billion. Defense forces have been using fixed wing UAVs for a few decades to conduct unmanned aerial surveillance and launch strikes in addition to using them as electronic decoys and Radar jammers. Fixed wing UAVs have their own advantages, however, rotary wing UAVs, due to the unique capabilities are considered the future of warfare. Lately, defense forces have been considering rugged special purpose tactical drones for military research, intelligence gathering at borders and to carry out combat missions beyond enemy lines. The Indian army, in the recent past, has taken various initiatives to strengthen the high-altitude border areas using drones of various capacities and capabilities. The Army is considering the induction of a wide range of Drones with varying capabilities for applications such as high-altitude heavy payload delivery, continuous border surveillance, combat and cross-border ISR among others. Heavy Payload Drones The northern and eastern borders of our country is extremely hostile and harsh with altitude ranging from 5000 to 20000 Ft, heavy snow fall during winter, presence of glaciers and treacherous mountain ranges. The most critical challenge which the Indian Army faces at these heights is the transportation of essential goods like fuel, food, medical kits &…
The Rise of Serverless Cloud
Prashanth G J, CEO of TechnoBind Revolutions in the technology field are often driven by the emergence of new technologies. The pandemic has not only challenged the modern world but also created a humongous opportunity to revolutionize. However, creating something valuable and profitable is the ultimate goal of any technical revolution. Cloud computing has been experiencing a period of anomalous growth, several factors have been responsible for this, including the rise of mobile computing, increased maturity of cloud offerings, improved network performance, etc. This constant innovation and growth lead to the invention of serverless cloud computing. Serverless cloud, the future Serverless computing is a cloud-based architecture where the cloud provider has total control over the underlying infrastructure that supports an organization’s activities. It is a platform that hides server utilization from developers and executes code on-demand automatically scaled and billed only if the code is running. Serverless cloud is a relatively new technology, and it is capable of turning your enterprise into a vibrant, flexible, service-oriented working model of the future. Serverless cloud enables your enterprise to expand into the cloud with serverless architecture all over the public and private cloud environments. One of the efficient ways to ensure that diverse resources are available at scale is done by migrating the IT environment to the cloud. Serverless cloud aims to put an end to tedious and time-consuming development and O&M work for servers and other infrastructures in the cloud-based application. When compared with traditional models, serverless models allow enterprises to build applications based on a large number of mature cloud service capabilities. This ensures fewer technical decision-making points and simpler implementations. Because of optimized cloud products, enhanced product integration capabilities, and improved software automation the serverless cloud will help enterprises improve their agility. Some key benefits of serverless cloud Expenses: The most tangible benefit is cost. Serverless cloud enables enterprises to only pay for whatever they need when they need it. Because there are almost no unnecessary resources, as blocks of servers are never sitting idle waiting for utilization. Configuration: The configuration will be significantly more straightforward and streamlined as the host firm handles the greater part. This facilitates scaling up the extra resources without customary downtime for your configuration. Speed: Because the enterprise does not need to manage the server, deploying the services and applications is much easier and faster. This will let the development team to focus on creating their service and then deploying it without worrying about the backend server. Automation which is a key trait of serverless cloud makes it particularly appealing for unpredictable workloads. Most importantly, serverless cloud enables developers to focus on what they should be doing making way for business agility and digital experimentation. Serverless Cloud is destined to transmute the future software model and process and is the future of cloud computing. With serverless cloud, enterprises can place their hands on improvised scalability, flexibility, and affordability. We are now witnessing an era where there is an ever-increasing demand to scale, leverage, and spin applications. These demands indicate that serverless clouds are the future. Cloud services are moving ahead to deliver real-time demand as they have ready deployment of services and applications. There is no doubt that the future-oriented technology for cloud services is serverless functions. Traditional cloud computing will undergo transition and will make way for serverless cloud. There have been several cases for many businesses and enterprises that prove that adoption of serverless cloud has resulted in operational boons such as cost-cutting and easy deployment.
Resurgence of Tape Backup in the Digital Era
Nikhil Korgaonkar, Regional Director, Arcserve India & SAARC Most people today will consider reels of tape to be as dated as steam engine and analog cameras, having been replaced by newer, faster, and more efficient technologies. Unfortunately, one can still see many stories around reporting the death of tape storage, citing technology drawbacks as a significant reason. Such as, tapes can be labor-intensive, requiring a manual process to change them at the beginning or end of every day. Tapes are long and stringy, and can also be misplaced or outright lost. These factors and more have given tape storage a poor reputation in today’s marketplace, and they are helping to drive the steady migration to flash storage and cloud storage. But here’s the thing. Despite all the criticism and naysaying, tape has survived and is in fact more relevant today than ever as a means of data storage. With 5G adoptions and the dramatic expansion of the internet of things (IoT), the amount of data being generated is more than what can be stored easily. As of January 2021, there were 4.66 billion active internet users worldwide, accounting for 59.5 percent of the global population. By 2025, there will be 38.6 billion IoT-connected devices worldwide. One can only imagine what will be the size of data generated by 38+ billion objects! Storing such massive amounts of data on the cloud can be expensive, especially if all of it is not urgent or mission-critical. And nothing comes close to storing voluminous data on tapes. Besides, storage cost is very little per gigabyte. Tape is like the mainframe computer, which allegedly died more than 20 years ago but is still a tried-and-true technology in many large enterprises. Tape capacity shipments are on the upswing. A recent report from the Tape Storage Council found that a record 114,079 PB of linear tape-open (LTO) tape capacity shipped in 2019. That’s about 400% more than was shipped in 2009. Here are five reasons why tape storage offers significant advantages over other options. 1. Tape boasts better protection against ransomware Many of today’s data-storage technologies such as cloud storage, can’t fully protect the organization against the growing threat of ransomware attacks. On the other hand, tape backup is offline, so it can’t be easily infiltrated by malware or any other kind of cyberattack. The tapes themselves are often kept at offsite locations or in storage vaults. That means tape can serve as the last line of defense. Even if ransomware thieves penetrate all the other defenses, they still won’t be able to score if all the data is safely backed up on tape. So, it’s ironic that while we become more and more connected and digitized, we rely on good old tape to give us an extra layer of protection and better secure our data against ransomware. Tape offers other security capabilities as well, such as write-once-read-many (WORM), which means that data once written can never be overwritten or deleted, either unintentionally or by those who wish to do the harm. This capability is critical because it’s not just outside hackers who pose a threat. Sometimes insiders are the problem. If a disgruntled employee tries to delete all the data, having tape storage can completely negate that threat. 2.Tape can survive disasters Even after all these years, backing up data on tape and sending it offsite is still a highly reliable disaster recovery method. If the office burns down or there’s a once-in-a-century flood or any other kind of natural disaster, the safest way of protecting the data is to put it on tape in a secure remote location. That’s why savvy organizations will never stop doing tape storage. 3.Tape is cost-effective The cost of tape storage continues to decrease while its storage capacity increases. Tape remains one of the least expensive options for longterm data archiving. According to Fujifilm, tape is three to four times cheaper to use than disk for long-term storage. The leading tape backup format is LTO, and with the introduction of LTO-8 several years ago, enterprises can store up to 30TB of data compressed on a single tape. But that’s just the beginning. In the not-too-distant future, LTO-generation-12 will store up to 480TB compressed on one tape. That means tape can easily accommodate the massive data growth that almost every organization faces. 4.Tape makes insurers happy Cyber liability insurance is a type of insurance designed to cover losses and penalties associated with a data breach or other cyberattack. But large insurance providers are getting very selective when underwriting new cyber policies. Many will only insure customers that have ironclad data-protection strategies. That means businesses must increase their investments in security tools and processes to prove that they are a worthwhile risk to insurance providers. Having an A-to-Z strategy that includes disk storage, cloud storage, and tape storage gives a better risk profile in the eyes of cyber insurance providers. Need more benefits? Ask the insurance company if they will reduce the premiums since the data is backed up to tape. Better still, companies with an end-to-end security strategy that includes backup & recovery and storage may not even need cyber insurance. If companies have three different storage media at their disposal, they can protect themselves in pretty much any potential data-loss scenario. 5.Tape lasts much longer Data storage professionals have a saying. There are two types of hard disks: those that have failed and those that will fail. Yes, modern-day technologies like magnetic storage, flash storage, and cloud storage offer a lot in performance and flexibility. But they fall far short of tape storage when it comes to shelf life. They don’t even come close. Tape storage has an average lifespan of 30 years. Disk storage, by contrast, typically starts to fail after about five years. Right now, tape storage is the only medium that will preserve data well into the future. Tape may be one of the oldest methods for data storage, but it remains highly relevant for backup…
The Convergence of Physical and IT Security – and What it Means for Your Business
“The age of IoT and AI means that physical and IT security are no longer separate domains. Instead, everything is connected, and you need to converge your security leadership, teams, capabilities, and technologies to navigate the evolving risk landscape ~ Fred Streefland, Director of Cybersecurity and Privacy at Hikvision EMEA” Until recently, physical and cybersecurity domains were separate from one another. Security teams, access control systems, and CCTV systems were used to physically secure buildings – from data centers to factories and warehouses. And IT teams looked after IT and network security with firewalls, anti-virus software, and data encryption technologies. But as organizations have forged ahead on their digital transformation journeys, innovative technologies such as IoT and AI have blurred the lines between physical security and cybersecurity: a trend that’s set to continue long term. Why IoT is increasing your physical and IT ‘attack surface’ When thinking about your overall security strategy, consider that your security cameras and other security infrastructure are now ‘IoT devices’ that are connected to the network. This gives criminals and hackers a much larger ‘attack surface’ for their activities, with multiple ways into your organization. For example, hacking or otherwise accessing a network-connected camera or other device can allow criminals to override physical security controls and enter restricted areas or buildings. Equally, hackers who can breach IoT devices on the network may be able to disrupt critical systems, steal data, install ransomware, or otherwise compromise your company’s operations. Physical break-ins also pose major cybersecurity risks Equally, criminals who manage to circumvent your physical security infrastructure can also gain access to IT equipment and systems housed in restricted buildings. This means they can extend the impact of their localized attack across the length and breadth of your network, causing untold damage and disruption in the process. This is especially the case where server rooms are left open or unlocked within a building. The mission-criticality of the network, and the sensitive data stored in connected systems, means that much stronger security is needed for these kinds of facilities to ensure they are never accessed, even if intruders breach your building defenses. Here are some examples of how physical threat vectors can compromise digital security: An infected USB drive is planted in a parking lot, lobby, etc., which an employee picks up and loads onto the corporate network. An attacker breaks into a server room and installs a rogue device that captures confidential data. An attacker pretends to be an employee and counts on a real employee’s courtesy to hold the door for him as they enter together. An inside actor looks over the shoulder of a system engineer as they type administrative credentials into a system. The most well-known example of an attack on physical systems followed by an attack of IT systems is the hack on the retail giant Target in 2013. The attackers used an HVAC vendor’s credentials to compromise the network and ultimately the point of sale (PoS) systems of this company. The attackers ‘entered’ the company via the Heating, Ventilation & Air Conditioning (HVAC) systems and managed to compromise several millions of credit cards of Target customers, which caused the resignation of the CIO and CEO of Target. Why ignoring the issue isn’t an option The consequences of security breaches – whether they take place in the physical or IT domain – are potentially devastating for many organizations, and especially those in mission-critical industries. Security breaches at electricity sub-stations, for example, could leave entire towns or cities without power. And similar breaches in data centers could result in internet ‘blackouts,’ major data breaches, regulatory fines, and a raft of other negative impacts. To minimize the risks of security breaches in the age of IoT, forward-thinking organizations are looking to extend their security strategies seamlessly across the physical and IT domains. This holistic and integrated approach requires both organizational and technology changes that reflect the rapidly changing physical and IT security risk landscape. 4 key strategies for integrating your physical and IT security Forward-thinking organizations are beginning to integrate their physical and IT security provision based on 4 key strategies: Creating an integrated security culture and transformation plan: Any successful integration of physical and IT security begins with a strategy based on digital transformation. This strategy needs to be communicated across the entire security organization from the top down, preparing teams for the transition to integrated physical and cybersecurity, including key milestones and potential disruptions and change management issues. Appointing a CISO or data officer who is responsible for both physical and IT security: The siloed nature of physical and IT security responsibilities increases the risk that attacks in a particular domain will go undetected, or that responses will be too slow to prevent negative impacts from occurring. By appointing a CISO or other c-level executive for joint responsibility, and visibility, of physical and IT security, these potential gaps can be closed, and faster, more effective responses can be mounted in the event of a breach in either domain. Converging physical and IT security monitoring within a single dashboard interface: In terms of technology, integrating IT and physical security monitoring into a single dashboard helps to dramatically decrease the risk of a breach, and to mitigate the impacts if a breach should occur. For example, by mapping cyber and physical threats together, a unified dashboard can spot anomalies more quickly, and pinpoint where the threat originated based on an unidentified device in the network, unauthorized access to a device or physical space, or other threat indicators. Deploying innovative technologies that enable truly unified security responses: By implementing data analytics platforms, smart video solutions, AI-powered security algorithms and other innovative technologies of this type, organizations can detect security threats across physical and IT domains in near-real time. Additionally, false positives can be minimized, further saving time and resources and speeding up security responses. How Hikvision can help At Hikvision, we provide smart video technologies and AI-powered security algorithms that help to improve security in…
Every Door is an Opportunity
Nikhil Kothary, Founder & CEO of VAMS Global We are in the midst of the third wave and the numbers are shooting up. In the last 24 hours, 2.64 lakh new cases were reported in India and the first fortnight of 2022 has seen close to 17 crore new cases globally. Omicron cases are expected to rise in the next few days given the variant’s higher transmission rates. But there is good news Vaccinations have allayed fears in the country over the last six months and will continue to fulfill their purpose. As of January 14, 157 crore vaccines were reported to have been administered in India and an average of 84 lakhs were being administered per day over the last 2 weeks of the third wave. Third wave agenda: Aarogya Setu & CoWIN checks To practice caution, many workplaces are at half capacity, with employees coming in only on certain days of the week. Workforces are either alternating between work-fromhome and work-from-office or completely transitioning to remote work for a temporary period. Employers naturally will have to stay aware of the people coming to and from their workplaces. Health status is such an important piece of information going forward. Cross-checking governmental databases for RT-PCR test results and vaccination statuses can always help. Employers might want to request their employees/ visitors for this information and perhaps enforce rules to ensure that the people passing through their doors are, at the very least, double-dosed. To this purpose, vaccination status apps and web portals like Aarogya Setu and CoWIN can assist employers in their bid to create a safe environment. How can they do this? Human resources departments can organize one process by which this information can be seamlessly offered by employees and visitors. This best practice would be to have a Co-WIN and Aarogya Setu integrated workflow management system. Letting the right people in, not keeping the wrong people out A workflow management system simplifies the entry process for all visitors/ employees in the workplace and it also simplifies the administrative functions of workplace managers and human resources. It can be a lot of things at one time. It can be a data collection process that ethically stores names, in-times, out-times, and purposes of the visitors. It can be a security-related process that integrates with access control technology like biometrics, turnstiles, facial recognition scanners, and more. It can be a workplace experience management process that helps visitors make appointments. And it can be a health check process that can integrate with Aarogya Setu and CoWIN apps to ensure the favorable health status of visitors and employees coming in. An integrated workflow management system does not discriminate against the ‘wrong people.’ It is a software that helps the right people come in, the people who are healthy – your industrious employees, managers, clients, maintenance staff, and contractors. It gives you the opportunity, as human resources heads and workplace managers, to objectively assess and manage the flow of people in the workplace. It allows no health-related discrepancies and betters the workplace experience for everyone who is involved in contributing to the company. Every door is an opportunity for you to show your employees and visitors that you care about more than just what they can give you, as they come into the workplace. With an workflow management system integrated with CoWIN and Aarogya Setu like VAMS, you show that you care about the optimal conditions for their health.
The India Outstanding Security Performance Awards (OSPAs) What Makes Them Different?
Martin Gill, Founder of the OSPAs In December 2022 the second India Outstanding Security Performance Awards (OSPAs) took place, virtually because of Covid. The awards ceremony brought together all the leading security associations in India and recognised those who have excelled in different areas of security work. The OSPAs are global, currently in 15 countries and expanding. What makes them different to any other security awards scheme on the planet? The OSPAs do not just recognise outstanding security companies and individuals (at different levels from director to those working on the frontline), they also recognise security teams, initiatives and products. The awards are based on strict ethical principles with a transparent process to create a level playing field. For example, all the judges are nominated by the security associations; they all agree to mark to an ethics policy; they have to declare any conflict of interest on every mark sheet. This is the same globally. “The awards started in Norway, then to Germany and Australia, and is now in 15 countries; this year will see the addition of Canada, France, Ireland and New Zealand – these awards are truly global. In due course the winners of every category in every country will compete for a global OSPAs, that is our vision” The awards started in Norway, then to Germany and Australia, and is now in 15 countries; this year will see the addition of Canada, France, Ireland and New Zealand – these awards are truly global. In due course the winners of every category in every country will compete for a global OSPAs, that is our vision. There are a variety of categories, the same in every country, all based on research which was designed to distinguish those who are excellent from those who are merely good. The criteria are published for the world to see. They cover many diverse areas of security recognising that security professionals work in many different sectors conducting a range of important activities that need and merit being highlighted. Increasingly, around the world, people are looking at the winners of the OSPAs as example setters; after all, to win an OSPA is an achievement, there is a more rigorous process than is normal with awards which makes being a finalist and a winner all the more rewarding. This is important, as a sector we need to recognise who is excellent and who is making a difference; that is a key route to progress. Moreover, for too often competent security professionals and the organisations they work for and the teams they work with, have operated under the radar. As a consequence the true value of security remains under appreciated. In organisations the role of security is rarely understood for the true value it brings; the OSPAs are a part of the process bringing about a change. In India, working with our event partners, Business World, we are already planning the 2022 OSPAs. It promises to be bigger than every before. We hope the event will be a physical event this year, a gala occasion recognising the very best security has to offer. And because the OSPAs are global, it is not just Indian security professionals who will be watching, the OSPAs will be a window to the world. We already know the very best of India security is excellent, we just need to tell more people about it.
Top 8 Trends: for the Security Industry in 2022
Ashish P. Dhakan MD & CEO, Prama Hikvision India Pvt. Ltd. Entering 2022, the world continues to endure the pandemic. But the security industry has, no doubt, continued to shift, adapt, and develop in spite of things. Several trends have even accelerated. Beyond traditional ‘physical security,’ a host of frontiers like AI, cloud computing, IoT, and cybersecurity are being rapidly pioneered by entities big and small in our industry. By all appearances, the security industry is in a stage of redefining itself. It is moving from mere security and safety protections to encompass a wider scope of activity that will expand safety while also bringing new levels of intelligence and sustainability to communities, companies and societies. Here, Hikvision would like to share some of our ideas and expectations about the key trends that will likely affect the security industry in 2022 and perhaps even further into the future. AI will be everywhere Nowadays, Artificial Intelligence is quite common in the security industry. More customers in the industry have recognized the value of AI, and have found new uses for AI applications in various scenarios. Along with ANPR, automated event alerts, and false alarm reduction, AI technologies are being used for wider applications, like personal protective equipment (PPE) detection, fall detection for the elderly, mine surface detection, and much more. Meanwhile, we also have seen more collaboration across the industry, with security manufacturers opening their hardware products to third-party AI applications, and launching open platforms for customers to create and train their own AI algorithms to meet customized needs. AI has been one of the fundamental technologies to reshape the security industry. Benefiting from the optimization of algorithms, as well as the improved computing performance and the decreased cost of chips due to the advancement of semiconductor technology in recent years, AI applications are gradually forming the basic functions and capabilities accepted by all sectors in the industry, and we predict an even stronger tendency to assert that ‘AI will be everywhere.’ AIoT will digitize and pervade industry verticals With more security cameras and other security devices being connected to the network, the security industry is becoming an important part of an IoT world, enriching its visual capabilities. It’s apparent that the boundaries of the security industry are blurring, going well beyond the physical security arena. Meanwhile the popularization of AI technology enables the connected devices to become intelligent ‘things’ in the IoT world. The combination of AI and IoT, or as we call it, AIoT, is taking the security industry to a higher plain, automating the workflows and procedures of enterprises and aiding in the digital transformation of various industry verticals such as energy, logistics, manufacturing, retail, education, healthcare etc. From our perspective, AIoT brings more possibilities to the industry with rapidly expanding applications for security devices and systems. Meanwhile, more perception capabilities like radar, Lidar, temperature measuring, humidity sensing, and gas leak detection are being added to security devices and systems to make them more powerful. These new devices shoulder a multiplicity of tasks that just a few years ago required several different devices, covering both security functions and other intelligent functions for an ever-advancing world. Converged systems will break down data silos Workers throughout private enterprises and public service sectors alike would jump at the chance to get rid of obstructive ‘data silos.’ Data and information scattered and isolated in disparate systems or groups creates barriers to information sharing and collaboration, preventing managers from getting a holistic view of their operations. Here, the convergence of various information systems has been proven to be an effective approach – hopefully enough to break down those silos. It’s clear – the trend in the security industry has been to make efforts to converge systems wherever possible, including video, access control, alarms, fire prevention, and emergency management, to name a few. Further, more non-security systems, like human resources, finance, inventory, and logistics systems are also converging onto unified management platforms to increase collaboration and to support management in better decision-making based on more comprehensive data and analytics. Cloud-based solutions and services will be essential Like AI, the cloud is not a new trend in our industry, but it is an expanding one. From small business markets to enterprise levels, we can see the momentum push more and more businesses to leverage cloud-based security solutions and services. And as we are witnessing even now, the pandemic has accelerated the movement to cloud-based operations for people and businesses around the world. All businesses want platforms or services that offer simplicity, with as few assets to manage as possible, and a setup that’s as simple as possible. This is precisely where the cloud delivers. With a cloud-hosting infrastructure, there is no need for a local server or software. Users can conveniently check the status of their assets and businesses in real time, receive security events and alarms quickly, and accomplish emergency responses simply using a mobile app. For security business operators, the cloud enables them to remotely help their clients, configure devices, fix bugs, maintain and upgrade security systems, and provide better value-added services. Crystal clear security imaging will be standard in any weather, under any conditions, any time of day or night It is always vital for video security cameras, as a core function to maintain image clarity and capture details 24 hours a day, in any weather and under any condition. Cameras with low light imaging technology that renders high-definition and full-color images at night and in nearly completely dark environments have been very welcome in the market. We are taking note of the impressive technology applied to more camera models, including 4K, Varifocal and PTZ cameras. Moreover, for clearer video security imaging in poor visibility – especially in severe weather – high-performance imaging sensors, ISP technology, and AI algorithms are being employed, enabling cameras to maintain clarity and details of the view. Speaking of imaging technology, the trend toward incorporating multiple lenses in new cameras cannot be ignored. Single-lens cameras are…