Category: Feature
Physical Security Threats to Data Centres and Leveraging Mobile Technology With AI and ML For Mitigation
What is a Data Centre? A data centre is a specialized facility designed to house computer systems, telecommunications equipment and storage systems, supported by the necessary infrastructure to ensure their efficient operation. These facilities consist of several core components including computing equipment like servers and mainframes, storage systems such as hard drives and tape systems, and a robust network infrastructure comprising routers, switches, firewalls, and cabling. The infrastructure includes power distribution systems, cooling mechanisms, fire suppression tools, and security measures for both physical and cybersecurity. Critical infrastructure in a data centre is vital for uninterrupted functionality. Power systems include uninterruptible power supplies (UPS), backup generators, multiple power feeds, and power distribution units (PDUs). Cooling systems rely on Computer Room Air Conditioning (CRAC) units, chillers, hot/ cold aisle containment, and raised floors to manage airflow. Environmental controls ensure optimal conditions through temperature and humidity monitoring, air filtration, and fire detection and suppression systems. Data centres come in various types, including: (i) Enterprise centres – Operated by companies for their own use, (ii) Colocation centres – That rent space to multiple customers, (iii) Cloud centres – Managed by cloud service providers, (iv) Edge facilities – Located closer to end-users, and (v) Hyperscale centres – Operated by tech giants. They are also classified into tiers based on their capacity and redundancy: (i) Tier 1 provides basic capacity with a single path for power and cooling, (ii) Tier 2 offers redundant components, (iii) Tier 3 includes multiple paths for concurrent maintainability, and (iv) Tier 4 achieves fault tolerance with the highest redundancy level. Data centres serve numerous critical purposes such as hosting websites and applications, storing and processing data, supporting cloud computing services, enabling business continuity, providing backup and recovery solutions, and supporting telecommunications infrastructure. They also facilitate content delivery networks, process business transactions, support artificial intelligence and machine learning, and enable big data analytics. The evolution of data centres is driven by trends toward greater energy efficiency, higher density computing, increased automation, enhanced security measures, and sustainable operations. Innovations include integrating edge computing, adopting AI-driven management, and implementing modular design approaches. These facilities are essential to modern digital infrastructure, underpinning global digital economies, business operations, internet connectivity, and digital services worldwide. Like all assets of value, apart from facing cyber threats, data centres increasingly face physical security threats because damage, sabotage or outages to data centres can cause catastrophic damage amounting to millions of dollars, loss of brand value and potentially ruinous litigations. To set context, as per a 2023 survey, roughly 54 percent of data centre operators said their latest most significant outage cost over USD100,000. A further 16 percent of respondents said the most recent crucial system outage caused them monetary damage of over USD1 million. Physical Security Threats The physical security threats faced by data centres encompass a wide range of challenges that require comprehensive protection strategies. Let us examine a few of these threats/ challenges. The most common threats are given in the Fig 2 below and thereafter are described in detail. Unauthorized physical access At the forefront of these concerns is unauthorized physical access, which can manifest through various methods including social engineering attempts, tailgating through secure entrances, impersonation of authorized personnel or contractors, theft of access credentials, forced entry attempts, and insider threats from disgruntled employees. These access-related threats are particularly concerning as they can lead to more severe security breaches if successful. Infrastructure sabotage Infrastructure sabotage represents another critical threat category, involving deliberate damage to essential systems such as power distribution units, network cables, cooling systems, backup generators, and server racks. Such attacks can cripple data centre operations and lead to significant service disruptions. The risk of vandalism to security systems themselves must also be considered, as damage to these protective measures can create vulnerabilities that malicious actors might exploit. Environmental threats Environmental threats pose a significant risk to data centre operations and require robust mitigation strategies. These include fire and smoke damage, water damage from flooding or leaks, extreme temperature fluctuations affecting equipment, humidity issues that can damage hardware, natural disasters such as earthquakes and hurricanes, chemical contamination, and electromagnetic interference. These environmental factors can cause catastrophic damage to sensitive equipment and disrupt critical services. Power-related threats Power-related threats are particularly concerning given the data centre’s reliance on consistent, clean power. These include grid power failures, UPS system failures, generator malfunctions, power surges or spikes, disruption to fuel supplies for backup systems, and potential sabotage of electrical systems. The interconnected nature of power systems means that a failure in one component can cascade through the entire facility. Theft Theft remains a persistent threat to data centres, targeting valuable assets such as server and network equipment, storage devices, copper wire, backup media, personal property, and maintenance equipment. These theft attempts can be opportunistic or carefully planned operations, potentially involving insider knowledge. The financial impact of theft extends beyond the immediate loss of equipment to include service disruption and potential data breaches. Service disruption attempts Service disruption attempts represent a broad category of threats aimed at preventing normal data centre operations. These can include blocking physical access to facilities, disrupting cooling systems, interfering with power delivery, cutting communication lines, combining DDoS attacks with physical intrusion, and jamming wireless systems. Such attacks can be particularly effective if coordinated across multiple vectors simultaneously. Malicious surveillance and intelligence gathering activities Malicious surveillance and intelligence gathering activities pose a significant threat as precursors to more direct attacks. These can include photography of facilities, drone surveillance, dumpster diving for sensitive information, social engineering to gather facility information, recording of security patrol patterns, and monitoring of staff movements. This information can be used to identify vulnerabilities and plan more targeted attacks. Vehicle-based threats Vehicle-based threats present unique challenges for data centre security including the potential for ramraid attacks, car bombs, unauthorized parking near critical infrastructure, blocking of emergency access routes, vehicle- borne surveillance, and hijacking of delivery vehicles. These threats require specific countermeasures such as vehicle barriers, bollards, secure parking areas, and…
Beware of the Dark Age of the Digital Era
GARIMA GOSWAMYCEO and Co-FounderDridhg Security International Pvt. Ltd. The rapid advancement of technology has brought unprecedented convenience, but it has also opened doors to ethical dilemmas and potential misuse. One of the most alarming possibilities lies in the hypothetical misuse of technology for unauthorized data retrieval, particularly from sensitive repositories like Aadhaarlinked databases and the sale of objectionable non consensual pictures produced by using deepfake technologies via nudify apps. Deepfake Technology and Nudify Apps: A Looming Threat Deepfake technology, which uses generative AI models to create realistic but fake images, videos, or audio, has become a significant concern. Once exclusive to media professionals, these tools are now widely accessible, and their potential for misuse is immense – from of ‘nudify’ apps, which claim to remove clothing from images, often targeting women. These apps, available for as little as INR199 on platforms like Telegram, enable anti-social elements to exploit technology for financial and reputational harm. Tutorials for these tools are freely available online, making them even more dangerous. The combination of deepfake tools with apps like Microsoft’s VASA – which generates lifelike, audio-driven talking faces – further heightens the risk of identity theft and reputational damage. These technologies, when misused, create opportunities for exploitation on a scale previously unimaginable. Unauthorized Data Retrieval: A Growing Concern Imagine an application capable of instantly retrieving personal details – such as names, phone numbers, or Aadhaar-linked addresses – by simply pointing a smartphone camera at an individual. While this may sound like science fiction, the rapid evolution of technologies like artificial intelligence (AI), augmented reality (AR), and centralized databases makes such scenarios increasingly plausible. This highlights the urgent need to address privacy and security risks associated with emerging technologies. The Role of Ethics in Technological Advancements The integration of ethics into the development and deployment of advanced technologies is no longer optional – it is a necessity. Without ethical guidelines, the misuse of such tools could lead humanity down a perilous path. Technology, when unbridled by ethics, has the potential to create a dystopian reality where privacy, security, and human dignity are continuously compromised. Developers, organizations, and governments must work collectively to ensure that technology serves the betterment of humanity. Safeguards, transparency, and strict regulatory oversight must be in place to prevent exploitation and misuse. The Need for Corrective Action It is not just governments and regulatory bodies that bear the responsibility of preventing the misuse of emerging technologies. Private organizations must also play their part by investing in solutions to counter these threats. For example, while tools to create deepfakes are widely accessible, reliable detection mechanisms remain scarce. Companies like Sensity, ResembleAI, and DridhG Security International are leading the way in developing tools to identify and counteract the misuse of these technologies. Such innovations are critical in ensuring that the digital world remains safe and secure for everyone. Conclusion The allure of technological advancements should not blind us to their potential risks. Without the integration of ethics, innovation could become a double-edged sword, capable of both immense progress and devastating harm. The time to act is now – by fostering collaboration between governments, private organizations, and ethical technologists, we can ensure that technology remains a force for good. Without immediate corrective measures, we risk entering a digital dark age where innovation outpaces our ability to control its consequences.
The Public Want Clear Rules on Police Use of Facial Recognition
There is public support for the police’s use of facial recognition to solve and prevent crimes – even in traditionally more skeptical countries as Denmark. Here, a new opinion poll shows that 84 percent have a positive attitude. However, trust in the technology depends on politicians and authorities establishing clear rules for the protection of data and privacy. Whether it is recorded video material used to solve crimes, or live images that, for example, can identify unwanted hooligans at a football stadium, public support for the use of facial recognition is quite significant. In Denmark 84 percent support the use of facial recognition in connection with the prevention and solving of crime and terrorism. The support spans across age, gender, and geography, according to a nationally representative analysis conducted by Norstat for Milestone Systems. But the support has strings attached. 70% of Danes see clear rules, data protection, and transparency about how and where the technology is used as the most important factor for their trust. Additionally, 51% consider it crucial that data is deleted as soon as it is no longer relevant to a case. “The support for facial recognition also obliges. Therefore, politicians and authorities must get started on creating clarity about rules, responsibility, and protection of our data. It is fine that they are currently operating within a pilot scheme, but it is urgent to look at more permanent regulation of facial recognition,” said Thomas Jensen, CEO of Milestone Systems. Danish Milestone Systems develops and sells data-driven video technology and analysis tools used in, for example, airports, by police, traffic control, companies, hospitals, and stadiums worldwide. “It is crucial to have clear and transparent regulation if we are to maintain the public’s support and trust in the technology and the authorities. At the same time, there must be security for how facial recognition data is stored and deleted when it is no longer relevant. It could be 30-60 days,” said Thomas Jensen. The technology is used today for everything from verification – such as when you open your iPhone, show a badge, or go through passport control – to recognizing a specific person at, for example, a sports venue. The support for facial recognition also obliges. Therefore, politicians and authorities must get started on creating clarity about rules, responsibility, and protection of our data. It is fine that they are currently operating within a pilot scheme, but it is urgent to look at more permanent regulation of facial recognition Thomas Jensen CEO, Milestone Systems “In addition to all the practical and well-known applications, modern AI-driven facial recognition is also a powerful tool that can help both solve and prevent crimes,” said Thomas Jensen. Although the publics knowledge of the technology behind facial recognition is relatively low, the attitude is positive. The new survey shows significant support for using facial recognition technology in cases of murder (88%) and serious violence and rape (87%). Likewise, 81% believe that facial recognition should be used to prevent and solve terrorism by quickly identifying known terrorists. Technology is not always perfect – this also applies to facial recognition. Therefore, two trained operators should verify with their own eyes when the software finds a face match – a picture in a database that matches a picture from a video recording of, for example, a wanted criminal or a hooliganThomas Jensen CEO, Milestone Systems Clear rules and regulations are one thing. There is still a need for common sense and human judgment, says Thomas Jensen. “Technology is not always perfect – this also applies to facial recognition. Therefore, two trained operators should verify with their own eyes when the software finds a face match – a picture in a database that matches a picture from a video recording of, for example, a wanted criminal or a hooligan,” said Thomas Jensen. He emphasizes that although most respondents in the survey support the police’s use of facial recognition in their work to protect citizens, prevent, and especially solve crimes. “But that trust and support also obliges to create clarity and frameworks,” he emphasized. Facts about facial recognition ● Today, AI – artificial intelligence – is used to train facial recognition software and convert images into anonymous signatures/ numbers. These signatures are compared with anonymous signatures in a database based on images of faces from, for example, the police, Interpol, FBI etc. ● Only when there is a potential match between the signatures are the images retrieved from the database for comparison. ● The technology is used today for everything from verification – such as when you open your iPhone, show a badge, or go through passport control – to recognizing a specific person at, for example, a football stadium. ● The technology behind facial recognition was developed in 1965 by the American mathematician Woodrow Wilson Bledsoe (1921–1995) to identify or confirm a person’s identity based on facial features. ● Post-event facial recognition analyzes video recordings after the event has taken place, instead of live. Investigators can use recognition software on recorded video from cameras to identify suspects by matching their face/signatures with known databases. ● Real-time facial recognition is the immediate analysis of a live video feed, where faces are compared with a database to generate instant alerts when a match is found. At large public events such as sports stadiums, real-time facial recognition can be used to detect wanted or banned individuals – for example, known hooligans. Read more posts
7 Advanced Technologies That Optimize The Performance of Hikvision’s PTZ Cameras
Hikvision has integrated seven advanced technologies that drive stability, precision, and efficiency in video monitoring with Pan-Tilt-Zoom (PTZ) cameras. In this blog, we will explore how these innovations – such as image stabilization, rapid focusing, and dual-view capabilities – enable Hikvision’s PTZ cameras to provide unmatched performance in various environments. Numerous real-world challenges face security professionals who need to deliver reliable and efficient video monitoring solutions. Sometimes, it is finding a way to focus on critical issues that occur within a video stream. At other times, they need to be able to ‘see’ in very adverse weather conditions. To cope with these different challenging scenarios, security solutions must be able to adapt and respond with precision and intelligence. Hikvision’s PTZ cameras bring together dedicated technologies designed to address these needs, ensuring optimal performance in the most demanding conditions. 7 innovations that enable Hikvision’s PTZ cameras to be trusted in diverse real world scenarios 1. Stabilizing images against vibrations When PTZ cameras are installed on bridges or in areas with strong winds, they are prone to vibration. This can cause the image to show signs of shaking, especially when the lens is extended to its maximum focal length. To address this problem, Hikvision has developed unique Optical Image Stabilization (OIS) and Gyroscope Image 7 Advanced Technologies That Optimize The Performance of Hikvision’s PTZ Cameras Stabilization (GIS) technologies for its PTZ cameras. Both technologies use a gyroscope to detect and measure camera vibrations. The OIS technology compensates for the camera motion by moving the lens in the optical path, ensuring that the lens always stays focused on the sensor. The GIS technology, meanwhile, counterbalances the camera’s motion digitally. 2. Seeing through fog When monitoring long distances, fog can be a significant issue. Hikvision’s defog technology measures fog density based on the level of grayness in the live video feed and automatically activates a proper defog mode. In light fog, the Algorithmic Defog mode enables the camera to digitally recover and enhance image details to produce colored video. In more challenging, thick fog conditions, the Optical Defog mode is activated. This mode uses infrared light, which can penetrate the fog to generate black-and-white video. Despite the absence of color, the video is of high quality thanks to advanced Image Signal Processing (ISP), which significantly reduces noise. 3. Focusing at lightning speed while zooming Just as eagles can spot small animals from high in the sky, Hikvision’s PTZ cameras can sharply focus on distant objects, even as their zoom level changes. This capability is powered by Hikvision’s Rapid Focus technology. By creating a 3D model of the camera’s surroundings, the system pre-calculates the coordinates and zoom ratio for every point in the scene. When the camera needs to focus on a specific point, it uses this pre-calculated data to quickly achieve sharp focus, dramatically reducing focusing time. 4. Keeping track of moving objects In some situations, it is essential to continuously track a moving object. In a chemical park, for example, it is crucial to monitor trucks transporting hazardous materials to ensure they follow the designated entrances and routes. In such cases, Hikvision’s Auto Tracking 3.0 technology provides an effective solution. By leveraging Automatic Number Plate Recognition (ANPR), the PTZ camera can identify, lock onto, and accurately follow a specific vehicle. The camera’s pan and tilt capabilities allow it to maintain focus on the vehicle as long as it remains within coverage, even if it is temporarily obscured by other objects. 5. Delivering dual, smartlylinked views at once When a traditional PTZ camera moves or zooms in, incidents outside its current field of view may be missed, creating gaps in coverage. In environments such as critical facilities or infrastructures, maintaining complete, uninterrupted coverage is vital in ensuring no incident goes unnoticed. Hikvision’s TandemVu PTZ cameras tackle this challenge by integrating multiple lenses, offering panoramic and close-up views simultaneously. The innovative Smart Linkage technology ensures that when an object is detected in the panoramic view, the PTZ lens automatically activates to track and identify it. If it identifies a trespasser, the camera can even issue visual and auditory warnings. This dual-view capability allows users to focus on details or respond to specific events while maintaining a wider overview, ensuring effective situational awareness. 6. Extending operational life with an upgraded slip ring for pan-tilt PTZ cameras undergo countless pan and tilt movements throughout their lifespan, which can lead to mechanical wear and decreased reliability in standard models. Hikvision’s Dual-Track Slip Ring is designed to address this challenge by offering enhanced durability and redundancy. The dual-track design ensures that the camera remains operational even if one track experiences damage, providing up to 10 years of reliable performance. The gold-plated tracks further enhance smoothness and resistance to wear, ensuring continuous and stable operations necessary for demanding applications. 7. Automatic recovery from lens direction drift In high-traffic environments, such as busy intersections, PTZ cameras must continually pan and tilt to provide complete coverage, which can lead to gradual lens direction drift. Hikvision’s Smart Pan-Tilt Correction technology solves this problem by automatically keeping the camera lens aligned with the intended direction, even during prolonged operation or when affected by external forces. This technology detects and corrects any directional drift, ensuring precise monitoring and accurate privacy masking. As a result, users are guaranteed the exact coverage needed for dependable security. Hikvision’s PTZ cameras are crafted with one goal in mind: to address a diverse range of challenges with precision, reliability, and intelligence. Whether it’s through ensuring stable video in windy environments, tracking moving vehicles as they travel through high-security zones, or providing clear visibility even in dense fog, these tailored technologies guarantee the powerful performance of PTZ cameras that users demand. They work together to reduce maintenance needs and costs, enhance operational efficiency, and ensure that no critical moment is missed. Read more posts
PFAS Found in Firefighter Gloves, Hoods and Wildland Gear
A firefighter’s protective clothing is composed of three distinct layers made of different textiles. In response to concerns about the gear possibly exposing firefighters to PFAS chemicals — several of which have been linked to cancer — NIST researchers investigated the presence of the chemicals in textiles used to make the layers. This latest study analyzed hoods and gloves worn in structural fires as well as protective clothing worn to fight wildfires. Credit: B. Hayes/NIST. Credit: B. Hayes/NIST The protective clothing worn by wildland firefighters often contains PFAS, according to a new study from the National Institute of Standards and Technology (NIST). The study also found PFAS in hoods and gloves worn by firefighters who respond to building fires. PFAS – which stands for ‘per- and polyfluoroalkyl substances’ – are a category of chemicals used in a wide range of products. In high concentrations, PFAS may have harmful health effects on people. Firefighters have more PFAS in their blood than the average person. It isn’t clear why, but one theory is that it comes from the protective equipment they wear during a fire – called turnout gear. “Our latest study showed that PFAS are present not only in the jacket and pants worn by firefighters, but also in many of the smaller protective garments,” said NIST Chemist and Study Co-author Rick Davis, “Measuring the presence of the chemicals is the first step in understanding their impact on firefighters.” The NIST studies do not assess the health risks that firefighters might face due to the presence of PFAS in turnout gear. However, they provide previously unavailable data that toxicologists, epidemiologists and other health experts can use to assess those risks. NIST conducted these studies at the behest of Congress, which called on NIST to study PFAS in firefighter gear in the 2021 National Defense Authorization Act. PFAS are everywhere. They don’t react very easily with other chemicals, so they make very effective nonstick surfaces, lubricants and food packaging. But the fact that they’re unreactive also means that they don’t break down easily. These chemicals stay in the environment for a long time, which is why they are sometimes called ‘forever chemicals.’ Fabrics containing PFAS are often used to make firefighting gear because these chemicals are very good at repelling water. Part of the standard for firefighter gear requires a minimum amount of water resistance to prevent steam burns and provide protection from chemicals. Water resistance also tends to make gear safer because heat can travel much more efficiently through water than through air. For example, a dry potholder will let you safely pull a hot dish out of an oven. But that same dish can give you a third-degree burn in just one second if the potholder is wet. NIST researchers have been running a series of experiments to understand how much PFAS are in that equipment. The two prior NIST studies looked at the level of PFAS in firefighter coats and pants and how wear and tear can increase the amount of measurable PFAS in these garments. This latest study, published on Dec. 13, analyzed gloves and hoods worn by structural firefighters (those who fight fires in buildings), as well as gear worn by wildland firefighters. The researchers were particularly interested in hoods and gloves because they come in direct contact with skin, as opposed to coats and pants that are worn over a base layer. Wildland gear includes the protective shirt and pants worn for fighting wildfires. It’s designed for long treks over difficult terrain, so it trades off some heat protection for mobility. Unlike the thick, heavy coat and pants used to fight a structural fire, wildland gear is like something you might wear camping with extra heat protection. The NIST team tested four types of gloves, eight types of hoods, and nine types of wildland firefighter gear from several manufacturers of firefighter gear in 2021-23. All these garments are commercially available. Our latest study showed that PFAS are present not only in the jacket and pants worn by firefighters, but also in many of the smaller protective garments Rick DavisNIST Chemist and Study Co-author The researchers pulled the garments apart into 32 textile samples and extracted PFAS from the samples into a solvent. Then they tested each solvent to see if it contained any of 55 different PFAS chemicals. After running these tests, Davis and his team found measurable amounts of PFAS in 25 of the 32 textile samples. Across those samples, they found 19 different types of PFAS. “There was a range in the amount of PFAS we found in each sample,” said Davis, “Most had only a little, but a few had large amounts.” The hoods contained low PFAS levels. In almost all cases, the amount of PFAS in hood layers was too small to be measured confidently. The inside layers of the gloves had amounts of PFAS similar to those found in the inside layers of coats and pants tested in prior studies. Wildland gear is made of only one layer. The assumption among researchers was that this layer was unlikely to contain much PFAS. In general that was true, as most of the wildland gear tested had low levels of PFAS. But there were some cases that had notably high levels. Across all the textiles tested in this study, the largest total concentration of PFAS in a single sample was about 4,240 micrograms per kilogram from a piece of wildland gear. “We still don’t know what this means in terms of risk to a firefighter’s health,” said Davis, “But understanding where PFAS is will help us reduce potential impacts as we learn more about these chemicals.” The researchers plan to run a follow-up study on the same samples to see how wear and tear might increase the amount of detectable PFAS in hoods, gloves and wildland firefighter gear. Read more posts
Beyond Visible Light Technologies Survey: Technology Adoption And Usage
Traditional cameras, which rely solely on visible light, have limitations in their ability to monitor and detect in challenging conditions such as darkness, fog, or other visual obstructions. To overcome these limitations, the industry is increasingly adopting non-visible light perception technologies such as thermal imaging, radar, x-ray and audio. By tapping into the non-visible light spectrum, these technologies enhance monitoring capabilities by detecting heat signatures, movement and details that would otherwise go unnoticed. This not only enhances security applications, such as surveillance in complete darkness or adverse weather, but also opens up new opportunities in fields like healthcare, industrial inspection, and environmental monitoring. To further explore the adoption of these advanced technologies, asmag.com and Hikvision have partnered up to conduct a survey examining the deployment and full potential of four key non-visible light technologies: thermal imaging, audio, x-ray and millimeter radar. Key findings Thermal imaging and audio lead in non-visible light tech deployment Survey data shows that thermal imaging (72%) and audio technology (57%) are the most widely deployed technologies by respondents, followed by X-ray technology (31%) and millimeter radar technology (29%). Audio technology has become a valuable component of security applications, and recent advancements have further expanded its capabilities. The transition to IP-based audio solutions has facilitated integration with existing surveillance systems, enhancing communication and sound warnings. Moreover, the incorporation of two-way audio into surveillance cameras has enabled real-time interaction with individuals in the field. While X-ray and radar technologies are gaining traction, their adoption rates remain lower than thermal and audio solutions. Factors such as cost, complexity and regulatory restrictions may contribute to this. As these challenges are addressed and technological advancements continue, we can anticipate further growth in the adoption of X-ray and radar in various sectors. Customer demand alignment with current market deployment Customer demand seems to align closely with the technologies being offered, especially for thermal imaging and audio solutions. Survey data shows that thermal imaging has the highest level of inquiries, with 15% of respondents indicating that they are always asked about it, 24% often and 39% sometimes. Similarly, audio technology also sees strong demand, with 16% reporting that it was always requested and 24% often. These figures suggest that the market is effectively meeting customer needs for these two technologies. However, demand for X-ray technology and millimeter radar outpaces their current deployment. While 42% of respondents receive inquiries for X-ray (5% always, 10% often, 27% sometimes), only 31% of solutions providers offer it. Similarly, millimeter radar is requested by 37% of respondents (2% always, 11% often, 24% sometimes), but only 29% offer it. This suggests that while customer interest is growing, existing challenges are limiting deployment. The gap suggests a potential opportunity for vendors to expand their offerings if they can address these challenges effectively. Security remains primary reason for adoption Across all technologies, security remains the primary reason for adoption. A significant 69% of respondents cited the need to enhance detection in low-light or challenging environments as a key motivator, with 49% focusing on proactive threat detection and management and 41% seeking to improve situational awareness through multi-dimensional perception. This strong emphasis on security aligns with the high demand for thermal imaging and audio technologies, which have been proven to enhance surveillance and communication in real-time security operations. Interestingly, the survey results showed that there is a growing trend towards expanding applications beyond security, with 41% of respondents indicating this as a reason for adoption. Moreover, another equal percentage (41%) cited the need to meet customer requests and project requirements. This correlation suggests a customer-centric approach in the industry, where providers are responding to specific client needs and preferences. Technology insights, applications by industry Thermal technology Security/perimeter protection remains the primary application for thermal imaging, accounting for 86% of responses. Other top applications include early fire and smoke detection (65%), industrial equipment monitoring (53%) and body temperature monitoring (43%). These applications align with the unique capabilities of thermal imaging, which detects objects based on their heat signature. Respondent quotes further support these findings: The top five verticals for thermal imaging deployment are energy infrastructure, factories, transportation, healthcare, and office/corporate buildings. This is consistent with its ability to improve situational awareness and detect potential hazards. For instance, in energy infrastructure, it can also be used to monitor equipment overheating. What are the primary applications of thermal imaging technology for your projects/ customers? Audio technology Security ranks a solid No. 1 (88%) as the primary application for audio technology. Indeed, audio solutions such as intercoms, public address systems and warning messages have been deployed for security purposes for many years. Today, audio and video surveillance can be integrated, enabling warning messages to be played back on a speaker when a potential intruder/ loiterer is detected. Non-security applications are also cited, for example industrial equipment monitoring (47%) and background music (41%). The top verticals for audio solution deployment are retail, factories, energy infrastructure, office/corporate buildings and healthcare. This is not a surprise – retail stores, for example, are known to use PA systems for both security and background music, and factories use audio analytics for equipment monitoring. It’s important to note that the audio industry is transitioning to IP-based solutions, similar to the growth of IP surveillance. This shift is expected to drive significant growth in the audio technology market as organizations adopt more advanced and integrated solutions. What are the primary applications of audio technology for your projects/ customers? Millimeter radar technology Security and traffic management are the primary applications for respondents, accounting for 81% and 64% of responses respectively. Radar works by emitting signals into the environment and processing the reflected signals to determine the speed, size and distance of those objects. This makes radar ideal for both security and transportation, for use cases such as speed measurement and traffic flow detection. Compared to cameras, radar offers several advantages, including the ability to cover large areas and operate independently of weather conditions. Radar can also be combined with PTZ cameras to provide…
Enhancing IT Operations through the Infraon Infinity Suite’s AIOps Capabilities
“Our goal is to revolutionize IT operations by leveraging the power of AI. The integration of AIOps within the Infraon Infinity Suite represents a significant leap forward in how businesses manage their IT infrastructure” Satish Kumar VCEO, EverestIMS Technologies I n the rapidly evolving world of IT, maintaining seamless operations and staying ahead of potential issues is paramount. The integration of Artificial Intelligence for IT Operations (AIOps) within the Infraon Infinity Suite is transforming how businesses manage their IT infrastructure. This advanced integration leverages predictive analytics, automated incident management, and intelligent insights to enhance decision-making, optimize resource allocation, and improve overall IT performance. Predictive Analytics: Identifying issues before they impact business One of the standout features of the Infraon Infinity Suite with AIOps integration is its predictive analytics capability. This technology utilizes machine learning algorithms to analyze historical data, detect patterns, and predict potential IT issues before they impact business operations. By identifying anomalies and trends early, IT teams can proactively address these issues, preventing downtime and ensuring continuous service availability. Predictive analytics enables organizations to transition from a reactive approach to a proactive strategy in managing their IT environments. This shift not only improves the reliability of IT services but also reduces the time and cost associated with resolving unexpected incidents. By anticipating problems and addressing them before they escalate, businesses can maintain smoother operations and deliver better service quality to their customers. “Predictive analytics and automated incident management are game-changers for our clients. These capabilities allow them to stay ahead of potential issues and resolve incidents swiftly, ensuring uninterrupted business operations,” said Kumar. Automated Incident Management: Accelerating resolution times The integration of AIOps within the Infraon Infinity Suite also enhances incident management through automation. Automated incident management involves the use of AI to detect, diagnose, and resolve IT issues without human intervention. This capability significantly reduces the mean time to resolution (MTTR) and minimizes the impact of incidents on business operations. With automated incident management, IT teams can focus on more strategic tasks while the system handles routine issues. This not only improves efficiency but also ensures that incidents are resolved quickly and effectively. Automated workflows streamline the entire incident management process, from detection to resolution, ensuring that IT services remain uninterrupted and business operations continue smoothly. Intelligent Insights: Enabling informed decision-making AIOps integration within the Infraon Infinity Suite provides intelligent insights that are crucial for informed decision-making. These insights are derived from the continuous analysis of IT data, offering real-time visibility into the performance and health of IT systems. By understanding the current state and predicting future trends, IT leaders can make data-driven decisions that enhance the overall performance of their IT infrastructure. Intelligent insights enable IT teams to optimize resource allocation, ensuring that the right resources are available where and when they are needed most. This optimization not only improves operational efficiency but also reduces costs associated with over-provisioning or underutilization of IT resources. By leveraging these insights, organizations can achieve a more balanced and efficient IT environment. Optimizing resource allocation for better performance Resource allocation is a critical aspect of IT management, and the Infraon Infinity Suite with AIOps integration excels in this area. The suite uses AI to analyze resource usage patterns and recommend optimal allocation strategies. This ensures that resources are used efficiently, reducing waste and improving overall performance. By optimizing resource allocation, organizations can achieve better performance without increasing their IT budget. The system continuously monitors resource usage and makes adjustments as needed, ensuring that IT resources are always aligned with business needs. This dynamic approach to resource management helps businesses stay agile and responsive in a rapidly changing IT landscape. Enhancing overall IT performance The ultimate goal of integrating AIOps with the Infraon Infinity Suite is to enhance overall IT performance. By leveraging predictive analytics, automated incident management, and intelligent insights, the suite provides a comprehensive solution for managing IT operations effectively. This integration ensures that IT services are reliable, efficient, and aligned with business objectives. Improved IT performance translates to better business outcomes, including higher customer satisfaction, increased operational efficiency, and reduced costs. By proactively managing IT issues and optimizing resources, organizations can focus on strategic initiatives that drive growth and innovation. The Infraon Infinity Suite with AIOps integration empowers IT teams to deliver exceptional service quality and achieve superior business results. “Intelligent insights and optimized resource allocation are critical for maintaining an efficient and high-performing IT environment. With AIOps, we provide our clients with the tools they need to make informed decisions and achieve better business outcomes” In summary, the Infraon Infinity Suite with AIOps integration is a powerful solution that transforms IT operations. By leveraging advanced technologies like predictive analytics, automated incident management, and intelligent insights, the suite enhances decision-making, optimizes resource allocation, and improves overall IT performance. With this integration, EverestIMS Technologies continues to lead the way in delivering innovative IT service management solutions that drive business success.
Weather Security: Need of Hour
Col. Prof. Sanjay Srivastava ChairmanClimate Resilient Observing SystemsPromotion Council (CROPC) & Professor of PracticeTERI School of Advanced Studies, New Delhi It was 28th of June, 2024 when Delhi-NCR woke up to a flooded morning. The flights from Terminal 1 at Indira Gandhi International Airport were suspended as there were severe damage to the façade and related infrastructure causing delay and suspension in flights. The cargo area was flooded and the stuff in transit had severe impact to the tune of total damage to parcels. The logistics companies and e-service providers had a time of nightmare in damage control. There were huge payouts due to the event. Actually, India Meteorological Department (IMD) had forecasted heavy rain in Delhi on 27 June 2024. This was followed by a midnight nowcast of extremely heavy rain. Next day, Delhi-NCR region woke up to a flooded morning. Delhi had a thunderstorm & lightning and extremely heavy rain on 28 June 2024. The turbulent wind damaged façade of T1 terminal of Indira Gandhi International Airport (IGAI) and airport operations from Terminal 1 was suspended for 48 hours. Safdarjung experienced more than 228.1mm rain in 24 hours which was first such incidents since 1936. Gurugram, NOIDA to Delhi, the precipitation varied from 40mm to 260mm which was historical. At IGAI, entire cargo area was flooded causing damage to the stored items in transit and disrupting the supply chain management. This being a working day, there were terrible traffic jam in entire NCR region. The intensity of rain was so much that any city with such extreme rainfall will get adversely impacted. Overall, the event had huge impact on the national and international business of more than INR2100 crores. This risk was not fathomed, weather warnings were ignored and corporate houses had to bear unbearable losses. The risk assessments were not done properly. And hence, even risk transfer tools like insurance did not work. There have been extreme events felt more frequently in most of the parts. Besides metro, tier 2 cities were more affected. In another event of heavy rain in Gurugram the DLF mall and expensive apartments like Camelia and magnolia had to face the wrath of flash flood. Since, the luxurious hutments and global stature, commercial malls, and IT-hubs like Cyber city are located in the vicinity of lake areas in the natural grains of Aravalli to the lakes, the water always follows natural grains, the infrastructures in the area will be affected. Similar extreme rains were felt at many cities viz. Hyderabad, Mumbai, Vadodara, Rajkot, Wayanad etc. Since Indian cities are developing very fast, there has been rapid growth of Infrastructures. An estimated impact of extreme weather in terms of financial losses in recent past has been depicted in Table 1 below:- Changing weather and extremes events like flash flood, sudden thunderstorms, lightning & hail, unbearable heat are being witnessed across the country. Weather is now a visible risk and it’s a big challenge to security and safety. Recent years have been marked with such extremes. It’s time to take a re-look and adopt weather intimately to have a fruitful way forward Last year, United Nations Secretary-General Antonio Guterres declared the ‘era of global boiling’ has arrived after July 2023 which was the hottest month ever record ed. The impact is being felt in terms of extreme and erratic events like heat wave beyond human endurance, sudden heavy rain in very short time, extreme colds, rapid rise in storms, cloud burst, thunderstorms and lightning. As per the research by University of California and the Indian researches by India Meteorological Department (IMD) and Climate Resilient observing Systems Promotion Council (CROPC), with one degree rise in temperature, there is 12% rise in evaporation that is overloading additional moisture. During last two-month August-September 2024, there have been four deep depressions in Bay of Bengal. There has unique phenomenon of deep depression in Bay of Bengal crisscrossing east to west and effecting western states. There was also a recurve of deep depression. “Changing weather and extremes events like flash flood, sudden thunderstorms, lightning & hail, unbearable heat are being witnessed across the country. Weather is now a visible risk and it’s a big challenge to security and safety. Recent years have been marked with such extremes. It’s time to take a re-look and adopt weather intimately to have a fruitful way forward” Climate change is not hypothetical, but it is also here, right now, at our gates. Senator Andrew Young had pointed out in US Presidential election in 2019. Even now, in the recent impending US Presidential election, Climate change is bone of contention. The risk of weather events affects everyone. Rather entire life cycle of common man, government and corporate businesses are governed by weather. There is state-of-the-art early warning forecast available by IMD. The government has laid down rules for usage of land as per master plan. Weather events, if sensibly followed, give adequate knowledge and opportunity for a progressive business instead of careless attitude causing huge damage. In addition, there are collateral impacts of complete SCM, mobility, solid waste management, energy transmission and distribution, and most importantly human health. The estimated economic damages during few recent events, as given in table 1 have been in thousands of crores causing dent to the economy. It’s worth pondering over the emerged risk of weather, especially extreme events. Cities have encroached upon the rivers and the land use zonation are encroached, municipal corporations are finding it tough to deal with the situations. The corporates are deeply engrossed into their business, least realizing the emerging risks and its impacts. For most of these corporates, these are short term events and it would be over by after few days or hours. The heat waves in 2024 were at extremes in many cities with temperature soaring in between 40 to 50 degree celcious. The working hours of people in corporate, government and routine business were grossly compromised. Rather, in peak hours of heat that is past mid-day till evening, 4-5…
Vicon’s Valerus™ VMS Achieves STQC Certification: A New Era of Cyber-Secure Video Surveillance
Certified for a new era of security For over 55 years, Vicon has pioneered innovation in the security industry. With the STQC certification, Valerus takes a significant step forward in protecting organizations from both physical breaches and cyber threats. In an era where unauthorized access to live video feeds, tampered footage, and cybersecurity breaches are increasingly common, securing video surveillance systems is essential. The Valerus VMS is designed with cutting-edge cybersecurity measures, ensuring the integrity of sensitive data and video feeds, and providing unmatched reliability and trust. Key benefits of STQC certification Advanced Cybersecurity Valerus now offers heightened protection against cyber threats, securing data from unauthorized access and ensuring footage remains secure and unaltered. The system meets the most rigorous security standards, helping clients confidently manage data security risks, in addition to traditional physical security risks. Data Integrity and Reliability STQC certification means that Valerus safeguards sensitive information and ensures critical video remains accurate and reliable – both of which are essential for security operations, legal compliance, and organizational continuity. Peace-of-Mind with End-to-End Security Security professionals can rely on Valerus’ robust alarm management suite, integrated video analytics, and now, STQC-certified cybersecurity, to ensure their surveillance systems are protected against today’s most sophisticated threats. With 24/7 system health monitoring, proactive alerts, and integrated access control, Valerus goes beyond traditional VMS to offer comprehensive security. “Vicon, creators of the Valerus Video Management System, is proud to announce that its Valerus VMS is now STQC approved, certifying it as a cyber-secure video management platform. This certification underscores Vicon’s commitment to offering advanced video surveillance that meets the highest cybersecurity standards, specifically addressing risks associated with the Open Web Application Security Project (OWASP) top 10 vulnerabilities” Commitment to Cybersecurity This new certification is a testament to the company’s dedication to continuously evolving and enhancing its solutions. Combined with its OWASP compliance and advanced security features, Valerus delivers top-tier cybersecurity, ensuring that surveillance data is protected at all times. In addition, Vicon provides regular firmware updates and bug fixes, allowing users to stay up-to-date with the latest security measures, free of charge. The excellence of Valerus AI-based analytics deliver substantial time savings when it comes to post-event searches because they filter out non-relevant motion-based events. By applying object classification rules, you’ll limit your searches to just people and/ or vehicles, as opposed to all motion. Hours spent searching through video can now be reduced to minutes, so you can find what you’re looking for. Museum Search Search for motion in an area of recorded video, and receive a list of all events that occurred within that area. By searching only for motion triggered by people and/or vehicles, in designated areas, and within a certain time period, you will reduce the amount of non-relevant video you watch. Thumbnail Search Thumbnail versions of video help you search for specific incidents or a specific time frame in your video. Hover over a thumbnail to enlarge it so you can see the detail in the picture. Click on a thumbnail to jump to that specific date and time in the recording. Event and Alarm Search Quickly zero in on events and alarms to expedite your investigations. You can find a variety of events – from AI-based camera analytics, to LPR and Access Control events – in just a few clicks. Conclusion: The future of secure video management Vicon’s Valerus VMS continues to revolutionize the security industry, and with STQC certification, it is now positioned to meet the highest standards of cyber-secure video surveillance. From protecting sensitive data to ensuring operational security, Valerus provides the tools and confidence that today’s security professionals need in order to face tomorrow’s challenges. With its advanced video analytics, end-to-end security features, and commitment to excellence, Valerus is more than just a video management system – it’s a game-changer in securing both physical and digital assets for organizations around the world.
Infinova India: Setting Up a New Benchmark in Security Surveillance
Infinova India has been dedicated to providing top-notch security solutions in the country since its establishment in 2010. It caters to the safety needs of various industries, including government, commercial, and service sectors, by offering high-quality products and cutting-edge technology. In addition to providing surveillance solutions, Infinova India prides itself on being a state-of-the-art integrator’s manufacturer that helps its partners with complete design and product selection for creating integrated security systems for end-customers. Infinova India’s best-in-class surveillance solutions utilize TPU integrated non Hi-silicon chipsets with Video Structuration functions built on deep learning algorithms. The cameras are designed to provide enhanced protection and stability, delivering optimal performance at all times. The cameras also come equipped with built-in smart analytics functions such as video anomaly detection, behavior analysis detection, sound detection, statistics detection, intelligent grouping recognition, and more. Infinova India has successfully deployed these cameras in several critical infrastructure projects across the country, playing a vital role in identifying and responding to emerging security risks. Advanced Technology and Easy Customization Customers can adapt the solutions provided by Infinova India to their specific requirements owing to the products’ cutting-edge technology and ease of customization. With this flexibility under offering, Infinova India is now able to meet the unique demands of a wide range of sectors, like banking, industrial, transportation, and crucial infrastructure projects like safe and smart cities. Products from Infinova India are extremely adaptable and can satisfy the changing security needs of many industries thanks to their ability to deliver customised solutions. Infinova India’s products boast cutting-edge technology and easy customization, enabling customers to tailor their solutions to meet their specific needs. This flexibility has allowed Infinova India to cater to a diverse range of sectors such as banking, industrial, transportation, and critical infrastructure projects like safe and smart cities. Infinova India’s products are highly adaptable, thus able to satisfy the evolving security requirements of various industries. Enhanced Security and Safety In addition to their adaptability, Infinova India’s products are highly secure and equipped with industry-leading certifications such BIS, ISO, IEC, UL, PESO, VAPT and others which guarantee their product robustness and effective performance. The products have undergone rigorous testing in accredited labs such as NABL and STQC/ CERTIn empaneled labs, making them highly dependable and effective at fending against security threats. Customers prefer Infinova India’s products for their secure operation, efficient video performance, and exceptional reliability, especially in critical infrastructure environments. Infinova India’s focus on innovation and advanced technology has enabled it to deliver best-in-class security solutions that meet the needs of various industries. The use of Infinova India’s products provides customers with a sense of security and peace of mind. Many of Infinova India’s Surveillance Solutions are equipped with Smart Analytics, which can be configured to provide targeted attributes and images for Big Data Analysis platforms. Customer First Infinova India’s commitment to providing adaptable and reliable security solutions has enabled it to foster strong relationships with its customers. As a manufacturer, Infinova India has full control over its materials and production process, allowing it to meet the unique needs of specific projects. This sets Infinova India apart in the competitive security solutions industry. Infinova India has been dedicatedly serving the global market by complying to all customer requirements and regulations, and offering customized solutions that meet world-class standards. Additionally, Infinova India’s products are designed with an intuitive user interface and quick installation process, making them accessible to technicians and engineers with varying levels of technical expertise. With its high level of security and personalized solutions, combined with user-friendly interfaces, Infinova India’s products can cater to the security requirements of even the most critical infrastructures. Customer support from original equipment manufacturers (OEMs) in the technology industry is typically limited, but Infinova India stands out for its exceptional support. With Infinova India, customers can easily access their team for technical assistance or any support requirements they may have. Infinova India’s engineers are highly qualified to troubleshoot Infinova as well as other systems, making them a dependable partner for their customers. Overall, Infinova India’s focus on innovation, technology, and customer satisfaction has enabled it to carve a niche for itself in the highly competitive market and cater to the growing security needs of various industries worldwide.