securitylinkindia

Avigilon Corporation Previews at ISC West

Avigilon Corporation, a Motorola Solutions company, previewed its new H4 Video Intercom secured entry system and new Control Center System Health Monitoring Service at ISC West 2018. New Video Intercom Secured Entry System The H4 Video Intercom integrates a 3MP camera with a high-performance intercom and features exceptional wide dynamic range, low-light, noise reduction and echocancelling technologies for clear viewing and two-way communication with visitors. Designed to help improve security and simplify everyday operations for security staff, the H4 Video Intercom is well-suited for applications such as retail stores, offices, hotels and educational facilities. Combined with Avigilon Control Center video management software, this secured entry system enables operators to quickly and easily identify and communicate with a visitor before remotely granting access. “For facilities like school campuses, securing main entry points is critical,” said James Henderson, Avigilon’s President and Chief Operating Officer, “We created the H4 Video Intercom so operators have a unified system to quickly communicate with and visually identify visitors before unlocking a door, or instantly locking down an entire facility.” New Control Center System Health Monitoring Service The new ACC System Health Monitoring service is designed to help Avigilon’s Partners proactively monitor and maintain the performance of their customers’ ACC systems. It will feature an easy-to-use dashboard with event warnings that enable remote diagnosis of server and camera status. Avigilon’s Partners will be able to check in on customer sites without having to deploy a technician and assess health notifications prior to arriving on site, saving valuable time and resources so they can support more customer sites. “Our partners have tremendous success deploying ACC systems and this new service will add even more value and opportunity for them,” said James Henderson, Avigilon’s’ President and Chief Operating Officer, “Through the Avigilon Blue platform, we’re providing our Partners with a simple and effective way to centrally manage their ACC sites, ensuring they are regularly maintained and running smoothly.”

Read More

Farpointe Data New Conekt™ Mobile Credentials/ Readers

Farpointe Data, the access control industry’s OEM for RFID credentials and readers, has recently announced that access control system manufacturers, integrators and dealers will be able to provide their customers with a mobile, smart phone application and hardware that provides free download, user’s choice of smart phone or smart card, and distribution via existing or independent access control software. Multiple Conekt credentials can fit into a single smart phone wallet app. Installer adjustable read ranges can be more than 15 feet (4.5m). The new Farpointe Conekt series provides extremely generous gross margins. “Our channel customers have been requesting a mobile, smart phone solution that eliminates so many of the frustrations that they have discovered with present smart phone apps and hardware,” announced Scott Lindley, General Manager, Farpointe Data, “Therefore, we have gone the extra mile to assure that our Conekt solution provides the easiest way to distribute credentials with features that include allowing the user to register only once and needing no other portal accounts or activation features. By removing these and additional information disclosures, we’ve also eliminated privacy concerns that have been slowing down adoption of this technology.” “We feel this is the type of smart phone-based access control our channel and their customers have wanted,” continued Lindley, “With Conekt, there are no physical cards to order, ship or store, making credential distribution much easier and more profitable. With this app and products, we help our channel customers more straightforwardly enhance existing installations and gain a competitive advantage when bidding on new opportunities. Farpointe has added the features that installers and their end user customers have been New Conekt™ Mobile Credentials/ Readers Eliminates frustrations integrators are having with original phone-based systems wanting for smart phone based physical access control.” With its core compliant to the Certified Common Criteria EAS5+ Computer Interface Standard, Farpointe’s Conekt solution provides increased hardware cybersecurity to resist skimming, eavesdropping and replay attacks. With the U.S. Federal Trade Commission (FTC), among others, now holding the business community responsible for implementing good cybersecurity practices, such security has become an increasingly important consideration Leveraging the Security Industry Association’s (SIA) Open Supervised Device Protocol (OSDP), Farpointe’s Conekt solution will interface easily with control panels or other security management systems, fostering interoperability among security devices.

Read More

Arecont Vision® Complete Contera® Video Surveillance Solutions

Arecont Vision® unveiled a complete video surveillance solution that supports both traditional and cloud based project requirements at ISC West 2018. “Our customers have come to rely on the quality, performance and advanced features of Arecont Vision megapixel cameras,” said Brad Donaldson, Vice President of Product Development for Arecont Vision, “Increasingly we have received requests for a video management system and recorders that could be depended upon also. Contera is our answer, offering an advanced, powerful, and full-featured solution to surveillance project requirements.” The Contera video surveillance solution is composed of megapixel cameras (Arecont Vision Mega™ and Contera IP® families), video management system software (ConteraVMS®), video recorders and NVRs (ConteraCMR®), and cloud-based web management services (ConteraWS®) tying it all together. Contera cameras Contera cameras are available in five series of two cameras, each loaded with features and new capabilities to complement the popular and cyber-secure Mega™ camera family. Single sensor Contera cameras are available as indoor or outdoor domes, bullets and micro bullets, with choice of 2 or 5MP. Contera 180° panoramic multi-sensor dome cameras offer fast frame rates (30 frames per second) and integrated IR, with a choice of 8 or 20MP models. “Contera megapixel cameras bring new capabilities, performance and features to the market in an affordable, familiar Arecont Vision design,” said Brad Donaldson, Vice President of Product Development for Arecont Vision, “The Contera family complements the Made in USA, maximum cyber-secure Arecont Vision Mega family of single-, dual-, and multi-sensor cameras, and offer additional choices to our customers.” As with Arecont Mega cameras, Contera cameras feature world-class designs and manufacturing quality. All Contera cameras feature H.264 and H.265 codecs, SNAPstream+™ bandwidth reduction technology, NightView™ color low light technology, and enhanced WDR up to 120db. All models include multi-streaming at full frames per second (fps), defog technology, digital image stabilization, industry-standard security and network protocol. support, and are ONVIF G and S compliant. Most models include both Smart IR that adapts to object distance and angle and an SD card slot for onboard storage. Outdoor models are compliant with the IP66 environmental and IK-10 shock resistance standards. Both the new Contera family and existing Mega family cameras support the Arecont Vision API, offer a three-year standard warranty, and feature MegaLab™ integration support with 3rd party hardware and software applications beyond the ONVIF standards. ConteraVMS The ConteraVMS is an advanced video management system available in standard, premium or professional choices, supporting a maximum of 16, 64, or 128 cameras respectively. The VMS supports single and multi-sensor Arecont Vision Mega™ and Contera cameras, as well as ONVIF compliant 3rd party products that have been integration-tested and validated in the MegaLab™. ConteraCMR ConteraCMR is a full line of cloud managed recorders, with four customizable platform choices. The base NVR Appliance supports a maximum of 8 or 16 POE ports and up to 20TB of onboard video-optimized storage. Moving up, the Compact Desktop NVR server offers up to 32 channels and up to 24TB with optional RAID 5. Next is the Compact NVR Server, in a 2U rackmount form factor that can be configured for up to 24TB with optional RAID 5 for a maximum of 64 channels. The top of the ConteraCMR line is the high performance NVR server, with up to 80TB and RAID 5 options and support for a maximum of 128 channels. The online Arecont Vision SysCon System Configurator™ simplifies selecting the best ConteraCMR platform for specific project requirements. All ConteraCMR platforms include a three-year manufacturer’s warranty. ConteraWS Tying the ConteraVMS and Contera CMR platforms together over the cloud is ConteraWS® (web services). ConteraWS enables recording to occur locally on a ConteraCMR platform (or 3rd party compliant server running ConteraVMS software). Local recording eliminates the pitfalls of resolution and framerate restrictions that can limit other solutions. User profiles and cloud information is all stored in the cloud for convenient, remote access and management. Local administration is not required, reducing complexity and staffing needs. The ConteraCMR recorders can be accessed remotely over the local area network just as in a traditional video surveillance solution. The system can be securely reached from anywhere via choice of a full-featured thick client, mobile apps, Apple TV app, and a multi-browser web client. Video also can be stored in the cloud for important clips, then shared as needed. Management is simplified with access to all ConteraCMR platforms via a single sign-on capability. Instant notification of alarm, motion, or system health events are sent to any authorized recipient via smartphone or computer. Software updates can be applied remotely, reducing time and cost to deploy. There is no need for port forwarding or use of a dynamic domain name service (DDNS). ConteraWS also brings advanced cybersecurity, offering multi-factor authentication, NIST-compliant data encryption, transport layer security, and requiring no open inbound ports. The complete Contera video surveillance solution offers the performance and reliability of local recording with the convenience and flexibility of a cloud application.

Read More

Dahua Technology HDCVI 4.0 Debuts Latest Advancement

Dahua Technology showcased an all-new line of HDCVI 4.0 cameras and recorders at this year’s ISC West 2018 at Las Vegas, Nevada, USA, and brought six new 4K camera models to the market. Incorporating the latest technology advancements, the HDCVI 4K camera provides numerous benefits by combining superior image resolution and functionality with simplicity of installation and implementation. These cameras feature a new generation of ISP chip technology, developed by Dahua Technology and optimized for video surveillance applications. The in-house chip coupled with leveraging existing coax infrastructures serve to lower the total cost of ownership for the consumer (TCO). HDCVI 4K cameras have four times the resolution of 1080p with an approximate 16:9 aspect ratio, which represents the highest over-coax imaging resolution in the industry. Dahua Technology’s latest advancement of the HDCVI 4K line of cameras features Starlight Technology that produces color images in low light applications (down to 0.005 lux). This is a powerful draw for any application looking for high-resolution video, such as financial and various facilities with mission-critical operations that demand high-resolution video over coax infrastructure. “Dahua Technology’s all new line of HDCVI 4K products will change the industry by not only offering 4K over coax, but also offering the first 8-channel and 16-channel HDCVI digital video recorders that record 4K resolution on each channel,” said Jennifer Hackenburg, Senior Product Manager at Dahua Technology USA. Here are some of the key features of Dahua Technology’s all-new line of HDCVI 4K Cameras: Long-distance video transmission The use of network-based 4K technologies presents a challenge for applications that are not equipped to transmit large amounts of data over conventional IP infrastructure at long distances. Fortunately, the HDCVI standard enables analog video transmission at impressive distances without requiring the use of repeaters, and enables the transmission of video, audio and data all over a single RG6 coax cable. The technology enables transmission of 4K-quality video over coax of distances up to 700m (RG6), 500m (RG-59), or 300m using CAT6 cabling. Wide area and improved audio Available in bullet, dome and eyeball form factors, the new A82A series of HDCVI 4K cameras are ideal for surveillance of large areas, capturing video with wide-angle overviews and multiple focus points while maintaining the ability to digitally zoom and focus on fine details. The A82A series is equipped with broadcast quality audio. Plus, the Eyeball and Bullet models offer a built-in microphone. Lower cost and flexibility HDCVI 4.0 technology lowers total cost of ownership (TCO) by leveraging existing infrastructure. By simplifying system design and mitigating rip-and-replacement costs to install new IP infrastructure, HDCVI 4.0 4K cameras can increase performance at a lower overall cost. Plus, the cameras feature a convenient multi-format video output cable on the camera’s pigtail to make switching between AHD, TVI and CVBS as well as existing HDCVI systems easy. Data security HDCVI cameras do not transmit data over a network, allowing the video feeds from these devices to be better protected against hacking. For organizations that require a hardwired system to ensure data security, HDCVI 4K cameras deployed over coax infrastructure offer the ideal highresolution surveillance solution. Storage solution with HDCVI 4.0 XVR, offering 4K recording on all channels Dahua Technology is the first to market with an 8-channel and 16-channel recorder that records 4K video on each channel. This Penta-brid recorder supports HDCVI, AHD, TVI and CVBS video signals and automatically detects the incoming format for easy setup and configuration. The recorder also supports IP video signals, up to 8MB per channel, and its smart H.265+/ H.264+ video compression ensures efficient storage management. Users can enjoy greater system functionality than would otherwise be possible on an analog system. Some other intelligent features are intrusion detection, virtual tripwire, detection of missing and abandoned objects, and detection of a scene change. The addition of these smart analytics can dramatically improve overall surveillance and security for virtual application at any facility location.

Read More
securityLink India

Advanced Threat Landscape Report 2018 by CyberArk

CyberArk survey shows organizations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments. According to the CyberArk Global Advanced Threat Landscape Report 2018, nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber-attack. This level of cyber security inertia and failure to learn from past incidents puts sensitive data, infrastructure and assets at risk. Security starts with protecting privileged accounts An overwhelming number of IT security professionals believe securing an environment starts with protecting privileged accounts – 89 percent stated that IT infrastructure and critical data are not fully protected unless privileged accounts, credentials and secrets are secured. Respondents named the greatest cyber security threats they currently face, including: Targeted phishing attacks (56 percent), insider threats (51 percent), Ransomware or malware (48 percent), unsecured privileged accounts (42 percent), unsecured data stored in the cloud (41 percent).  IT security respondents also indicated that the proportion of users who have local administrative privileges on their endpoint devices increased from 62 percent in 2016 survey to 87 percent in 2018 – a 25 percent jump and perhaps indicative of employee demands for flexibility trumping security best practices. The Inertia that could lead to data compromise The survey findings suggest that security inertia has infiltrated many organizations, with an inability to repel or contain cyber threats – and the risks that this might result in – supported by other findings: 46 percent say their organization can’t prevent attackers from breaking into internal networks each time it is attempted; 36 percent report that administrative credentials were stored in Word or Excel documents on company PCs; Half (50 percent) admit that their customers’ privacy or PII (personally identifiable information) could be at risk because their data is not secured beyond the legally-required basics. Inertia and a ‘Hands-Off’ approach to securing credentials and data in the cloud create cyber risk The automated processes inherent in cloud and DevOps mean privileged accounts, credentials and secrets are being created at a prolific rate. If compromised, these can give attackers a crucial jumping-off point to achieve lateral access to sensitive data across networks, data and applications, or to use cloud infrastructure for illicit crypto mining activities. Organizations increasingly recognize this security risk, but still have a relaxed approach toward cloud security. The survey found that: Nearly half (49 percent) of organizations have no privileged account security strategy for the cloud; More than two-thirds (68 percent) defer on cloud security to their vendor, relying on built-in security capabilities; and 38 percent stated their cloud provider doesn’t deliver adequate protection. Changing the security culture Overcoming cyber security inertia necessitates it to become central to organizational strategy and behavior, not something that is dictated by competing commercial needs. According to the survey: 86 percent of IT security professionals feel security should be a regular board-level discussion topic; 44 percent said they recognize or reward employees who help prevent an IT security breach, increasing to nearly three quarters (74 percent) in the U.S.; and Just 8 percent of companies continuously perform Red Team exercises to uncover critical vulnerabilities and identify effective responses. “Attackers continue to evolve their tactics, but organizations are faced with cyber security inertia that is tipping the scales in favor of the attacker,” said Adam Bosnian, Executive Vice President, Global Business Development, CyberArk, “There needs to be a greater urgency in building cyber security resilience to today’s attacks. This starts by understanding the expanding privileged account security attack surface and how it puts an organization at risk. Successfully battling inertia requires strong leadership, accountability, clearly defined and communicated security strategies, and the ability to adopt a ‘think like an attacker’ mindset.”

Read More
Hikvision_Retail Leadership_Summit_2018

Hikvision participates at Retail Leadership Summit 2018

Hikvision has participated in the 11th edition of Retailers Association of India’s (RAI) recently held Retail Leadership Summit (RLS), Mumbai to showcase its latest products and solutions in the video surveillance and security domains for the retail sector. The Retail Leadership Summit (RLS) was flagged off with an inspiring opening speech by B.S. Nagesh, Chairman, RAI and Founder, TRRAIN. The Summit revolved around the central theme ‘Customer Centricity- Redefining Values and Valuations. “Retail Leadership Summit (RLS) is a great platform for networking among existing and potential retailers, developers, logistics and supply chain organizations. It is a right place to showcase the latest innovations in the surveillance and security solutions for retail and eCommerce sector,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. At the event, K.K. Dakhara, Retail Vertical Head, Prama Hikvision India gave a presentation on Hikvision’s new solution for warehouse, logistic and supply chain and explained their advantages. “Hikvision retail smart solution focuses mainly on analytics, consumer behavioral analysis and artificial intelli gence. It is useful in multiple aspects such as retail business surveillance, manpower management, business operations, selection of appropriate product based on target customer, designing marketing plan and loss prevention,” said Mr. Dakhara, “The wide applications of machine learning and DeepinMind technology will set the trend for the retail industry by getting critical data and deep insights from consumer behavioral analysis.” “The Retail Leadership Summit has been created to ensure that retail leaders across the country can come in and discuss matters that are relevant to retail at industry-level. Modern retail in India is becoming more and more competitive and is growing at more than 15 per cent. This kind of growth requires a different focus for retailers to be able to exist and thrive. RLS is about customer centricity and the resulting valuation. However, the values that a company works with are an important contributor to the way a company gets formed and functions. The three aspects i.e., customer centricity, values and valuation are an apt set of topics for every retailer who is trying to grow and flourish in this consumption-led market,” said Kumar Rajagopalan, CEO, Retailers Association of India. Hikvision also displayed their retail solution at a booth there. The visitors were keen to know more about people count, heat map, POS integration, face analysis, parking management solution, and warehouse, logistic and supply chain solutions. The event turned out to be a good platform for Hikvision’s retail solutions for promotions and getting enquiries.

Read More
nist

Safeguards for Securing Virtualized Servers By NIST

This bulletin outlines the security recommendations that NIST recently provided in Special Publication (SP) 800-125A – security recommendations for Hypervisor Deployment on Servers. The document provides technical guidelines about the secure execution of baseline functions of the hypervisor, regardless of the hypervisor architecture. In the past, a user wishing to set up a computing server generally needed to use a dedicated host with dedicated resources such as a central processing unit (CPU), memory, network and storage. Modern systems have technology that lets one create virtual machines to emulate what used to be physical, dedicated resources. This practice is known as virtualization and supports more scalable and dynamic environments. A critical component of this technology is the hypervisor, the collection of software modules that enables this virtualization and thus enables multiple computing stacks – each made of an operating system (OS) and application programs – to be run on a single physical host. Such a physical host is called a Virtualized Host and is also referred to as a Hypervisor Host. The individual computing stacks are encapsulated in an artifact called a Virtual Machine (VM). To make a VM an independent executable entity, its definition should include resources such as CPU and memory, allocated to it. The VMs are also called ‘Guests,’ and the OS running inside each of them is called ‘Guest OS.’ The resources associated with a VM are virtual resources, as opposed to physical resources associated with a physical host. The hypervisor forms part of the virtualization layer in a virtualized host and plays many of the same roles that a conventional OS does on a non-virtualized host, or server. Just as a conventional OS provides isolation between the various applications, or processes, running on a server, the hypervisor provides isolation between one or more VMs running on it. Also, like an OS, the hypervisor mediates access to physical resources across multiple VMs. Therefore, all other functions needed to support virtualization – such as emulation of network and storage devices and the management of VMs and the hypervisor itself – can be accomplished using kernel-loadable modules, although some hypervisor architectures accomplish these tasks using dedicated VMs. The hypervisor can be installed either directly on the hardware, or bare metal (Type 1 Hypervisor), or on top of a fullfledged conventional OS, called Host OS (Type 2 Hypervisor). Here, we discuss the baseline functions of a hypervisor, how these functions are distributed in a hypervisor, and how this information is used to develop security recommendations that provide assurance against potential threats to the secure execution of tasks involved in the hypervisor’s baseline functions. Hypervisor baseline functions It might appear that all activities related to the secure management of a hypervisor and its hardware host – collectively called the hypervisor platform – should simply consist of established best practices for any server class software and its hosting environment. However, closer examination reveals that the unique functions provided by the Hypervisor Platform require a dedicated set of security considerations. These functions are called hypervisor baseline functions (HY-BF) and are labeled HY-BF1, HY-BF2, HY-BF3, HYBF4, and HY-BF5. They are described below: HY-BF1: VM process isolation Scheduling of VMs for execution, management of the application processes running in VMs (e.g., CPU and memory management), and context switching between various processor states during the running of applications in VMs; HY-BF2: Devices mediation & access control Mediates access to all devices (e.g., network interface card [NIC], storage device such as IDE drive etc). One mediation approach is to emulate network and storage (block) devices that are expected by different native drivers in VMs by using emulation programs that run in the hypervisor kernel; HY-BF3: Direct execution of commands from guest VMs Certain commands from Guest OSs are executed directly by the hypervisor instead of being triggered through in terrupts and context switching. This function applies to hypervisors that have implemented para-virtualization instead of full virtualization; HY-BF4: VM lifecycle management This baseline function involves all functions from creation and management of VM images, control of VM states (start, pause, stop etc), VM migration, VM monitoring, and policy enforcement; and HY-BF5: Management of Hypervisor This baseline function involves defining some artefacts and setting values for various configuration parameters in hypervisor software modules including those for configuration of a Virtual Network inside the hypervisor. NIST SP 800-125A provides detailed security guidance based on an analysis of threats to the integrity of all the above functions. The only exceptions are the set of guidelines for configuration of virtual network (subset of HYBF5), which are covered in a separate document (NIST SP 800-125B). The above functions are carried out by different hypervisor components, or software modules. There are some minor differences among hypervisor products in the way that they distribute these functions. The mapping of these functions to hypervisor components and the location of these components within a hypervisor architecture are described in the table below: Approach for developing security recommendations Developing security recommendations for the deployment and use of a complex software such as the hypervisor requires knowledge of potential threats which, when exploited, would affect the three basic security properties – confidentiality, integrity, and availability – of hypervisor functions. The approach adopted for developing security recommendations for the deployment of hypervisors in NIST SP 800125A is as follows: Ensure the integrity of all components of the hypervisor platform, starting from the host BIOS to all software modules of the hypervisor. This action is accomplished through a secure boot process, outlined as recommendation HY-SR1; Identify the threat sources in a typical hypervisor platform. The nature of threats from rogue or compromised VMs is briefly discussed in SP 800-125A; and For each of the five baseline functions HY-BF1 through HY-BF5 (except for HY-BF3, the direct execution of certain commands from guest VMs by the hypervisor), identify the different tasks under each function, and for each of the tasks, identify the potential threats to the secure execution of the task. The countermeasures that will provide assurance against exploitation of these threats…

Read More
IHS Markit

Global Access Management Market By IHS Markit

Access management can be defined as the process of granting authorized users the rights to use a service, while preventing access to non-authorized users. Following are the key access management growth factors over the next five years. GDPR deadline fast approaching Traditionally, finance, banking, insurance, government, utilities and other heavily regulated end-user sectors have focused on identity- and accessmanagement solutions. However, over the past year there has been growth in non-traditional markets. Not only have the manufacturing and retail sectors become more security conscious, but the increase in the number of data breaches and the looming legislation around General Data Protection Regulation (GDPR) in May 2018 has also piqued renewed interest in security and identity and access management (IAM) solutions. ● Highlight ● The global access management market is projected to increase from $5.4 billion in 2016 to $9.6 billion in 2021. ● Companies with 5,000 or more employees are projected to contribute the largest revenue growth to the access management market over the next five years. ● Over the past year, there has been growth in non-traditional market sectors such as manufacturing and retail. Smaller organizations using access management solutions Access management solutions have traditionally been deployed by larger organizations. In fact, companies with 5,000 or more employees are projected to contribute the largest revenue growth over the next five years, increasing from $4.38 billion in 2016 to $5.4 billion in 2021. The proportional importance of this segment is forecast to decline from 80 percent of total access management revenue in 2016 to around 56 percent in 2021. Small and medium-sized enterprises (SMEs) will steadily increase the amount of access management solutions they deploy. For example, revenue from companies with between 1 and 499 employees is projected to increase from $109.6 million in 2016 to $705 million in 2021. This segment managed to grow from 2 percent of total revenue in 2016 to 7.3 percent in 2021. The introduction of more cloud solutions within the access management market is likely to help SMEs, in particular, because cloudbased access management solutions can be more cost effective and scalable for small and medium enterprises. On-premises hybrid and cloud solutions As there are still a lot of applications running on premises at companies, a significant portion of larger organizations still want some on-premises solutions. Larger organizations are more likely to move to a hybrid model, with some applications running in the cloud as a stepping stone toward full adoption of cloud solutions. Hybrid solutions are projected to increase from $1.1 billion in 2016 to $1.7 billion in 2021. In contrast, smaller organizations are more likely to deploy software-as-a-service (SaaS) solutions, which for them can be more cost effective than on-premises solutions. Technological developments and the battle with hackers There is a continuous battle being waged as hackers increasingly try to gain control of the networks they want to compromise. It is important for organizations to take into account people’s locations, to help detect fraudulent activity and ensure the right people have the right access, at the right time and at the correct location. Technologies like machine learning (ML) and artificial intelligence (AI) are also important weapons in this battle. Leveraging emerging technologies, such as behavioral biometrics, will help to reduce the burden on end-users and increase the validity of identity proofing. Organizations can learn a lot about how people interact with their networks, to give a full picture of how things are evolving, but these technology developments are a bit of a cat-and-mouse game. Blockchain makes security cheaper and more accessible Many organizations have isolated and centralized identity management systems, but the current landscape demands federation and single sign-on (SSO). These systems make identity management, protection and verification very cumbersome, costly and risky for industry enterprises and government agencies. Blockchain has the potential to introduce improvements that can make security more accessible and budget friendly. With smart contract capabilities, there can even be a secondary market where users benefit from sharing resources back to the network. Smart contracts automatically execute pieces of code carrying valuable data or performing other condition-based executions. A permissioned blockchain technology provides core capabilities that enable a trusted digital identity network to build and operate the following: A shared, append-only ledger, with one version of the facts shared across all permissioned network participants in real time. Smart contracts that ensure verifiable and signed business logic is executed in each transaction. Trust between known participants, to verify transactions and ensure records are valid. Privacy and security measures that grant access only to permissioned parties. Cybersecurity – Access Management Report 2018 This two-volume report provides coverage in several key areas of the identity and access management market, including access management and identity governance and administration. It provides detailed analysis of individual vertical markets from market-specific operating models to key trends and development opportunities.

Read More
quantum

Top 7 Reasons for using A Multi-Tier Storage Solution

Lower storage spend Organizations are keeping as much as 40% of their inactive data on their most expensive infrastructure. With unstructured video growing exponentially, fueled by the rise of new video surveillance programs, one can’t afford to have this kind of inefficiency. The solution is to adopt a multi-tier storage system that automatically migrates the video to the most cost efficient tiers of storage. Whether that’s high-performance disk storage, object-based storage or high-capacity primary storage, file-based tape or the cloud – the organization can cost-effectively store data based on various policy requirements. Easy, immediate access Finding a file in the system should be no more difficult than finding a document on a C: drive.           Quantum’s solution for video surveillance is a single file system, built specifically for video applications. On the backend, retention and access policies can be set to handle data migration and simplify organization and file recall. High performance Storage performance that performs inefficiently prevents companies from capturing usable data. Quantum’s StorNext software retains data cost-effectively, supports complex video management systems and analytic applications, and ingests video from 4 times as many cameras per server to deliver time-to-decision results, allowing proactive protection and crime prevention. Quantum’s storage infrastructure not only handles this sheer volume of data with ease, but also delivers streaming performance regardless of whether it’s on disk, tape, or in the cloud. Scale with storage needs The ability to seamlessly integrate more sources of information into modern analytical tools is becoming more important, as is the capacity to scale and accommodate increased camera and sensor counts, panoramic coverage and higher image resolution. As more cameras are added, image resolutions increase and retention times become longer, Quantum’s solution can scale to handle the need for more capacity. Compliant with current infrastructure Quantum’s storage solutions support all major platforms, operating systems and networks, and      integrate seamlessly with VMS and other systems. This enables security professionals to integrate the solution into their existing infrastructure without being locked into a  single vendor or platform as well as to configure the file interface to receive input from a variety of devices and systems. No trade-off necessary To gain more insight and an increased return on investment from video surveillance data, a storage solution must balance high performance, high capacity and high retention. These three parameters can be flexed to provide the best trade-off between budget and mission whilst minimizing sacrifice of redundancy, accessibility or scalability. Gateway storage architecture Upgrading storage capabilities while also satisfying budgetary restrictions is a challenging part of building a comprehensive storage infrastructure. Instead of replacing the pre-existing storage system, why not build onto it? Artico™ offers an easy, nondisruptive choice for adding Quantum tape, FlexTier™, and Lattus™ scale-out storage to an existing security environment. Quantum’s StorNext platform is a policy-driven tiering software, allowing users to extend primary storage with scalable, more cost-effective tiers of storage. Our multi-tier solution is ideal for security and surveillance organizations with large amounts of video dealing with the challenges that come with scaling storage with your data growth. End users can set up policies to automatically migrate data across tiers, utilizing less costly types of storages like file-based tape and cloud, thus delivering the total capacity needed more cost effectively.  

Read More

Dahua Accomplished New Milestone

15 January 2018 made a remarkable day of extraordinary significance for Dahua when they achieved a new milestone by making the sale of 10,000,000th HDCVI recorder in the overseas market – they shipped their 10 millionth XVR (DHI-XVR5108HS-4KL) to Poland. The number demonstrates huge popularity of HDCVI technology which reflects Dahua’s continuous dedication to technology advancement to deliver exceptional value meeting customers’ needs in security surveillance. Despite the overall trend of migrating from analog to IP, Dahua HDCVI recorded 30% growth in 2017 and Dahua HDCVI recorder has been installed in more than 150 countries in 6 continents. HDCVI is a revolutionary technology that has initiated a new era of 720P/ 1080P HD monitoring for the industry. It provides a high-resolution surveillance solution alternative to IP video, with added benefit of simplicity and immunity to cyber-attack. Over the next five years, Dahua upgraded it into HDCVI 4.0, which boasts several major technological breakthroughs in terms of higher resolution, more efficient encoder, power over cable, smartness and compatibility. Notably, Power over Coax (PoC) transmits both video and electrical power over a single coaxial cable, which eliminates separate camera power supplies and further simplifies system deployment with true plug & play, benefiting Dahua customers and end users. HDCVI recorder has also been developed to support five types of cameras namely HDCVI/ AHD/ TVI/ CVBS/ IP. Resolution has evolved from HD to QHD/ UHD thanks to HDCVI-4M/ 4K technology. The required storage space has realized a 70% reduction due to encoding technology advancement from H.264 to H.264+.HDCVI recorder becomes increasingly popular globally. It is used in various crucial projects/ places, including banking system in India and Enso Hotel in Indonesia. 2018 will also see an era of H.265 when a series of H.265 powered products will be released delivering a maximum bandwidth compression up to 90%. Moreover, with more advanced artificial intelligence powered by deep learning algorithms, HDCVI-AI recorder will be able to enable a series of intelligent statistical analysis of video contents.

Read More