securitylinkindia

INTERPOL Launches App to Better Protect Cultural Heritage

An app launched by INTERPOL will help identify stolen cultural property, reduce illicit trafficking, and increase the chances of recovering stolen works and artefacts. INTERPOL’s ID-Art app enables users ranging from law enforcement to the general public to get mobile access to the INTERPOL database of stolen works of art, create an inventory of private art collections and report cultural sites potentially at risk. Using cutting-edge image-recognition software, ID-Art is free to download from the (Android or Google) Play Store and the (Apple) App Store. “In recent years we’ve witnessed the unprecedented ransack by terrorists of the cultural heritage of countries arising from armed conflict, organized looting and cultural cleansing,” said INTERPOL Secretary General Jürgen Stock, “This new tool is a significant step forward in enhancing the ability of police officers, cultural heritage professionals and the general public to protect our common heritage.” Search INTERPOL’s database Publicly available, the app will boost real-time access to INTERPOL’s stolen works of art database, the only global database containing certified police information on stolen and missing art objects. Police, customs officers, private collectors, art dealers and art enthusiasts can instantly check to see if an object is among the more than 52,000 items currently registered as stolen. Searches against the database via the app can be carried out by taking or uploading a photo, or by entering search criteria manually. Create an inventory Using international standards known as Object ID, museums and private collectors can capture images and record features of their works of art on the app to help keep track of their collections. In the event of a theft, these records can be provided to law enforcement, greatly enhancing the chances of recovery. The President of the International Council of Museums (ICOM), Alberto Garlandini said, “Heritage worldwide is at risk from natural disaster, looting or conflict. By facilitating on-the-go access to INTERPOL’s stolen works of art database, and by using ICOM’s Object ID to create cultural property inventories, INTERPOL is providing museum professionals and private citizens alike with a much needed and innovative tool to protect heritage at risk.” Report sites at risk The app allows those on the frontlines of protecting heritage to document the state of heritage sites, including historical monuments and archaeological sites. It also enables users to record the geographical location, a detailed description and images in order to capture the condition of a site. The resulting ‘site cards’ can then be used as evidence or basis for reconstruction if ever the site is looted or destroyed. “Interpol’s new ID-Art App is a major milestone in the international fight against the illicit trafficking of cultural property. Indeed it is both preventive and reactive as it allows everyone to record cultural objects and sites into the app. This has the potential to improve due diligence practices with potential buyers of cultural artefacts,” said Ernesto Ottone, UNESCO’s Assistant Director General for Culture. Early successes During the app’s pilot phase earlier this year, in Italy the Carabinieri’s unit for the protection of cultural heritage identified two stolen statues put on sale on a commercial platform thanks to the mobile application, resulting in a judicial inquiry. In addition, authorities in The Netherlands recovered two stolen paintings after the Dutch Art Crime Unit identified the paintings thanks to ID-Art, following checks on an online sales catalogue involving an Amsterdam auction house. ID-Art is available in INTERPOL’s official languages – Arabic, English, French and Spanish – and is funded by the INTERPOL Foundation for a Safer World.  

Read More
Asis SecurityLink India

Refreshed Protection of Assets (PoA) Reference Set Offers Timely Recommendations for Security Best Practice

To keep pace with the ever-evolving security industry, ASIS International released an update to the Protection of Assets (PoA) reference set. Refreshed to reflect the changing times and keep security professionals on the leading edge of best practices in the field, this collection is to assist security management directors and professionals responsible for corporate asset protection. This refreshed reference set, which was first published in 1974, constitutes recommended reading for all four of ASIS’s certifications. Teams of subject matter experts across the security continuum volunteered to write, edit, and update the PoA – including Tim Sutton, CPP, senior security consultant, Guidepost Solutions. “Since its first iteration, the PoA is and has been the ultimate reference for the security profession,” says Sutton, “I have used the PoA as an encyclopedia for security, referencing it for countless projects across all industry verticals – including healthcare, commercial real estate, education, manufacturing, and cannabis. The latest version addresses modern challenges and practices, making it now more than ever the go-to reference for the security industry.” Available individually or as a bundle, the PoA includes vital learning on the following aspects of asset protection: Business principles – including the fundamentals of security business operations, management, and leadership. Crisis management – including emergency management, business continuity, and crisis communications. Personnel – including security officer operations, employee drug testing, executive protection, and spotting problem behavior. Physical security – including design principles and practices, tools and techniques to satisfy protection objectives, and practical project management guidance. Investigations – including interviews and interrogations, undercover investigations, due diligence, preemployment background screening, evidence collection, and expert testimony. Security management – including theft and fraud prevention, security standards, loss reporting, methods, and enterprise security risk management (ESRM).  

Read More
transparency_corruption

Lack of Transparency over Vaccine Trials, Secretive Contracts and ‘Science by Press Release’ Risk Success of Global Covid-19 Response

A lack of transparency in COVID-19 vaccine trials and secrecy over deals between governments and drug companies risks the success of the global pandemic response, new research from Transparency International Global Health and the University of Toronto warns. For Whose Benefit? is an indepth study of the development and sale of the world’s top 20 COVID-19 vaccines, including those developed by AstraZeneca, Moderna and Pfizer/ BioNTech. Through detailed analysis of clinical trial data and nearly 200 contracts for vaccine sales up to March 2021, the report reveals a pattern of poor transparency and a disturbing trend of governments censoring key details of their orders from drug companies. Clinical trial transparency is the only way to monitor the safety and efficacy of vaccines and is a key safeguard against selective reporting of results or manipulation of data. Despite this, analysis of the registered clinical trials for the top vaccines reveals that results from just 45 per cent of these trials had been announced. Of this figure, 41 per cent had provided only top-level results via a press release or press conference, with the full data not made available for media scrutiny or academic review. Clinical trial protocols had been published for just 12 per cent of trials. There were no publicly accessible protocols for 88 per cent of the registered trials in our analysis and, therefore, no way of knowing the conditions under which they were carried out. Jonathan Cushing, Head of Transparency International’s Global Health Programme, said, “These results make for worrying reading and carry important implications not just for the COVID-19 response, but also for future health emergencies. The lack of transparency of many clinical trials combined with the huge financial incentives for producing effective treatments leaves the door wide open for selective reporting of results or outright data manipulation. The lack of publicly accessible data creates space for misleading and potentially dangerous half-truths, disinformation, and conspiracy the ories, which in turn contribute to vaccine hesitancy.” The research also highlights poor transparency in contracts between drug companies and governments. Of the handful of contracts that had been published, almost all include significant redactions of key information such as total price paid, price per dose and delivery schedules. Analysis of 183 contracts for 12 different COVID-19 vaccines reveals that only 7 per cent of vaccine contracts between developers and governments were published through official channels. Just one contract (0.5 per cent) was published without redactions. Most feature entire pages of redactions which obscure information of critical public interest. There are large disparities in the price paid. For the Oxford/ AstraZeneca-developed vaccine, upper-middle income economies like South Africa are paying an average of 25 per cent more per dose than high-income economies like the European Union. “Equally as disturbing is the lack of transparency over the contracts between governments and vaccine developers,” Cushing said, “Hiding contracts from public view or publishing documents filled with redacted text means we don’t know what governments have signed up to. Given the huge amounts of public money invested in research and development around the world, citizens have the right to know everything about the vaccines their taxes helped to fund.” With recent polling showing that one third of the world’s population – 1.3 billion people – are unwilling to take a coronavirus vaccine, transparency is vital to build confidence. Transparency International Global Health calls on: National governments to adopt and enforce legislation requiring the pre-registration of all clinical trials and the publication of summary results within 12 months of their completion. All governments that have bought vaccines should also follow the lead of the United States and publish their contracts. Vaccine developers to publish their clinical trial protocols on a publicly accessible registry (if they have not done so already). Developers should also only use media to announce clinical trial results in tandem with data analysis published in a peer-reviewed medical journal, trial registry or as a pre-print article.  

Read More

Everbridge Completes Acquisition of xMatters to Accelerate Digital Transformation for Enterprise IT and Cyber Resilience

Everbridge, Inc., the leading global player in critical event management (CEM), recently announced the completion of its acquisition of xMatters, a leading provider of IT Service Operations, Cybersecurity and DevOps incident response management. On April 6, 2021, Everbridge announced a definitive agreement between the parties pursuant to which Everbridge would acquire all of the outstanding equity of xMatters. Everbridge’s end-to-end CEM platform, combined with xMatters’ solutions, digitally transforms how organizations manage, respond to, and mitigate IT and cyber incidents, helping organizations protect and enable revenue while reducing expenses. CEM can be deployed rapidly on a modular basis supporting hundreds of positive RoI use cases, including for people and life safety, operations and business continuity, supply chain risk, IoT and the smart enterprise, and IT incidents and cybersecurity “xMatters’ strong position within many of the Fortune 1000 and Global 2000 adds even greater value to our CIO and C-suite customers and prospects across large enterprises. For many of these C-level decision makers, IT incident and cyber response management remains critical to protecting revenue, productivity and reputation – one of Everbridge’s fastest growing use cases,” said David Meredith, CEO of Everbridge, “xMatters’ technology will complement our successful IT alerting business, providing a natural combination to further strengthen our CEM for digital solution. Our two companies share award-winning cultures as best places to work, and we are excited to welcome the talents of the xMatters team into the Everbridge family.” “The combination of our xMatters team and technologies with Everbridge will enable us to provide our collective customers and partners with a highly-differentiated, end-to-end platform for transforming digital service resilience,” said Troy McAlpin, CEO at xMatters, “For our customers, digital business is their lifeblood and when that business is interrupted every second counts. With our acquisition now complete, we’re looking forward to further extending the power of critical event management (CEM) across an enterprise’s IT incident, digital service delivery, cyber security, and DevOps environments to help organizations ensure uninterrupted customer experiences.” With the rising challenges and opportunities associated with the Future of Work, Internet of Things (IoT), Big Data, and 5G, Everbridge’s CEM suite of software solutions digitally transforms how organizations keep their digital and physical operations running, mapping risk intelligence with the automated tools to manage the full-lifecycle of an IT disruption or services issue. Automating and streamlining how organizations manage, respond to, and mitigate a crisis, as well as protecting revenue while improving cost efficiencies, CEM represents a ‘must have’ set of standards and best practices that forward-looking CEOs and boards increasingly incorporate into how they govern operational risk from unplanned events. According to a Gartner report, it is predicted, “By 2025, 70% of CEOs will mandate a culture of organizational resilience to survive coinciding threats from COVID-19, cybercrime, severe weather events, civil unrest and political instabilities.” Another Gartner report stated, “Organizations that have been able to optimize their IT support model are able to free up resources to be reinvested into projects that advance the organization’s strategic initiatives and begin reducing their technical debt. However, organizations that are hampered by labor-intensive IT support models find themselves overwhelmed with operational activities.” Summarized Meredith, “The acquisition of xMatters represents another significant step in Everbridge’s commitment to better serve customers and create increased shareholder value. We intend to leverage our large, combined R&D teams to further innovate with data analytics and AI Ops, and to drive innovation and value for our customer base.”  

Read More

Single Bollard Stops and Destroys Simulated Bomb Truck

Delta Scientific has announced the successful testing of its Model DSC635, a single shallow foundation bollard design that stopped and destroyed a 15,000 pound test truck with less than two feet of static penetration and 6.14 feet of dynamic. The simulated bomb load remained intact on contained on the truck bed. The test vehicle weighed 15,000 pounds and was traveling over 50 miles per hour. The fronts wheels were pushed back behind the cab and the engine ended up on the passenger side of the seat. The truck was stopped and completely disabled. “Delta is proud of our long history of innovation and full scale crash testing,” states David Dickinson, CEO of Delta Scientific. The DSC635 bollard has a height of 44 inches and a diameter of 15.75 inches with a cover. Delta’s bollards can be furnished with an array of decorative covers to enhance the look and match the aesthetic of the surrounding structures. These covers include stainless steel, powder coated aluminum, and fiberglass with custom styling and painting also available. Lights, beacons and audible devices can also be added to the bollards for additional safety protocols. Delta has been manufacturing shallow foundation bollards and barricades (24 inches or less) for decades. Shallow foundation bollards are the perfect solution for sidewalks, campuses, parking structures and government/ corporate facility perimeters where underground utilities and space limitations pose a problem for traditional deep foundation bollards. Delta’s shallow foundation bollards are often used to protect building perimeters and sports stadiums as static arrays and used in conjunction with the Delta’s active bollards and vehicle barricades at entrances and exits. Delta Scientific Corporation is the leading manufacturer of vehicle access control equipment with over 260,000 square feet of production facilities in Palmdale, Calif. Delta’s three product lines consist of high-security vehicle barricade systems, parking control equipment and guard booths. Delta Scientific has been engineering and manufacturing vehicle access control equipment since 1974 and sells its products worldwide.  

Read More

Operation 30 Days at Sea 3.0 Reveals 1,600 Marine Pollution Offences Worldwide

Thousands of suspects, companies and criminal networks engaged in maritime pollution have been detected and investigated in a global INTERPOL-led operation. Operation 30 Days at Sea 3.0 (1-31 March) saw simultaneous action by 300 agencies across 67 countries resulting in an unprecedented 34,000 inspections at sea and inland waterways, coastal areas and ports to detect marine pollution violations. Frontline action followed five months of intelligence collection and analysis, enabling the identification of specific hotspots and suspects behind the criminal, deliberate pollution of the world’s waterways. Preliminary results from the operation’s tactical phase included the detection of 1,600 marine pollution offences, often triggering fines and follow-up investigations across all continents. These include: Nearly 500 illegal acts of pollution committed at sea, including oil discharges, illegal ship-breaking and sulphur emissions from vessels; 1,000 pollution offences in coastal areas and in rivers, including illegal discharges of sewage, mercury, plastics, and other contaminants, leading to serious water contamination which flows into the oceans; 130 cases of waste trafficking through ports. By using INTERPOL’s wide range of databases and analytical capabilities, countries were able to connect pollution crime with other serious offences such as fraud, corruption, tax evasion, money laundering, piracy, and illegal fishing. With surveillance down, criminals are seizing opportunities With many enforcement resources being reassigned to tackle the pandemic, criminals have been quick to exploit growing vulnerabilities in environmental security and reduced risk of detection. Authorities in Indonesia detected 65 oil spills and detained two vessels which tried to evade detection by turning off geolocation systems and concealing their national flags. A major criminal network trafficking plastic waste between Europe and Asia was exposed, triggering cooperation between authorities from both regions. So far, 22 suspects have been arrested and thousands of tonnes of waste have been prevented from being illegally shipped to Asia, where it would have likely been dumped, contaminating soils and generating considerable marine litter. Several countries from Europe, Asia and Africa reported illegal shipments of contaminated or mixed metal waste falsely declared as metal scraps. In one case, the Italian Coast Guard seized and prevented 11,000 tonnes of metal scraps mixed with plastic, rubber, mineral oil and other contaminants from being loaded onto bulk carriers headed for Turkey. Namibia, the Philippines and Croatia also reported cases of illegal waste shipments from Europe. Growing trends included COVID-19 disposable items such as masks and gloves, with 13 cases involving medical waste opened as a result of the operation. With the value of gold on the rise, agencies across Africa, Central and South America worked to track illegal mining, which often results in devastating contamination due to mercury discharges. INTERPOL Secretary General Jürgen Stock said, “The threat of pollution crime is constantly evolving, endangering the air we breathe, our water and soil. Although this is the third edition of 30 Days at Sea, it is never the same exercise. “It is thanks to a global yet agile network that we have seen the number of inspections more than double since the first edition – a clear sign that the international community will not stand for criminal attacks on our environment.” INTERPOL will assist member countries in their follow-up operations and intelligence analysis with support from its Pollution Crime Working Group. Joining forces for greater impact With INTERPOL’s Environmental Security Programme coordinating the operation globally, Europol and FRONTEX (European Border and Coast Guard Agency) provided crucial support by coordinating the European leg of 30 Days at Sea 3.0, as part of the EMPACT action plan on environmental crime. Europol’s Executive Director Catherine De Bolle said, “Marine pollution is a serious threat, which endangers not only the environment but our health and in the long run our global economy. Criminals do not care about the environment; they do not think of tomorrow, but only of increasing their profits on the back of our society. Consolidated law enforcement efforts such as 30 Days at Sea are critical to tackle these borderless crimes and protect our environmental heritage for generations to come.” “Environmental crime is one of many criminal activities Frontex targets as part of our mission as the European Border and Coast Guard Agency. This is our contribution to the protection of the environment. I’m proud that, as part of 30 Days at Sea, Frontex aerial and maritime assets monitored nearly 1 000 vessels,” said Frontex Executive Director Fabrice Leggeri. All three editions of Operation 30 Days at Sea have been carried out with funding from the Norwegian Agency for Development Cooperation (Norad). Participating countries Participating countries include Angola, Argentina, Australia, Bangladesh, Benin, Bolivia, Bosnia and Herzegovina, Brazil, Bulgaria, Cameroon, Canada, Chile, China, Cote d’Ivoire, Croatia, Cyprus, Democratic Republic of Congo, Ecuador, Ethiopia, Fiji, Finland, France, Georgia, Germany, Ghana, Greece, Guatemala, Guinea Bissau, Honduras, India, Indonesia, Ireland, Israel, Italy, Kenya, Kuwait, Latvia, Liberia, Malaysia, Maldives, Malta, Namibia, Netherlands, Nigeria, Norway, Peru, Philippines, Poland, Portugal, Qatar, Republic of Korea, Romania, Russia, Saudi Arabia, Senegal, South Africa, Spain, Sweden, Tanzania, Thailand, Timor Leste, Ukraine, United Kingdom, United States, Uruguay, Vietnam, Zimbabwe.  

Read More

NIST Offers Tools to Help Defend Against State-Sponsored Hackers

Nations around the world are adding cyber warfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called the ‘advanced persistent threat,’ or APT, because they possess the tools and resources to pursue their objectives repeatedly over an extended period, adapting to defenders’ efforts to resist them. Vulnerable data includes the sensitive but unclassified information managed by government, industry and academia in support of various federal programs. Now, a finalized publication from the National Institute of Standards and Technology (NIST) provides guidance to protect such ‘controlled unclassified information’ (CUI) from the APT. NIST’s Special Publication (SP) 800-172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST SP 800-171, offers a set of tools designed to counter the efforts of state-sponsored hackers and complements another NIST publication aimed at protecting CUI. “Cyberattacks are conducted with silent weapons, and in some situations those weapons are undetectable,” said Ron Ross, a Computer Scientist and a NIST Fellow, “Because you may not ‘feel’ the direct effects of the next hack yet, you may think it is coming someday down the road; but in reality, it’s happening right now.” The federal government relies heavily on nonfederal service providers to help carry out a wide range of missions using information systems – a term that includes computers, but also a range of other specialized technologies such as industrial control systems and the Internet of Things. The protection of sensitive federal information that resides in nonfederal systems – such as those used by state and local governments, colleges and universities, and independent research organizations – is of paramount importance, as it can directly impact the federal government’s ability to carry out its operations. A hack in 2018 that compromised sensitive information directly inspired the NIST team’s work on SP 800-172. Formerly numbered SP 800-171B during its draft stages, SP 800-172 offers additional recommendations for handling CUI in situations where that information runs a higher than usual risk of exposure. CUI includes a wide variety of information types, from individuals’ names or social security numbers to critical defense information. “We developed SP 800-171 in response to major cyberattacks on U.S. critical infrastructure, and its companion document SP 800-172 is designed to mitigate attacks from advanced cyber threats such as the APT,” Ross said, “Implementing the cyber safeguards in SP 800-172 will help system owners protect what state-level hackers have considered to be particularly high-value targets – sensitive information about people, technologies, innovation and intellectual property, the revelation of which could compromise our economy and national security.” The enhanced security requirements are to be implemented in addition to those in SP 800-171, since that publication is not designed to address the APT. The requirements in SP 800-172 apply to the components of nonfederal systems that process, store or transmit CUI or that provide protection for such components. To further narrow the scope, the requirements are applied only when the designated CUI is associated with a critical program or high-value asset – the highest priority for protection. Developed primarily for administrators such as program managers, CIOs and system auditors, the publication addresses the protection of CUI for system components by promoting penetration-resistant architecture, damage-limiting operations, and designs to achieve cyber resiliency and survivability. Its tools, divided into 14 families, are not intended to be implemented en masse, but selected according to the needs of the organization. “Most likely an organization implementing this guidance will not want to use all of the enhanced security requirements we offer here,” Ross said, “The decision to select a particular set of enhanced security requirements will be based on your mission and business needs – and then guided and informed by ongoing risk assessments.” In response to feedback received during the public comment period, the final draft includes updated scoping and applicability guidance and a more flexible requirements selection approach to allow organizations to customize their security solutions. Ross said that the tools in the new publication should offer hope to anyone seeking to defend against hacks, even by as intimidating a threat as the APT. “The adversaries are bringing their ‘A-game’ in these cyberattacks 24 hours a day, 7 days a week,” he said, “You can start making sure the damage is minimized if you use SP 800-172’s cyber safeguards.”  

Read More

Eagle Eye Networks and Sitasys Introduce First of its Kind Automated Alarm Handling for Operation Centers

Eagle Eye Networks, a leading global player in cloud video surveillance, and Sitasys, the leading cloud alarm management platform have now integrated the Eagle Eye Cloud VMS and its analytics functionality into the evalink alarm monitoring platform allowing service operations centers to more efficiently and effectively manage an unlimited number of cameras without additional human resources. This development builds on the existing partnership between Sitasys and Eagle Eye Networks to create an enhanced security monitoring platform by implementing a cloud-to-cloud integration of video surveillance and alarm monitoring. This integration allows users to immediately connect Eagle Eye Networks VMS into the revolutionary cloud based evalink alarm management platform from Sitasys. Sitasys used Eagle Eye Networks RESTful API platform and Big Data Video Framework™ to rapidly develop and deliver a unique cyber secured integration between its alarm management evalink platform and the Eagle Eye Networks cloud-based video surveillance platform. The integrated system allows users to connect video analytics with smart workflows to automate operational processes. In addition, the user can index, search, retrieve, and analyze video based on alarms from the Sitasys system. The integration and verification process saves time, reduces operations to a minimum, and prevents unnecessary intervention costs. “Our true cloud environment, open platform and advances analytics are not only changing the video surveillance industry, but cloud-to-cloud integration with partners like Sitasys is extending the capabilities of the alarm monitoring industry creating a safer, more secure environment and providing business intelligence than can improve operations,” said Rishi Lodhia, Managing Director, Eagle Eye Networks in EMEA, “This form of automated monitoring is a first in the industry and will give businesses the opportunity to outsource their video monitoring at a lower cost with better accuracy creating benefits for everyone involved. This is an example of how AI can optimize the whole value chain within the security industry. We’re proud to join with Sitasys in pushing the boundaries of technology and client experience.” Working closely together the engineering teams at Eagle Eye Networks and Sitasys completed development and quality assurance in two weeks. The functionality meets an often requested need for service operation centres that want to scale their business, add additional remote monitoring services and manage more cameras without adding additional resources. “With evalink, we help companies automate processes and create additional value for their customers,” added Peter Monte, CEO and Founder of Sitasys AG, “Seamless integration of true cloud systems results in a fantastic ecosystem with best-in-class experiences and services for its users. The integration with a cloud video surveillance partner was something we didn’t have, and we were keen on creating this to show how simple and intuitive systems can be embedded nowadays, while adding exceptional value to the client.”  

Read More

3xLOGIC Launches the VIGIL Video Solutions in EMEA to Help Organisations Leverage Detailed Data Insights

3xLOGIC, the leading provider of server and cloud-based technology, is launching its VIGIL suite of video solutions across the UK, Europe, the Middle East and Africa (EMEA). The ecosystem, comprising software and hardware such as cameras, recorders, thermal imagers, people counters, and accessories, is designed to provide a scalable security solution that’s tailored to every business need. Business leaders have increasing amounts of data available to analyse, with the total amount of data in the world forecast to reach 59 zettabytes in 2020. The 3xLOGIC ecosystem taps into this, by capturing and analysing these ‘big data’ elements and combining disparate data sets. This helps business leaders to optimise their operations, find efficiencies, secure their buildings and assets, and solve problems they never knew they had. The video suite additionally integrates with security systems, point of sale systems, alarm management platforms, and cloud-based management systems to make security management easier and more efficient. Bill Hobbs, Vice President of Global Sales at 3xLOGIC said, “For over 15 years, 3xLOGIC has been proud to be at the forefront of server and cloud-based technology. The launch of the VIGIL video suite is the next step in this, helping business leaders make data-driven, informed decisions across their supply chains, their sites, their buildings, and people. With VIGIL, leaders don’t just get a single security system, access control, or video management system – they get an ecosystem that’s bespoke to their needs and goals.” To help 3xLOGIC dealers and integrators understand the capabilities of the various solutions in the VIGIL suite, 3xLOGIC is delivering a range of webinars in November and December. These provide an overview of the real-world benefits that VIGIL hardware and software brings to them and their clients, and address topics such as cameras, accessories and mounts, recording appliances and VIGIL’s software options. The webinars conclude with a session that shows how installers can become a 3xLOGIC value added reseller (VAR).  

Read More

March Networks’ End-toEnd Video Solution Earns Approval From Dubai’s SIRA

March Networks®, a global video security and video-based business intelligence provider, has announced that its products have obtained approval from Dubai’s Security Industry Regulatory Agency (SIRA). SIRA is a regulatory body that governs best practices in security systems and services in Dubai (UAE). Its Security Equipment Approval certificates help businesses in the UAE determine which products meet its rigorous standards. By obtaining SIRA approval on its Command Enterprise video management system and recording platform, along with a wide range of its IP cameras, March Networks can now offer a complete, SIRA-approved end-to-end video surveillance solution for Dubai and the UAE. “We are very pleased to achieve SIRA compliance,” said Trevor Sinden, March Networks Vice President, Middle East & Africa, “March Networks has always offered secure, highly reliable video surveillance products; this approval further solidifies our commitment to compliance with government and central bank regulations across the Middle East. We look forward to the new business opportunities this approval will create.” March Networks is headquartered in Ottawa, Ontario, Canada, and has regional offices around the world, including in Dubai. Its IP video surveillance and business intelligence solutions are used by more than 600 financial institutions and 300 retail brands.  

Read More