securitylinkindia

Honeywell Suite of Building Integration and Cyber Solutions Help Improve Efficiency, Data Analysis and Control

Honeywell has recently introduced the next generation of Enterprise Building Integration (EBI), Command and Control Suite (CCS), and Digital Video Manager (DVM), a suite of solutions enabled by the Honeywell Forge for Buildings platform, that help drive facility efficiency and oversight, streamline complex functions, and deliver savings across an enterprise. A key component to making this all work is keeping facilities and occupants safe. Along with EBI, CCS and DVM, Honeywell has launched a portfolio of enhanced cybersecurity solutions to help companies protect against the rising risk of unexpected attacks on data, network systems and buildings infrastructure. “For buildings to be smarter, more efficient and effective, an operating system must be in place that works to constantly improve resource management,” said Mark Verheyden, President, Honeywell Building Solutions, “These systems help keep people safe and secure, enhance the building experience, and protect the data and processes that drive operations. The overall health of the building ecosystem can impact business success – just like great talent and experience. Our building operation teams help customers address building use and critical infrastructure challenges.” These technologies leverage IoT connectivity, interoperable systems and data sharing, and adaptive workflows to help transform inputs and information into actionable outcomes. Key enhancements include: EBI R600: The Honeywell building management system that helps connect, monitor and manage core building functions from comfort to security to safety and can help reduce upfront capital costs. The open IoT platform integrates with numerous third-party systems and equipment as well as cloud and mobile applications. With more than 23 years of market implementation, EBI has more than 150 million IoT connections in buildings worldwide. DVM R700: An enhanced digital surveillance system that delivers a detailed view of operations and enterprise-wide integrated protection. Improved camera servers enhance views and reduce storage needs and hardware costs. CCS R300: Facility visualization application with intuitive interface that brings performance data to building personnel through enhanced map navigation and editing capabilities. EBI600, DVM700 and CCS300 integrate with Honeywell Forge for Buildings, an enhanced category of software developed by Honeywell called Enterprise Performance Management. Honeywell Forge for Buildings is an integrated platform that connects operational data from assets, processes, third-party applications and people with machine learning to help customers improve their building performance and enhance performance and productivity with actionable insights. “Commercial building and critical infrastructure customers are often driving toward similar facility outcomes – streamlined operations, reduced costs, improved safety and security,” said Verheyden, “Efforts to reach these goals are markedly different for a hospital or an airport, for example. Within our enhanced integrated platform of offerings, operations teams can tailor services to help meet specific needs through new multi-windows and interactive options that are just a fingertip away.” Information technology (IT) often receives the most attention when it comes to safeguarding the integrity of data and assets. Operational technology (OT) systems that monitor, control and protect processes, equipment and operational environments – can be another entry point, and often needs similar or more care in today’s ever-connected technology landscape. Honeywell is extending its cybersecurity services and products for the buildings OT environment to enable customers to better protect their assets and people. The Honeywell Forge cybersecurity solutions include: Cybersecurity assessment – A professional review of buildings OT systems using industry best practices to identify potential vulnerabilities or gaps. A detailed report is developed to establish a cyber-status baseline and a prioritized action list. Secure design and configuration: Design or modify existing OT infrastructure to enhance the physical, network and application layers, and help reduce risk and mitigate unexpected costs. Cybersecurity appliances and software: The installation and maintenance of cybersecurity hardware and software including firewalls, secure media exchange (SMX), advanced end-point security, and backup/ restore appliances, to help monitor and protect OT systems. Cybersecurity monitoring and remote management: Enables monitoring of OT systems and push alerts regarding performance or security issues. This can be extended to include remote management services, as well as Honeywell’s 24/7 security operation centre (SoC) monitoring. Incident readiness and advisory: Establishes incident response processes that enable more efficient containment, triage and resolution to regain normal business operations in the event of an incident. “Increasing connectivity to OT systems typically enhances security, promoting visibility and allowing previously unidentified security issues to be more efficiently realized. It is a more proactive approach to monitoring and maintaining the systems to be undertaken – the days of leaving OT systems unmanaged, unpatched and unmonitored are over,” said David Trice, Vice President and General Manager, Honeywell Connected Enterprise, Buildings.  

Read More

Hikvision Achieves ISO 28000:2007

Hikvision, the world’s leading supplier of innovative security products and solutions, has announced its ISO 28000:2007 certification, marking further strengthening of the company’s supply chain security assurance. The ISO 28000 standard was developed to satisfy the needs of enterprises for the standardization of supply chain security management with the goal of improving overall performance of the supply chain. The standard is based on the plan-do-check-action (PDCA) operating model to identify risks, carry out controls, and reduce risks to address potential security threats in the supply chain. Hikvision has established a supply chain security management system which covers customer demand, design and development, manufacturing, service delivery, and transportation management processes – with focus on capital security, financial security, logistics security, manufacturing security, personnel safety and site security. The company will continue its focus on enhancement of its supply chain management practice to further increase product quality, customer satisfaction, sustainability and social value.  

Read More

Detected Foreign Terrorist Fighters During Maritime Border Operation

A maritime border operation coordinated by INTERPOL has detected more than a dozen suspected foreign terrorist fighters (FTFs) travelling across the Mediterranean. Operation Neptune II (24 July – 8 September 2019) focused on the threats posed by suspected FTFs potentially using maritime routes between North Africa and Southern Europe during the busy summer tourist season. Supported by an INTERPOL team on the ground, the intelligence-led operation also targeted criminal networks involved in human trafficking, people smuggling, firearms trafficking and the drugs trade. Officials at seven seaports in the six participating countries – Algeria, France, Italy, Morocco, Spain and Tunisia – carried out more than 1.2 million searches across INTERPOL’s databases for stolen and lost travel documents, nominal data and stolen vehicles via its I-24/7 secure global police communications network. These resulted in 31 active investigative leads, with more than 12 of these linked to the movement of terror suspects. “When information is shared between regions via INTERPOL’s networks at the global level, every check, border control or random search is a potential break in a terror investigation,” said INTERPOL Secretary General Jürgen Stock. “This is how INTERPOL acts as a global tripwire by disrupting the movement of individuals linked to criminal and terrorist activities,” added the INTERPOL Chief. As recognized by UN Security Council Resolution 2178 (2014), sharing information through INTERPOL’s global systems is vital to better identify and prevent the travel of suspected foreign terrorist fighters. In this respect, INTERPOL’s databases currently hold details of more than 50,000 foreign terrorist fighters and some 400,000 pieces of terrorist-related information. The operation further highlighted the role of international, regional and national inter-agency cooperation in enhancing security, with experts from the European Border and Coast Guard Agency (Frontex) and the World Customs Organization (WCO) also participating in the initiative.  

Read More

Identiv Strengthens Medical Device Authentication and Anti-Counterfeiting in the IoT

Identiv, Inc. and Schreiner Group GmbH & Co. KG have recently entered into a multi-year agreement for the delivery of Identiv’s RFID Inlays for device-level authentication and anti-counterfeiting of one-time-use medical devices in hospitals. Currently contracted to strengthen secure authentication in the Internet of Things (IoT) over the next three years, several million inlays from Identiv’s radio-frequency identification (RFID) portfolio will be connected to high-tech labels and attached to one-time-use medical devices in hospitals throughout Europe. Identiv’s RFID Inlays will provide contactless identification of the devices, optimizing processes during medical procedures (i.e., checking for compatibility between different types of equipment) and protecting patients’ health and safety from counterfeiting. “Identiv is proud that our highly secure RFID Inlays were the right fit for this project, strengthening our long-term partnership with Schreiner Group,” said Dr. Manfred Mueller, Identiv COO and GenIdentiv Strengthens Medical Device Authentication and Anti-Counterfeiting in the IoT With Multi-Year Project Awarded by Schreiner Group for Secure RFID Inlays eral Manager Identity, “We see device-level authentication and anti-counterfeiting applications gaining further importance throughout the IoT, not just in the medical field. Customers looking to protect people and products are our priority at Identiv.” Meeting the highest industry standards in the challenging healthcare market, Identiv’s dry 32×15 mm RFID Inlays feature Infineon SRF55V02P chips, aiming to provide the best possible treatment for patients. Once the three-year contract is fulfilled, there will be discussion to expand the business. “At Schreiner Group, it’s our mission to benefit our customers by delivering intelligent solutions that optimize processes and enhance product safety,” said Manfred Laschinger, Schreiner Group GmbH Head of Corporate Purchasing, “Our customers are challenging us to meet the highest standards in terms of quality, reliability and service, and we are pleased to continue working with Identiv to deliver just this.” Identiv’s comprehensive RFID, NFC and inlay transponder portfolio brings smart identities and security to the IoT. Identiv’s innovative high-frequency (HF) and ultra-high frequency (UHF) 13.56 MHz RFID Inlays are completely customizable, are available as dry or wet, and come in various shapes and sizes. The inlays can feature multiple designs integrating various materials, chip technologies, and frequencies for metal and non-metal environments. Identiv produces inlays using advanced flip-chip technology and state-of-the-art high-volume die-bonding processes with integrated in line quality and process control to guarantee superior quality performance. In addition to healthcare and the IoT, Identiv’s RFID Inlay portfolio can benefit near field communication (NFC) smart posters and billboards, libraries, event and transportation ticketing, automotive and chemical industries, logistics and supply chain, asset management, pharmaceuticals, electronic games, event management, wearable technology, customer loyalty programs, and more.  

Read More

Enterprises are Leaving IoT Devices Vulnerable to Cybersecurity Threats

IoT is one of the fastest growing trends in technology today, yet enterprises are leaving themselves vulnerable to dangerous cyberattacks by failing to prioritize PKI security, according to a new research from nCipher Security, an Entrust Datacard company. The 2019 Global PKI and IoT Trends Study, conducted by the Ponemon Institute and sponsored by nCipher Security, is based on the feedback from more than 1,800 IT security practitioners in 14 countries/ regions. The study found that IoT is the fastest-growing trend driving public key infrastructure (PKI) application deployment – with 20% growth over the past five years. Respondents cited concerns about several IoT security threats including altering the function of IoT devices through malware or other attacks (68%), and remote control of a device by an unauthorized user (54%). However, respondents rated delivering patches and updates to IoT devices, the capability that protects against that top threat, last on a list of the five most important IoT security capabilities. The study also found that in the next two years an average of 42% of IoT devices will rely primarily on digital certificates for identification and authentication. But encryption for IoT devices, and for IoT platforms and IoT data repositories, is at just 28% and 25% respectively, according to nCipher’s 2019 Global Encryption Trends Study. “The scale of IoT vulnerability is staggering – IDC recently forecasted that there will be 41.6B connected IoT devices by 2025, generating 79.4 zettabytes of data,” said John Grimm, Senior Director of Strategy and Business Development at nCipher Security, “There is no point in collecting and analyzing IoT-generated data, and making business decisions based upon it, if we cannot trust the security of devices or their data. Building trust starts with prioritizing security practices that counter the top IoT threats, and ensuring authenticity and integrity throughout the IoT ecosystem.” PKI plays a strategic role, but organizations are leaving themselves vulnerable and unprepared PKI is at the core of the IT infrastructure for many organizations, enabling security for critical digital initiatives such as cloud, mobile device deployment, and IoT. Most respondents use PKI extensively in their organizations for SSL/TLS certificates (79%), private networks and VPNs (69%), and public cloud-based applications and services (55%). Yet more than half (56%) believe PKI is incapable of supporting new applications. In addition, many respondents see significant technical and organizational barriers to PKI usage including an inability to change legacy applications (46%), insufficient skills (45%), and resources (38%). Enterprise PKI security best practices a mixed bag Nearly a third (30%) of organizations – an especially jarring share considering the implications – are not using any certificate revocation techniques. More than two-thirds (68%) cite ‘no clear ownership’ as their top PKI challenge. But, some enterprises are applying more rigor to PKI security in certain areas. The share of respondents using ‘password only’ for certificate authority administrators has dropped 6% from 2018 to 24% this year, and 42% of respondents said that they are using hardware security modules (HSMs) to manage private keys. Other key findings from the report: HSM use as an IoT root of trust jumped significantly over 2018 (from 10% to 22%). Despite a growing number of options for PKI deployment (cloud, managed and hosted), internal corporate certificate authorities (CAs) remain the most popular and have grown 19% over the past five years to 63% – with 80% of financial services organizations favoring this option. Forty-four percent of respondents believe PKI deployments for IoT devices will consist of a combination of cloud-based and enterprise-based implementations. The most important PKI capabilities for IoT in 2019 are scalability to millions of certificates (46%) and online certificate revocation (37%). “PKI use is evolving as organizations address digital transformation across their enterprises. In addition to IoT, more than 40% of our respondents also cited cloud and mobile initiatives as driving PKI use,” said Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, “Clearly, the rapid growth of the IoT is having a huge impact on the use of PKI, as organizations realize that PKI provides core authentication technology for connected devices. For organizations to gain full advantage of their digital initiatives, they must continue to improve the security maturity of their PKIs.”  

Read More

Halma Reveals New Brand with a Redesigned Global Website

Halma plc, a global group of life-saving technology companies, has recently launched its new corporate brand, redesigned logo and global website. “Halma’s purpose and growth strategy are dependent on us partnering with others who want to solve the same problems that we do, whether that’s researchers, charities, talent, investors or corporates. Our new brand is designed to help us achieve this, and we hope it will act as a beacon for other innovative, purpose-led organisations and people who’d like to help us in growing a safer, cleaner, healthier future for everyone, every day,” said Jennifer Ward, Halma’s Group Talent and Communications Director. Halma partnered with design consultancy, Pentagram, to create a modern brand that reflects Halma’s purpose. The FTSE 100 global group also worked with digital communications agency, Investis Digital, to deliver a website that celebrates the unique combination of purpose, strategy, culture and a business model that differentiates Halma from its peers. The new website provides a platform to showcase Halma’s over 40 companies and their impact on the world.  

Read More

Key Industry Players Establish FiRa Consortium

(ASSA ABLOY Group, HID, NXP, Samsung, Bosch, Sony, LitePoint & TTA) Recognizing the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, Bosch – have recently launched the FiRa Consortium, which ensures an interoperable UWB ecosystem across chipset, device and service infrastructure through standards and certifications. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases for fine ranging capabilities can thrive, ultimately setting a new standard in seamless user experiences. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join this newly formed organization. The FiRa name, which stands for ‘fine ranging,’ highlights UWB technology’s unique ability to deliver unprecedented accuracy when measuring the distance or determining the relative position of a target. Especially in challenging environments, UWB technology outperforms other technologies in terms of accuracy, power consumption, robustness in RF connection and security by a wide margin. “As an industry consortium, we believe UWB technology can transform the way people experience connectivity, and we’re committed to the widespread adoption of interoperable UWB technologies,” says Charlie Zhang, Chair of the FiRa Consortium and VP Engineering, Samsung Electronics. The starting point for UWB technology is the IEEE standard 802.15.4/ 4z, which defines the essential characteristics for low-data-rate wireless connectivity and enhanced ranging. It is the aim of the FiRa Consortium to build on what the IEEE has already established, by developing an interoperability standard based on the IEEE’s profiled features defining mechanisms that are out of scope of the IEEE standard, and pursuing activities that support rapid development of specific use cases. The unique capabilities of UWB promise to make it an essential technology in many areas including: Seamless access control – UWB can identify an individual’s approach toward or away from a secured entrance, verify security credentials, and let the authorized individual pass through the entrance without physically presenting the credential. Location-based services – UWB offers highly precise positioning, even in congested multipath signal environments, making it easier to navigate large venues such as airports and shopping malls or find a car in a multi-story parking garage. It also enables targeted digital marketing campaigns and foot traffic data. Retailers can present customized offers, government agencies can tailor their notifications, and entertainment venues can personalize recommendations during events. Device-to-device (peer-to-peer) services – By providing precise relative distance and direction between two devices, UWB lets devices find the relative location of each other even without infrastructures such as anchors or access points. This allows people to easily find one another in crowded spaces or find items even when placed in hidden areas. Due to its low power spectral density, UWB offers little to no interference with other wireless standards, so it is well suited for use with other wireless technologies including near field communication (NFC), bluetooth and Wi-Fi. There are also adjacent markets that leverage UWB in other ways, especially automotive. “The FiRa Consortium’s commitment to a complete ecosystem means we will work with other consortia and industry players to develop approaches and define parameters,” said Charles Dachs, Vice-Chair of the FiRa Consortium and GM & VP, Secure Embedded Transactions, NXP Semiconductors. FiRa Consortium members will have the chance to influence industry trends, gain early access to technical details, certify interoperable products, expand the UWB ecosystem, and share expertise. Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global said, “We encourage anyone, from any relevant industry area, who has a vested interest in the success of UWB to join us and contribute to the Consortium’s work.”   

Read More

HID Global’s Multispectral Fingerprint Technology Receives Second Perfect Score in Global Fake-Finger Compliance Tests

Asecond member of HID family of Lumidigm® multispectral imaging solutions has achieved a perfect score in the world’s only International Standards Organization (ISO) standard that focuses on anti-spoofing and liveness detection. The company’s latest certification to the ISO/ IEC 30107-3 presentation attack detection (PAD) standard to level 1 further validates HID Global Lumidigm sensors’ ability to authenticate only a real, living person and not a plastic fake or other artificial copy, helping eliminate fraud. “HID’s proven V-series multispectral technology was the first fingerprint product to receive a perfect score in the most stringent certification test in the world, and now we have extended that certification to our M-series devices,” said Michael Chaudoin, Vice President of Product Marketing, Extended Access Technologies Business Area with HID Global, “This is the most important certification for those needing independent validation that their biometric solution meets a very specific set of liveness detection standards with the lowest tolerance for failures.” Now compliant to the ISO/ IEC 30107-3 level 1 standard, HID Global’s Lumidigm M-series sensors join the company’s V-series sensors to give users the confidence of standards validated spoof protection for a broad range of biometric authentication applications. The flagship Lumidigm V-series sensors were the first in the industry to be compliant to the rigid ISO PAD standard. The sensors have been proven in large scale banking applications such as ATM deployments and employee network access, that depend on data encryption and tamper resistance capabilities to protect sensitive data and cryptography keys, which helps eliminate fraud. The M-series sensors provide a risk-appropriate option for time-and-attendance, single sign on, physical access control and other applications that don’t require the V-series sensors’ full range of advanced features, but still benefit from strong liveness protection. In addition to delivering NIST-compliant liveness detection, the Lumidigm sensors’ multispectral imaging technology provides the most reliable capture performance available in harsh real world environmental conditions, and when fingers are wet, dry or damaged. Both sensors detected 100 percent of spoof attempts while correctly authenticating all legitimate users in tests administered by iBeta Quality Assurance, and certified by the National Institute of Standards and Technology (NIST) National Voluntary Laboratory Accreditation Program (NVLAP). Each of the Lumidigm sensors use the company’s patented multi-spectral fingerprint imaging technology to capture unique characteristics from the surface and subsurface of the finger that are analyzed to confirm it is legitimate and from a live person. HID Global’s Lumidigm sensors are part of the company’s expanding biometrics portfolio that addresses a broad range of authentication use cases and vertical markets. Additional biometrics offerings include: HID® Digital Persona® optical fingerprint readers designed for point-of-sale, retail and desktop applications as well as for users requiring certification to FIPS 201/PIV and FBI Mobile ID FAP 30 standards. HID TouchChip® fingerprint modules and readers include the FIPS 201/ PIV and India STQC-certified TouchChip TCS1 devices that are ideal for ID verification in civil ID and entitlement programs, electronic prescriptions of controlled substances (EPCS) in healthcare, mobile ID terminals and mobile point of sale systems.  

Read More

Allegion UK Steps up to the Challenge, Raising Awareness for Fire Safety

Allegion UK, a leading specialist in fire safety and security products and solutions, recently took an impressive 500,000 steps towards raising £500 in aid of Fire Door Safety Week (FDSW) and The Fire Fighters Charity. Using two treadmills, 35 employees from the Allegion UK team worked as one to take part in their corporate challenge to walk, run, jog or dance 500,000 steps in four days. During the challenge, the team joined forces with the West Midlands Fire Service (WMFS), who visited the Allegion offices in Aston, Birmingham, to help them achieve their ambitious goal. James Marriott, Station Commander from WMFS said, “We had a fantastic time supporting Allegion UK and thank the staff who took part in this challenge. I’m certain that the funds raised for the charity will make a significant difference to fire fighters and their families who are going through difficult times. “With our mission being to ‘make the West Midlands safer, stronger and healthier’ and Allegion’s purpose of ‘creating peace of mind by pioneering safety and security,’ I am in no doubt that we will continue to work together to promote fire safety.’’ Pete Hancox, Commercial Leader UK & Ireland, celebrated the combined efforts and said, “In current circumstances, it is more important than ever to make people aware of fire safety. Each year our team makes a huge effort in raising awareness – this year was no different. “It was also brilliant to welcome the fire service to help us reach our target. Each step taken truly did count towards us raising money for such a worthy cause.’’ FDSW (23-29 September 2019), run by British Woodworking Federation (BWF) and the BWF Fire Door Alliance, aims to increase public understanding of the fundamental role fire doors play in protecting life and property. This year’s campaign explores the crucial role fire doors have in protecting us when we are asleep, with a particular focus on specialised housing and HMOs (house in multiple occupation). Last year, the campaign reached a new high, gaining support from more than 350 individuals, organisations and businesses.  

Read More

ASIS International Releases New ESRM Guideline

ASIS International released its Enterprise Security Risk Management (ESRM) Guideline, which takes a different approach to traditional security. The new guideline is the first strategic security management tool of its kind, elevating the security function by estab lishing a partnership between security professionals and business leaders to manage security risks. The objective of ESRM is to identify, evaluate, and mitigate the likelihood and/ or impact of security risks to the organization with priority given to protective activities that help enable the organization to advance its overall mission. ESRM positions the security professional as a trusted advisor to help guide asset owners through the process of making security risk management decisions. “We’re very proud to provide this foundational tool to ASIS members – and the security industry at-large – to help guide them through adoption of ESRM within their organizations,” said David R. Feeney, CPP, PMP, Chairman of the ASIS ESRM Guideline Technical Committee. ESRM recommends that security professionals maintain an understanding of the organization’s overall strategy including its mission and vision, core values, operating environment, and stakeholders. Understanding this context will enable security professionals to effectively support and align with the organization’s strategic goals. The new guideline further outlines how the ESRM Cycle is built on a foundation of transparency, governance, partnership with stakeholders, and holistic risk management. By continually repeating the ESRM cycle, security professionals can bring ESRM practice to maturity and maintain high performance over time. “We remain committed to the global development of ESRM, and the release of our ESRM Guideline demonstrates the ASIS Board of Director’s ongoing support to formalize ESRM globally,” said Tim McCreight, ASIS Global Board Sponsor of the ESRM Initiative.  

Read More