securitylinkindia

Bosch and Genetec. End-to-end security, day after day_1

BOSCH and Genetec End-to-End Security, Day After Day

Cybercrime – one of the world’s biggest crimes goes nearly unnoticed. The Internet of Things makes mobility, businesses and industries more connected, but it also leaves them more vulnerable to cybercrime. Online hacking has become so widespread that, by 2021, it is estimated that the cost of cybercrime damages will be $6 trillion annually.* All it takes for a hacker is finding a single weak link, from the outside or more commonly inside, in a surveillance network to gain access to, and jeopardize an entire data system. To cancel out this risk, employ a data security system that’s been configured by experts with vast cybersecurity knowledge to make it completely effective from end-to-end. Partners in crime prevention The reputation of Genetec and Bosch in the field of mission-critical video security projects is constantly growing. Having access to the video management system (VMS) expertise of Genetec and Bosch’s innovative surveillance cameras gives customers the upper hand over the hackers, because Bosch cameras are fully integrated with Genetec systems, resulting in an endto-end data security solution incorporating all Bosch network video surveillance cameras, plus Genetec Archiver and Security Center. All network-wide communications between Bosch cameras and Genetec Archiver and Security Center are assigned an authentication key. This electronic signature enables the system to verify the legitimacy of network components like cameras or storage units, and viewing clients, ensuring that an infrastructure of trust is built before network-wide communications start. The best form of protection is encryption Cybercrime is one of the greatest threat to every company in the world,* so an effective and reliable method of safeguarding the video security infrastructure is needed. This is why encryption of data streams and stored data is vital. All Bosch IP-cameras have a built-in Trusted Platform Module (TPM) to safely store cryptographic keys used for authentication ensuring trustworthy communications between all network components and encryption of all video data. All cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM). Encrypted video data is then sent from the camera to the Genetec Archiver using SRTP (Secure Real-Time Transport Protocol). Additional security is established via a ‘permissioning’ scheme based on privileges accumulated by specific users. Synchronized – Centralized – Better protected Because Genetec Security Center integrates with Active Directory, feature 82 SecurityLink India ■ March 2018 user management can be monitored and centralized at Windows level. As well as individual users, user groups from Active Directory can be synchronized with Security Center, whilst new users will automatically inherit existing Security Center privileges defined for that group. Securing cameras, management software, and clients Passwords are still an essential layer of security, but the Genetec Archiver also uses a client certificate (which can be signed by a trusted third party and is factory-installed) to authenticate themselves to the Bosch IP camera. In addition, only Bosch-approved firmware updates will be accepted, and any cryptographic operations are only executed inside the unique built-in Trusted Platform Module (TPM). Certificates are less at risk from hacking, which is why Genetec uses certificate authentication for its Security Center management software and clients. The video management systems interact directly with the Bosch cameras using certificates for authentication, and because stored data stays encrypted and data is transmitted via SRTP (Secure Real-time Transport Protocol) confidentiality and data protection are guaranteed. Using SRTP throughout the whole video security infrastructure enables customers to set up a secured multi-cast network, and get security and good network scalability at the same time. Together, Bosch and Genetec provide one of the world’s best data security solutions.  

Read More
Smart IoT Industrial Park

Smart IoT Industrial Park Brings Productivity & Quality to a New Level

To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, Dahua Technology has put to use a new smart IoT industrial park in Hangzhou. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/ living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Faster production & adaption The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialized requests and ever-changing reality. The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production (preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning highend devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. The faster speed also applies to the development of new molding, since Dahua smart industrial park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organizing system is supported by topnotch equipment such as MAKINO highspeed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005mm, while also supporting CAD/ CAM/ CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days. By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors etc., all of which are proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, notallowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons – first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, it has put together an effectively closed loop for quality control in the manufacturing process. Accuracy enhanced Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example – it can process components, in metric size, as small as 03015 (0.3×0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry. Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognize flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them. Reliability reinforced Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/ low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialized needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/ system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialized use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one, and in the future phase, it is expected to be more intelligent, to realize clientcentered flexible production and to enable a safer society and smarter living. By – Balasubramanian Jayam Head of Marketing (India & SAARC), Dahua Technology Co., Ltd.  

Read More

HID Predictions in Id Technology

HID Global has identified the top trends in the identity technology industry for 2018. The company points towards increased cloud and mobile access adoption, more focus on securing the Internet of Things (IoT), and data analytics as some of the top trends that will take center stage in developing more intelligent, connected experiences this year. “Trusted identities will emerge this year as the fundamental building blocks for organizations to create environments that connect people, places and things,” said Samuel Asarnoj, Senior Vice President, Corporate Strategy & Business Development with HID Global, “The user experience will be redefined by mobile, IoT and cloud technologies, and deliver new capabilities for the future.” HID Global sees five significant trends in 2018 that will influence how organizations leverage the power of trusted identities. Organizations embracing the benefits of the cloud I ncreased awareness of the cloud’s ease of deployment, flexibility, connectivity options and productivity benefits will escalate adoption. Access control cloud platforms with APIs and SDKs will fuel new software solutions that expand choices for organizations to get the most out of their investments. Cloud-based card issuance will drive adoption due to its simplicity, security and cost structure, while governments increasingly investigate how printed IDs can be complemented by cloud-issued mobile citizen IDs. Cloud authentication and credential management will further integrate mobile devices, tokens, cards and machineto-machine endpoints. And digital certifi cates in the IoT will draw upon the trusted cloud services to deliver and manage certificates across thousands of devices. More connected devices and environments drive focus on securing the IoT Digital certificates will become a core component for adding trust in the IoT by issuing unique digital IDs to printers and encoders, mobile phones, tablets, video cameras and building automation systems, plus a broader range of things like connected cars and medical devices. Apple iOS 11 ‘read’ support of NFC will fuel adoption of IoT-based applications such as brand protection, customer loyalty programs and other use cases that will further drive the need to enhance security in the IoT. Mobile access reaches tipping point for mass market adoption 2017 was the year when mobile access went mainstream and adoption will accelerate even further in 2018. Maturity in mobile solutions and integration into other systems, coupled with mobile’s ability to enhance user convenience, improve operational efficiency and provide higher security will drive accelerated growth for mobile access and mainstream adoption. Card emulation, the NFC mode most coveted for mobile access control, remains reserved exclusive to Apple Pay; this leaves Blue tooth as the communication standard for cross-platform mobile access support. Still, organizations will invest in readers and other infrastructure that supports NFC and BLE to prepare for future possibilities. Convergence of physical and digital security The concept of physical identity & access management (PIAM) will drive convergence of physical and digital security to a single credential, putting identity at the center of all use cases. Government, finance, energy and other regulated markets will emerge as the forerunners using these solutions for secure access to buildings, email, websites and VPN. The new converged identity models that use cloud authentication and mobile devices are also emerging such as the ability to verify a person’s presence at a location, mobile IDs that validate physical citizen IDs, and smart cards that authenticate users to enterprise resources. Data analytics will drive risk-based intelligence for predictive models and new capabilities Devices, access control systems, IoT applications and other solutions connected to the cloud will provide robust data for advanced analytics. Insights from these analytics can be used to optimize workflow solutions and provide more seamless access for end users. Predictive analytics and biometrics will play a crucial role in people-centric security and address employee demands for workplaces to deliver premium, more individualized services. Analytics will also help reduce downtime in the enterprise, spur factory automation and improve compliance via condition monitoring that is based on real-time location and sensing solutions.

Read More
School Security Systems Industry US Market

School Security Systems Industry US Market Overview

With the growing number of schools in the United States with video surveillance, electronic access control and other traditional security systems, the number of potential “greenfield” projects for suppliers falls. Declining numbers of new security system installations will lead to slowing market growth over the next five years. Even so, security manufacturers are looking to implement the following new security technologies to improve school safety, which would also help reignite market growth: 1.     Facial recognition technology Many of the video surveillance systems currently used in schools are not actively monitored and also rarely lack any form of effective automated response. Adoption of facial recognition technology would allow the surveillance system to proactively search for potential threats, and alert school administrators and security staff about unrecognized individuals in the building. Unfortunately, affordable facial recognition technologies are often unable to adequately recognize the number of faces in a typical school; plus, these systems can place a large strain on a school’s information technology network. 2.     Logical and physical security identity management integration I ntegrating the school’s access control database with a higher authority logical database – for example, a student directory – would allow the access rights of former staff, and students who have been expelled or already graduated, to be removed automatically. However, access control providers may find it difficult to get permission to access student records and other sensitive data. Education administrators may also be uncomfortable with possibly creating a potential avenue of cyberattack. 3.     High-security classroom doors with multipoint looking systems Higher-grade doors would create a far more effective barrier between students and potential attackers, creating numerous safe spaces throughout the building in emergencies. It’s also true, though, that purchasing thousands of doors would be expensive. Fire regulations often dictate that key entrances and exits remain fail-safe during emergencies. Locking and unlocking doors multiple times would also disrupt teaching. 4.     Weapons checks using metal detectors or x-ray machines at school entrances Using metal detectors or x-ray machines at entrances along the school perimeter makes bringing weapons into the school much more difficult. However, schools often have multiple entrances, which means each school would require multiple detectors or x-ray machines – both of which are expensive. The school would also need to hire additional security staff to operate each machine. Securing entrances in this manner would also mean long queues would form after breaks and lunchtime, reducing the free time of students and staff. Access control intelligence service Entering its fourth full year, the IHS Markit Access Control Intelligence Service provides primary analysis of the equipment market, plus thorough investigation of key technology trends affecting the industry. Current topics of focus include mobile access, logical and physical identity management integration, adoption of biometric technology and security system convergence.

Read More

Verint®Systems New Line of Solutions for SMB Market

Verint®Systems Inc., the customer engagement company™, has announced its contact center workforce engagement offerings specifically designed for today’s small and medium-sized businesses (SMBs). Verint’s purpose-built SMB solutions provide a simple, modern approach to customer engagement, and rapid time to value. Because they are easy to implement, easy to use and easy to maintain, companies can cost-effectively heighten contact center workforce engagement, enhance service quality, optimize performance and meet compliance requirements. The new Verint SMB offerings are available in the cloud and on-premises, and include: Compliance recording: Captures, archives and retrieves interactions across channels – such as voice, including mobile, and instant message communications – and helps reduce risk to confidently meet strict compliance demands. In addition to traditional voice calls, the solution records customer interactions across unified communications platforms such as Microsoft Skype for Business and Cisco Jabber. Recording and quality management: Captures, replays and evaluates customer interactions across communications channels. Leveraging the technology, organizations can bring a focused approach to employee coaching and training. Workforce management: Simplifies forecasting and scheduling, while helping manage and reduce costs, advance workforce efficiencies and drive operational excellence. As employees expect the work environment to adapt to their personal lives, Verint solutions are helping businesses evolve with mobile apps and built-in support for flex scheduling and adherence. Workforce optimization: Combines recording, quality management and workforce management, bringing a holistic approach to ensuring the right employees with the right skills are available at the right time, supporting quality and compliance requirements, and sharing intelligence to improve workforce engagement and customer service operations. “Verint SMB offerings are changing how small and medium-sized businesses approach customer and workforce engagement,” says John Goodson, Senior Vice President and General Manager of products at Verint, “Our partners can easily integrate these offerings with other contact center solutions, providing customers maximum flexibility with low total cost of ownership.”

Read More

FICO Fintech 4finance Deploys AML and KYC Solution

4finance Group, Europe’s leading online and mobile consumer lender, has deployed FICO® TONBELLER® Siron® solutions for anti-money laundering (AML) and know your customer (KYC) compliance across 10 countries and 20 back-office systems in just nine months. The cloud-based FICO solutions are delivering audit-verified compliance with global and regional regulations while maintaining 4finance’s promise to issue customers a loan in 15 minutes. For these achievements, 4finance Group has won a 2017 FICO Decisions Award for Regulatory Compliance. “Working with FICO, we created an AML/ KYC framework that bolstered our compliance without compromising on speed and our promise to customers,” said Andis Grandāns, AML Officer at 4finance Group, “In fact, fewer than 0.5 percent of customers applying for their first loan feel any impact on the speed of their loan being disbursed. As proof of our success, we have already undergone a regulatory audit on our AML/ KYC processes and received a clean bill of health.” Speed to market 4finance Group is a global digital finance business that combines the discipline of a rigorous, highly regulated consumer lender with the capabilities and drive of a fast-paced, data-driven, borrower-focused fintech. It took on this project to ensure compliance with new requirements of the 4th European Union AML Directive in online consumer lending. “Our challenge was to find an AML compliance solution that was flexible in the way it could be integrated, but absolutely robust when it came to compliance capabilities,” said Grandāns, “Our speed to market and our ability to deliver funds to our customers quickly are fundamental to our business. We needed to ensure compliance in a way that did not compromise our brand promise of delivering fast funds to creditworthy people. We chose FICO TONBELLER because it offered us the fastest deployment, cloud for expansion to new markets, and the most powerful capabilities for detecting criminal activity.”

Read More

NIST Blockchain Technology Aims to Go Beyond the Hype

Beguiling, baffling or both – that’s blockchain. Aiming to clarify the subject for the benefit of companies and other organizations, the National Institute of Standards and Technology (NIST) has released a straightforward introduction to blockchain, which underpins Bitcoin and other digital currencies. Virtual barrels of digital ink are flowing in the media nowadays about these cryptocurrencies and the underlying blockchain technology that enables them. Much of the attention stems either from the giddy heights of value attained lately by the most well-known of these currencies, Bitcoin, or from the novelty of blockchain itself, which has been described (link is external) as the most disruptive technology since the internet. Blockchain’s proponents believe it lets individuals perform transactions safely without the costs or security risks that accompany the intermediaries that are required in conventional transactions. The NIST report’s authors hope it will be useful to businesses that want to make clear-eyed decisions about whether blockchain would be an asset to their products. “We want to help people understand how blockchains work so that they can appropriately and usefully apply them to technology problems,” said Dylan Yaga, a NIST Computer Scientist who is one of the report’s authors, “It’s an introduction to the things you should understand and think about if you want to use blockchain.” A blockchain is essentially a decentralized ledger that maintains transaction records on many computers simultaneously. Once a group, or block, of records is entered into the ledger, the block’s information is connected mathematically to other blocks, forming a chain of records. Because of this mathematical relationship, the information in a particular block cannot be altered without changing all subsequent blocks in the chain and creating a discrepancy that other record-keepers in the network would immediately notice. In this way, blockchain technology produces a dependable ledger without requiring record-keepers to know or trust one another, which eliminates the dangers that come with data being kept in a central location by a single owner. The blockchain idea has attracted enough supporters that there are now several hundred digital currencies on the market, and the companies that are investigating ways to employ blockchain number many more. Because the market is growing so rapidly, several stakeholders, customers and agencies asked NIST to create a straightforward description of blockchain so that newcomers to the marketplace could enter with the same knowledge about the technology. “Blockchain is a powerful new paradigm for business,” Yaga said, “People should use it, if it’s appropriate.” The question is when it is appropriate. As with any new tool, there can be a temptation to employ it purely for its novelty value. The report outlines some possible use cases, including banking, supply chain management and keeping track of insurance transactions. The report, Yaga said, was created partly to help IT managers make informed decisions about whether blockchain is the right tool for a given task. “In the corporate world, there’s always a push to adopt new technologies,” Yaga said, “Blockchain is today’s shiny new toy, and there’s a big push to adopt it because of that.” “We want to help people to see past the hype,” he said, “as lofty a goal as that is.” NIST has been tasked before with writing definitions of emerging concepts in information technology such as the definition of cloud computing it released in 2011. While Yaga describes the blockchain description as approachable – it’s “as high-level as I can write it,” he said – the document is longer than some other NIST definitions because the technology combines so many complex ideas. Among them are digital signatures, peer-to-peer networking and hash chains, all of which are tools common in cryptography and with which NIST has had extensive involvement. “We don’t have any axe to grind or product to sell, though,” Yaga said, “A lot of articles you’ll read online feature a disclaimer indicating that the author owns a certain amount of cryptocurrency or stock in a company. I have no vested interest in the monetary value of these networks. But we don’t pass judgment on the technology; we just want to get past the rumors.” To that end, Yaga said, the document began as a sort of FAQ addressing falsehoods the authors had come across such as the idea that there was no need for trust in the system. (“You do need trust,” he said, “just not a trusted third party, like a bank.”) It expanded to discuss the technical tools common to most blockchain-based systems and also explored related issues such as the high demands blockchain systems place on network resources. The roughly 60-page report might enlighten anyone who wants a picture of blockchain that is not skewed to any players’ interests, but Yaga said he and his co-authors hope it will give perspective to technical decision makers in particular. “A company’s IT managers need to be able to say, we understand this, and then be able to argue whether or not the company needs to use it based on that clear understanding,” he said, “Some people are saying you should use it everywhere for everything. We wrote with the perspective that you shouldn’t use it if it’s not necessary.”

Read More

Top Video Surveillance Trends for 2018 & Analyses

Demand for professional video surveillance cameras has been growing quickly and is forecast to continue growing in 2018. It is estimated that less than 10 million surveillance cameras were shipped globally in 2006, which grew to over 100 million in 2016, and is forecast to make over 130 million during 2018. Despite this increase in demand, the average price of cameras and other video surveillance equipment will continue to fall quickly. As a result, IHS Markit forecasts that in terms of US dollar revenues the world market for video surveillance equipment will grow at an annual rate of less than 6% in 2018. It will be challenging for vendors to continue to grow revenues and margins, but there will be opportunities for well-placed vendors. For example, both the South East Asian and Indian markets are forecast to grow at higher than average rates. There is also great potential for the next generation of products powered by technologies like deep learning and cloud computing. So, what will be the big stories during 2018? Deep learning, GDPR compliance and drone detection technologies are just some of the trends discussed in this eighth annual trends IHS white paper. The following articles are designed to provide some guidance on the top trends for 2018 in the video surveillance industry.     By Jon Cropley   The A to I of Video Surveillance Terminology The past 12 months have seen a range of new terms becoming regularly used in the video surveillance industry. We attempt to provide a brief summary of some of these. AI (artificial intelligence): Computers are able to perform specific tasks as well as, or even better than human intelligence. In the context of video surveillance, AI is used in the field of computer vision to classify visual images and patterns within them. Big data: Huge amounts of different information are  stored, organized and analyzed by computers to identify trends, patterns, and relationships. In the context of video surveillance, the data could be metadata describing hours of video surveillance footage combined with other data sources to highlight patterns relating to security or business operations. Cloud computing: Instead of using a local server to store or manage video surveillance data, use a network of internet-connected remote servers. Generally this network has the ability to provide additional resource if and when required from a larger available pool. The available resource may be clustered into a datacenter or network of datacenters. These may be private (entirely or partly owned for exclusive use by specific organization/s) or public (resource accessible to multiple separate users). Deep learning: A branch of machine learning and subset in the field of AI. Deep learning makes use of algorithms to structure high-level abstractions in data by processing multiple layers of information, emulating the workings of a human brain (a neural network). Edge computing/ storage: Performing data processing and analytics/ storage closest to the source of the data (normally, in this context, in a video surveillance camera). Face recognition: When a video surveillance system can automatically match a person’s face against a database of individuals. GPU (graphics processing unit): A programmable chip specialized for use in image processing. Due to the requirement to be able to simultaneously processing multiple large data blocks required in modern image processing, GPUs have been found to be highly suitable for deep learning/ neural network processing. H.265 (or MPEG-4 part 2): H.265 is a video compression codec standard approved by the International Telecommunications Union (ITU-T). Compared with H.264, H.265 has the potential to use 30-40% less bandwidth for a video stream of the same quality. IoT (Internet of things): IoT is not a specific device or technology – it is a conceptual framework, driven by the idea of embedding connectivity and intelligence in a wide range of devices. IHS Markit defines an IoT device as a device which has some form of embedded connectivity that allows the device to be directly connected to the internet (i.e., IP addressable), or allows the device to connect (tether) to an IP addressable device. In the context of video surveillance, this could be using video surveillance data with other sensors or sources of information.   Big Differences between the Chinese Market and the Rest of the World China is forecast to account for over 46% of global professional video surveillance equipment revenues in 2018. Despite this, the Chinese market has some unique characteristics that make it very different to other regional markets. This has led to the suggestion that there are two markets for video surveillance equipment – the Chinese market and the world market excluding China. Below are 5 ways in which the Chinese market differs from the rest of the world. Supply of equipment is more concentrated in China The two largest vendors of branded video surveillance equipment accounted for over 50% of the Chinese market in 2016. This compares to the world excluding China where the two largest vendors accounted for less than 20% of the market. Shipments of deep learning-enabled equipment are much higher in China It is forecast that three quarters of all deep learning-enabled servers for video surveillance shipped worldwide in 2018 will be shipped in China. Domestic vendors dominate supply of equipment in China Chinese vendors account for more than 80% of Chinese market revenues. There are other countries where domestic brands dominate supply (Germany, Japan and South Korea are all examples). However, in most other country markets, foreign vendors account for a much higher proportion of revenues. Shipments of HD CCTV are proportionally lower in China It is forecast that HD CCTV cameras will account for only around 10% of all cameras shipped in China in 2018. It is forecast they will account for over half of all camera shipments in the world excluding China. The market has been growing faster The Chinese market has grown at an average annual rate of 13.3% between 2012 and 2017. In comparison, the World market excluding China has grown at an average annual rate of…

Read More

Indian INCs Look at Investment in Security

2017 will undoubtedly be considered as the ‘Year of ransomware,’ the year when the global security landscape was forever changed by attacks like WannaCry and NotPetya. The havoc caused by these attacks reached far beyond the paltry ransom demand. Hospitals turned away patients, production lines came to a halt, nuclear radiation monitoring was disrupted, and so on. Cyber events like these were a wake-up call to the brave new world of cyberattacks and how they could reach further into the ‘real world’ than ever before. But it’s not just ransomware and the threat landscape that have changed; digital transformation initiatives like the move to the cloud and the increasing convergence of IT and operational technology (OT) have drastically changed networks and expanded responsibilities of security teams tasked with protecting them. These initiatives, for all their business benefits, have caused network complexity to skyrocket – an issue cyberattackers are all too eager to exploit. All the while, the labour force to safeguard against attacks remains stubbornly inadequate. As we head into 2018, here’s a look at the cybersecurity trends sure to emerge amid the intersection of the most capable threat landscape, the most complex networks and a worldwide – including India – skills shortage. Hybrid networks stretch attack surfaces The attack surface – the total sum of the ways an organization is susceptible to cyberattack – is like a balloon. It expands with the introduction of new attack vectors and attack targets, like extensions into virtual, cloud and operational technology environments. It contracts with the good cyber hygiene and risk reduction. The larger your attack surface, the more likely it is to pop. To control an attack surface that encompasses hybrid networks and that’s affected by a constantly evolving threat landscape, organizations will need to unify visibility and centralize management. Gaining seamless visibility across physical IT and OT networks, as well as virtual and cloud networks, will give them a holistic foundation on which to build a security program ready to address an agile threat landscape. While different technologies, processes and teams may be involved to secure various types of networks, attackers don’t pay attention to such divisions. If anything, they exploit these divisions in security management, and simply follow the path of least resistance to reach their intended target, no matter where the attack originates. In 2018, we’ll likely see attackers leverage hybrid network connectivity to infiltrate cloud and OT networks where traditional cybersecurity measures are still being fleshed out. Ongoing evolution of distributed attacks While NotPetya was originally dubbed a ransomware attack, seemingly a new iteration of WannaCry, it was pretty lousy at the ransom part. What it and WannaCry demonstrated, though, was the distributed attack model on which modern ransomware relies. It targets as many victims possible, looking for low – hanging fruit, so attacks can be carried out easily and automatically, maximizing the attacker’s ROI. Ransomware is a perfect fit for this model, in that any target can be extorted for payment. Now that the distributed attacks have proven global-reach capabilities, we’re sure to see more mass-scale attacks in 2018. The good news about the distributed attack model is that the cyber-criminals sell or share proven attack methods such as vulnerability exploits, to carry out distributed attacks. Again, this practice gives them a better ROI than developing new, native exploits or exploits for a specific target. It also means a relatively small number of vulnerabilities exploits are being used and reused. If vulnerability management programs can take a threat – centric approach and focus on this subset of vulnerabilities, they’ll have a greater impact on their organization’s security than if they targeted only CVSS critical vulnerabilities. Security goes automated out of necessity As mentioned earlier, networks are growing increasingly complex, meaning that IT security teams must contend with growing amounts of data that needs to be contextualized, analyzed and acted upon. At the same time, the industry is suffering from a worrying talent shortage, which means that there are fewer skilled workers available to manage these issues. This is creating an environment where attack vectors abound, increasing the organization’s risk of attack. As a result, in 2018 we expect to see a surge in the adoption of automated solutions, particularly for integrated analytical workflows. These can deliver actionable intelligence to security practitioners of what to focus on – such as vulnerabilities posing an imminent threat – what tools are at their disposal to take action, and tracking the workflow to ensure tasks are carried out to completion. The scales tip to the Cloud At present, most firms are in a transition phase, with networks made up of a hybrid of physical, virtual and multi-cloud environments. 2018 is set to be the tipping point, as corporate networks become predominantly or entirely virtual or cloud-based. Organizations will need to be sure they understand and can support the shared responsibility model of the cloud, in that the cloud service provider is responsible for security of the cloud while the organization is responsible for security in the cloud. The assumption that cloud networks are inherently secure needs to be overcome, and security teams need to have the means to understand how traffic moves into, out of and within cloud networks to put the proper security controls in place. The importance of automation, as mentioned above, becomes even more important in cloud-networks. The elasticity of clouds makes their security management too much to handle via manual processes. If organizations are aiming for a complete move to the cloud, they need to ensure that security programs are poised to support the approach. Increased attacks on operational technology The convergence of IT and OT networks presents several advantages in terms of productivity, ease of management and cost-effectiveness. But it has also introduced new cyber risks to critical infrastructure organizations such as utilities, energy producers and manufacturers that could have very real impacts on uptime, human safety and the environment. Because of the havoc that can be caused, OT networks have become an attractive…

Read More

Hikvision: Deep Learning in Smart Retail Solution

In this ever-expanding era of artificial intelligence (AI), Deep Learning will soon become the foundational technology for the security industry. Technologies that ‘learn’ will become more common and more powerful. This trend will strengthen critical security efforts in every sphere. Hikvision introduces three camera models equipped with deep learning algorithms in the smart retail industry. With the growing popularity of shopping online, the retail sector has felt the disruptive impact of Internet e-commerce more than most industries. Some have reacted to online competition by closing physical stores, but others are attempting to overcome challenges through technological transformation. Traditional retail lacks intelligent tools for accurate data collection and visualization, making it unable to provide a basis for business decision-making at the shop. People counting There is an old saying in the trade industry – ‘Small profits but quick turnover;’ and footfall is a ‘KPI’ – key profit indicator – that helps make that turnover. Compared to e-commerce, traditional offline retail stores lack the capabilities to accurately calculate customer flow. Hikvision’s dual-lens people-counting camera provides accurate customer counting and generates customer flow trends to evaluate performance and strategic initiatives. Although in a real-world scenario, shadows or other objects may easily cause miscounts, but the dual-lens people-counting camera, equipped with two cameras and powered by a deep learning algorithm, easily overcomes such interferences and delivers highly accurate data. A key advantage of deep learning algorithms over surveillance cameras’ vision algorithms is that deep learning can be continuously trained and improved with better and more data-sets. This means the longer it works, smarter it gets. Featuring binocular stereo vision, 3D people detection, and height filtering technologies, the dual-lens people-counting camera is able to accurately distinguish human beings from non-human objects, and movements in the background. By analyzing customer flow data, store management can optimise the allocation of the workforce to ensure better customer service and reach higher profits. Store managers can schedule staff strategically for peak and off-peak hours. Furthermore, they can also develop strategic marketing activities to attract customers by analyzing the data of incoming rates (entering vs. passing by). Heat mapping When customers enter the store, retailers are concerned to know about what merchandise customers are interested in. Before that, what’s more important is how to get the route they walk through and where they stop. With Hikvision’s Heat Mapping function, retailers can determine the amount of time shoppers spend in specific areas of a store, identify hot spots and dead zones, and measure the number of people who actually shop for specific products, rather than just casually walk by. Heat mapping is used to monitor and measure the size of target traffic in a region. It is a graphical representation of data represented by colors, and it is usually used to analyze the visit times and dwell times of customers in a specified area. The heat mapping function is often used in shopping malls, supermarkets, museums etc., that can find customers’ preferences over time through heat maps, offering insight how to best place items and design the store layout. As a representative product, Hikvision’s fisheye cameras, equipped with heat mapping function, not only capture a panoramic high-definition image but also learn about heat conditions in different regions within a store. In spacious areas, fewer cameras means reduced installation and labour fees. Hikvision’s  fisheye cameras are ideal for these areas, maximising monitoring views and image quality insurance. Queue detection What do you do if you always have to queue for a long time while shopping? Keep waiting, or give up shopping and avoid that store in the future. In the retail industry, waiting time is one of the most important factors affecting the customer experience. Hikvision’s Queue Detection function can help retailers manage checkout lines. When too many customers enter a queue, it can notify management to open a new checkout line. More specifically, Hikvision’ queue detection cameras can monitor the queuing situation in real-time. Firstly, cameras count the number of people in each queue and then track the dwell time of each customer. Once it is found that the number of people in a queue is too many, or the average dwell time of customers is too long, an alarm is triggered to prompt a response. Store management is reminded to open checkout windows to reduce waiting times, improving transaction efficiency and the entire shopping experience. Hikvision smart retail solution is designed to help retailers bring offline stores into a digital world, allowing data to support management and operations. It promotes retailers’ technological transformation in response to increased industry competition through the use of innovative retail technology. Ashish P. Dhakan – MD & CEO, Prama Hikvision    

Read More