Category: National
Recfaces ACS Product Id-Gate is Certified By Genetec
RecFaces, a leading developer of ready-made Facial Recognition software, is proud to announce the seamless integration of its cutting-edge facial biometric solution, Id-Gate, with Genetec Security Centre. This collaboration brings a new level of security, efficiency, and automation to access control and identity verification. Id-Gate is a ready-made facial recognition software solution designed to enhance access control systems. It fully supports the GDPR compliance and can easily be synchronized across Access Control System (ACS) from various technology partners. Id-Gate’s integration with the Genetec Security Centre provides a more powerful and reliable biometric authentication system without disrupting existing workflows. It provides bi-directional profile synchronization, ensuring real-time updates and eliminating manual data entry, so changes in Id-Gate are immediately reflected in Genetec system. The system facilitates real-time access control by instantly verifying identities and making intelligent decisions based on security protocols and facial recognition results. With customizable alerts for specific access attempts, enhancing proactive security measures. Additionally, the integration enables advanced reporting and activity logs for compliance and incident investigations, supports multi- factor authentication to strengthen security, and maintains offline functionality to ensure uninterrupted access during network outages, automatically syncing data once connectivity is restored. “With the integration of Id-Gate into Genetec Security Centre, we are reinforcing our commitment to providing secure, efficient, and automated biometric solutions,” said Tamara Morozova, CEO, RecFaces, “This collaboration not only streamlines access control but also empowers security teams with real-time monitoring and advanced authentication capabilities.” “Partnering with Genetec allows us to enhance our Id-Gate offering, ensuring that organizations benefit from an advanced, automated security framework,” said Farida Baichora, Head-Training & Development, RecFaces. RecFaces’ Id-Gate is designed to meet the evolving security needs of organizations across industries, from corporate enterprises to critical infrastructure and public venues. The software operates with top-tier biometric algorithms, ensuring accurate and swift identity verification. RecFaces invites security professionals, system integrators, and industry leaders to explore the benefits of this integration. RecFaces is one of the leaders in developing ready-to-use software products with facial recognition functions. RecFaces develops off-theshelf solutions that help to quickly increase the efficiency of VMS, ACS, as well as ERP, CRM, and time tracking systems. RecFaces’ solutions are based on a highly accurate facial recognition algorithm. RecFaces has a range of ready-made integrations with leading security system products, which helps to quickly deploy solutions on any customer equipment. Our software allows businesses to quickly, securely, and accurately identify and verify the identity of employees, customers, and visitors. The quality of RecFaces’ off-the-shelf solutions is confirmed by numerous installations worldwide, including the MENA, APAC, and LATAM regions. Together with our global partners, we provide solutions for security, finance, transportation, retail, and other industries, providing free demo versions and training on company products. Read More
Radware Launches New Cloud Security Service Centers in India and Kenya
Offers local customers world-class network and application protection Radware® , a global company in application security and delivery solutions for multi-cloud environments, announced the launch of new cloud security service centers in Chennai and Mumbai, India, and Nairobi, Kenya. Today, Radware supports a network of more than 50 cloud security service centers worldwide with a mitigation capacity up to 15Tbps. Radware’s global network of data centers mitigates attacks closest to their point of origin. This helps organizations improve application response times for in-region traffic and reduce mitigation response times against a variety of attacks, including denial-of-service attacks, web application attacks, malicious bot traffic, and attacks on APIs. It also helps them keep data within their borders to meet strict data privacy regulations. Our ongoing investments in our security network continue to play an important role in our cloud security growth strategy. Cloud innovation is central to our mission in providing customers industry-leading cyber protection, reliability, and availability at a time when cyber threats are not only increasing in frequency and magnitude but also sophistication Haim ZelikovskyVice President,Cloud Security Services, Radware According to Radware’s 2025 Global Threat Analysis Report, Web DDoS attacks, which appear as high intensity, Layer 7 application attacks, surged globally 550%, while web application and API attacks rose 41% between 2023 and 2024. “Our ongoing investments in our security network continue to play an important role in our cloud security growth strategy,” said Haim Zelikovsky, Vice President of Cloud security services for Radware, “Cloud innovation is central to our mission in providing customers industry-leading cyber protection, reliability, and availability at a time when cyber threats are not only increasing in frequency and magnitude but also sophistication.” Radware has received numerous awards for its DDoS mitigation, application and API protection, web application firewall, and bot detection and management solutions. Industry analysts such as Aite-Novarica Group, Forrester, Gartner, GigaOm, IDC, KuppingerCole and QKS Group continue to recognize Radware as a market leader in cyber security. Radware® is a global player in application security and delivery solutions for multi-cloud environments. The company’s cloud application, infrastructure, and API security solutions use AI-driven algorithms for precise, hands-free, real-time protection from the most sophisticated web, application, and DDoS attacks, API abuse, and bad bots. Enterprises and carriers worldwide rely on Radware’s solutions to address evolving cybersecurity challenges and protect their brands and business operations while reducing costs Read More
Synology Unveils C2 Surveillance for Scalable and Reliable Cloud Monitoring
Synology recently introduced C2 Surveillance, a new Video Surveillance as a Service (VSaaS) solution designed to provide a server-less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. “Our goal has always been to build a comprehensive surveillance ecosystem that enables seamless integration and management for our customers,” said Josh Lin, Director of Synology’s Surveillance Group, “With the addition of C2 Surveillance, customers now have the flexibility to deploy their surveillance solutions entirely on-premises or in the cloud, depending on their unique requirements.” C2 Surveillance is built to simplify surveillance deployment and management, especially for multi-site operations. With no device license requirements, users can add cameras without worrying about additional costs or constraints. Key highlights of C2 Surveillance include: C2 Surveillance is Synology’s new Video Surveillance as a Service (VSaaS) solution designed to provide a server- less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. Effortless setup C2 Surveillance is built with ease of deployment and management at its core. The setup process is designed to be completed within minutes even on mobile devices. Benefit from its intuitive installation experience, administrators can quickly bring new sites online without any specialized training, making it highly accessible for businesses of all sizes. Advanced AI-powered detection tasks can also be configured easily through the user-friendly Synology interface, ensuring both accessibility and powerful functionality in just a few clicks. Continuity-first architecture C2 Surveillance is designed with a continuity-first architecture, ensuring uninterrupted recording even in the event of network disruptions. All footage is edge recorded to microSD cards, with the option to back up recordings to the C2 Cloud for extra protection. Additionally, C2 Surveillance supports failover offline mode, enabling local monitoring even when disconnected from the internet. To safeguard sensitive footage and user access, the system incorporates AES-128 encryption, multi-factor authentication, and granular permission settings, and adheres to industry-leading compliance standards including ISO 27001, SOC 2 Type II, and NDAA. Smart scalability To support organizations operating across multiple locations, C2 Surveillance leverages cloud infrastructure to centrally manage cameras across sites. With seamless integration with Windows Active Directory, it enables centralized identity and access management. Role-based access control allows administrators to easily delegate specific permissions across teams or locations. In addition, C2 Surveillance supports low bandwidth mode to reduce bandwidth consumption by up to 50% with minimal impact on video quality, making it ideal for environments with bandwidth constraints. C2 Surveillance leverages cloud infrastructure to enable customers centrally manage cameras across sites. Availability C2 Surveillance will be available later this year. For the latest updates, please visit the official Synology website. Read More
Are Smartphones the Next Surveillance Cameras?
As security threats evolve, so must the tools we use to respond to them. Fixed cameras, once the backbone of any surveillance system, are now only part of a bigger picture. Today’s risks are dynamic, mobile, and unpredictable – and in many cases, they don’t wait to happen in front of a network camera. Security teams know this reality all too well. A theft in the far end of a parking lot, a conflict in a hallway just outside a camera’s view, an incident at a temporary event with no infrastructure – these aren’t rare cases – they’re everyday blind spots. And here’s the truth: even with the best camera placements, there will always be moments the system misses. So the question is no longer – “Where can we place more cameras?” It’s becoming: “What if the people already on the ground could become the camera?” Why security can’t stay static In fast-changing environments, static infrastructure alone can’t keep up – and everyday use cases prove it. A security guard notices suspicious activity near a parked car, but the incident unfolds just outside the camera’s view. A warehouse supervisor spots damaged goods during delivery, needing quick documentation for accountability. At a public event, crowd movement spills into areas where cameras weren’t installed – and there’s no time to reroute coverage. These are the moments where security depends on the people on the ground – the first to notice, assess, and act – often before the control room is even aware. As security threats evolve, so must the tools we use to respond to them. Fixed cameras, once the backbone of any surveillance system, are now only part of a bigger picture. Today’s risks are dynamic, mobile, and unpredictable – and in many cases, they don’t wait to happen in front of a network camera security guard notices suspicious activity near a parked car, but the incident unfolds just outside the camera’s view. A warehouse supervisor spots damaged goods during delivery, needing quick documentation for accountability. At a public event, crowd movement spills into areas where cameras weren’t installed – and there’s no time to reroute coverage. These are the moments where security depends on the people on the ground – the first to notice, assess, and act – often before the control room is even aware. And increasingly, it’s the people on the ground who are stepping into that role – not just as responders, but as real-time eyes for the system. When the first responder feeds the frontline intelligence Security guards, floor managers, supervisors – they’re often the first to witness something unusual, long before a control room is even alerted. Now imagine this: what if, in that exact moment, they could pull out their phone, open a secure app, and stream live video directly into your surveillance system, with full context? Instead of hoping a camera catches it, you equip your team to document the moment as it happens. No delays, no evidence lost in transit, and no blind spots. And that single shift makes your entire security system more agile, more accurate, and far more complete. it’s already happening in the real world – across sectors and scenarios where traditional surveillance systems alone aren’t enough. Smartphones as surveillance tools: The next step The idea isn’t to replace traditional surveillance – it’s to extend it. To turn every authorized smartphone into a secure, mobile surveillance point. To let your team record critical incidents and immediately route that footage into your central surveillance system – not minutes or hours later, but as it happens. What’s needed is a solution that makes mobile footage just as reliable and authentic as fixed-camera feeds – and that’s where the next step in surveillance begins. Now in Matrix: Push Video for On-the-Go Surveillance With this vision in mind, Matrix introduces Push Video – a feature that enables authorized users to stream live video directly from their smartphone to Matrix Video Management System (VMS). The footage is geotagged, time-stamped, and securely stored, ensuring that no moment is lost or disconnected from the larger surveillance story. And the power doesn’t end at streaming. Once archived in the VMS, Push Video clips can be analyzed with the same tools used for fixed camera footage. Investigators can apply video analytics like motion detection, tripwire alerts, loitering detection, and more. They can also use smart investigator tools – such as timeline filtering, bookmarking, evidence locking, and multi-camera correlation – to review the footage thoroughly and act decisively. It’s simple, it’s smart, and it’s built for the way modern security actually works – fast, mobile, and always in motion. Read More
Infraon Premier League 2025 Brings Cricket, Camaraderie, and Corporate Spirit Together
The Infraon Premier League 2025 – a high-energy celebration of cricket, corporate camaraderie, and competitive excellence – has successfully concluded, marking the end of a remarkable season that brought together talent, teamwork, and the true spirit of sport. Held at the Backyard Sports Club in Gurugram, the tournament saw eight enthusiastic teams from leading organizations across India step onto the pitch – not just to win, but to connect, collaborate, and celebrate the unifying power of cricket. The teams that participated were NEC Corporation (Winners), Airtel (Runners-Up), Dev IT Serv, SISL Infotech, Orbit Techsol, RailTel Corporation, Hitachi System and Niveshan Technologies. From left to right: Randeep Guha, GM, ONGC Ltd., Doman Yadav, Executive Director, Power Grid Corporation of India Limited, Sanjai Kumar, Chairman and Managing Director, RailTel Corporation of India Ltd, NEC Corporation India team captain Harinder Ratra, and from EverestIMS Technologies – Satish Kumar V, CEO, Ramesh Tiwari, Director and Head of Sales, Rohit Garg, Director Sales Government. Throughout the tournament, players demonstrated a perfect balance of professionalism and passion. From nail-biting finishes to breakout individual performances, each match offered something memorable. The level of sportsmanship and the bonds forged during the tournament reflected the core values of Infraon – collaboration, resilience, and excellence. In a gripping final match, NEC Warriors outplayed the formidable Airtel Warriors to emerge as champions of the 2025 edition. Reflecting on the success of the tournament, Satish Kumar V, CEO of EverestIMS Technologies, said, “The Infraon Premier League has been more than just a cricket tournament – it’s a celebration of culture, connection, and corporate spirit. It was heartening to see professionals from different walks of life come together with such energy and enthusiasm. Congratulations to NEC Warriors on a deserving win and to every team that contributed to making this league a true success. At Infraon, we believe that meaningful experiences outside the boardroom are just as important in shaping strong, purpose-driven teams.” EverestIMS Technologies extends its sincere gratitude to the sponsors who made this league possible through their generous support and shared vision – Netpoleon India, Persistent Systems, Infoblox and HEAL Software. They helped turn the tournament into a much-awaited annual celebration of sport, synergy, and success. A special note of appreciation goes to the Infraon organizing team, whose meticulous planning, behind-thescenes coordination, and tireless effort ensured the tournament ran seamlessly from start to finish. From scheduling and logistics to on-ground execution and team engagement, their dedication transformed this league into a world-class experience for everyone involved. With the 2025 edition setting new benchmarks in engagement, participation, and energy, plans are already underway to make next year’s tournament even more spectacular. Until then, we salute every player, team, supporter, and sponsor who made this journey unforgettable. Because at Infraon, we don’t just build technology – we build communities. Read More
Fortinet Threat Report Reveals Record Surge in Automated Cyberattacks as Adversaries Weaponize AI & Fresh Techniques
FortiGuard Labs 2025 Global Threat Landscape Report highlights a boom in Cybercrime-as-a-Service on the darknet, fueling a lucrative market for credentials, exploits, and access Fortinet®, the global cybersecurity company driving the convergence of networking and security, recently announced the release of the 2025 Global Threat Landscape Report from FortiGuard Labs. The latest annual report is a snapshot of the active threat landscape and trends from 2024, including a comprehensive analysis across all tactics used in cyberattacks, as outlined in the MITRE ATT&CK framework. The data reveals that threat actors are increasingly harnessing automation, commoditized tools, and AI to systematically erode the traditional advantages held by defenders. “Our latest Global Threat Landscape Report makes one thing clear. Cybercriminals are accelerating their efforts, using AI and automation to operate at unprecedented speed and scale,” said Derek Manky, Chief Security Strategist and Global VP Threat Intelligence, Fortinet FortiGuard Labs, “The traditional security playbook is no longer enough. Organizations must shift to a proactive, intelligence-led defense strategy powered by AI, zero trust, and continuous threat exposure management to stay ahead of today’s rapidly evolving threat landscape.” Key findings from the latest FortiGuard Labs Global Threat Landscape Report include: ● Automated scanning hits record highs as attackers shift left to identify exposed targets early. To capitalize on newfound vulnerabilities, cybercriminals are deploying automated scanning at a global scale. Active scanning in cyberspace reached unprecedented levels in 2024, rising by 16.7% worldwide yearover- year, highlighting a sophisticated and massive collection of information on exposed digital infrastructure. FortiGuard Labs observed billions of scans each month, equating to 36,000 scans per second, revealing an intensified focus on mapping exposed services such as SIP and RDP and OT/IoT protocols like Modbus TCP. ● Darknet marketplaces fuel easy access to neatly packaged exploit kits. In 2024, cybercriminal forums increasingly operated as sophisticated marketplaces for exploit kits, with over 40,000 new vulnerabilities added to the National Vulnerability Database, a 39% rise from 2023. In addition to zero-day vulnerabilities circulating on the darknet, initial access brokers are increasingly offering corporate credentials (20%), RDP access (19%), admin panels (13%), and web shells (12%). Additionally, FortiGuard Labs observed a 500% increase in the past year in logs available from systems compromised by infostealer malware, with 1.7 billion stolen credential records shared in these underground forums. ● AI-powered cybercrime is scaling rapidly. Threat actors are harnessing AI to enhance phishing realism and evading traditional security controls, making cyberattacks more effective and difficult to detect. Tools like FraudGPT, BlackmailerV3, and ElevenLabs are fueling more scalable, believable, and effective campaigns, without the ethical restrictions of publicly available AI tools. ● Targeted attacks on critical sectors intensify. Industries such as manufacturing, healthcare, and financial services continue to experience a surge in tailored cyberattacks, with adversaries deploying sector-specific exploitations. In 2024, the most targeted sectors were manufacturing (17%), business services (11%), construction (9%), and retail (9%). Both nation-state actors and Ransomware-as-a-Service (RaaS) operators concentrated their efforts on these verticals, with the United States bearing the brunt of attacks (61%), followed by the United Kingdom (6%) and Canada (5%). ● Cloud and IoT security risks escalate. Cloud environments continue to be a top target, with adversaries exploiting persistent weaknesses such as open storage buckets, over-permissioned identities, and misconfigured services. In 70% of observed incidents, attackers gained access through logins from unfamiliar geographies, highlighting the critical role of identity monitoring in cloud defense. ● Credentials are the currency of cybercrime. In 2024, cybercriminals shared over 100 billion compromised records on underground forums, a 42% year-overyear spike, driven largely by the rise of “combo lists” containing stolen usernames, passwords, and email addresses. More than half of darknet posts involved leaked databases, enabling attackers to automate credential-stuffing attacks at scale. Well-known groups like BestCombo, BloddyMery, and ValidMail were the most active cybercriminal groups during this time and continue to lower the barrier to entry by packaging and validating these credentials, fueling a surge in account takeovers, financial fraud, and corporate espionage. CISO takeaway: Strengthening cyber defenses against emerging threats Fortinet’s Global Threat Landscape Report provides rich details on the latest attacker tactics and techniques while also delivering prescriptive recommendations and actionable insights. Designed to empower CISOs and security teams, the report offers strategies to counter threat actors before they strike, helping organizations stay ahead of emerging cyberthreats. This year’s report includes a ‘CISO Playbook for Adversary Defense’ that highlights a few strategic areas to focus on: ● Shifting from traditional threat detection to continuous threat exposure management: This proactive approach emphasizes continuous attack surface management, real-world emulation of adversary behavior, risk-based remediation prioritization, and automation of detection and defense responses. Utilizing breach and attack simulation (BAS) tools to regularly assess endpoint, network, and cloud defenses against real-world attack scenarios ensures resilience against lateral movement and exploitation. ● Simulating real-world attacks: Conduct adversary emulation exercises, red and purple teaming, and leverage MITRE ATT&CK to test defenses against threats like ransomware and espionage campaigns. ● Reducing attack surface exposure: Deploy attack surface management (ASM) tools to detect exposed assets, leaked credentials, and exploitable vulnerabilities while continuously monitoring darknet forums for emerging threats. ● Prioritizing high-risk vulnerabilities: Focus remediation efforts on vulnerabilities actively discussed by cybercrime groups, leveraging risk-based prioritization frameworks such as EPSS and CVSS for effective patch management. ● Leveraging dark web intelligence: Monitor darknet marketplaces for emerging ransomware services and track hacktivist coordination efforts to preemptively mitigate threats like DDoS and web defacement attacks. Read More
CP PLUS Unveils Ingenious & Inventive CTC Technology : Ushering in a New Era of Cyber-Secure Surveillance
CP PLUS, India’s leading security and surveillance brand, has officially launched its groundbreaking CTC Technology – CP PLUS Trusted Core Technology. Engineered with precision, foresight, and the promise of secure innovation, this ingenious and inventive solution addresses the growing global concern over data privacy and cybersecurity in modern surveillance systems. As the world advances toward hyper- connected environments, with smart homes, cloud platforms, and IoT-based systems becoming the norm, the vulnerabilities that come along with these conveniences have increased manifold. Recognizing this crucial shift, CP PLUS has developed CTC Technology as the heart of reliable, resilient, and secure surveillance: designed to fortify every layer of the surveillance ecosystem. CTC Technology is a multi-layered security architecture that brings together the best of cybersecurity practices and technological intelligence. It is not just an enhancement; it is a complete redefinition of how surveillance should function in today’s digital landscape – more intelligent, more secure, and more reliable than ever before. “At its core, CTC stands for CP PLUS Trusted Core Technology, a proprietary advancement developed with one clear mission: to protect surveillance systems from modern cyber threats that are constantly evolving. It safeguards users by addressing all possible touchpoints of vulnerability, including data access, device firmware, system operations, network communication, and even the origin of hardware components. It ensures that every camera, every stream, every piece of footage – and every byte of data – is protected,” added Aditya Khemka, Managing Director, CP PLUS (Aditya Infotech Ltd.). What sets CTC apart is its foundation on six critical pillars of protection, each addressing a key vulnerability area. Cyber Security protects the system from hacking attempts and unauthorized access. Operational Security ensures there are no disruptions or system failures caused by malicious interference. Network Security shields data transmission channels to prevent breaches. Data Security secures all recorded footage using high-grade encryption, making it unreadable to unauthorized users. Application Security ensures that the software running the devices is robust and shielded against exploits. And lastly, Critical Component Security safeguards the hardware and firmware – the physical and digital backbone of every device – from tampering or counterfeiting. CP PLUS, India’s leading security and surveillance brand, has officially launched its groundbreaking CTC Technology – CP PLUS Trusted Core Technology. Engineered with precision, foresight, and the promise of secure innovation, this ingenious and inventive solution addresses the growing global concern over data privacy and cybersecurity in modern surveillance systems But CTC doesn’t stop there. It incorporates a host of advanced security measures, making it one of the most comprehensive surveillance security platforms available today. 1. Enterprise-Grade Security CTC ensures your surveillance system starts securely and stays protected with the latest encryption and authentication mechanisms. 2. Secure Boot: Verified from Power– On CTC verifies firmware integrity from the moment the device powers on – no chance for malicious code injection. 3. Strong Cryptography with AES- 256 CTC employs the latest AES-256 encryption standard, safeguarding data transmission and storage at all times. 4. Tamper-Proof Communication CTC secures all data in transit with encrypted channels, ensuring protection against man-in-the-middle attacks. 5. Trusted Core = Trusted Surveillance CTC builds trust at the core, enabling organizations to meet compliance needs like OWASP, IoTSCS ER, and more. The system is also resilient against side-channel attacks, a sophisticated form of cyberattack that exploits indirect leaks like electromagnetic emissions or power consumption. CTC has been specifically engineered to resist such vulnerabilities with advanced hardware-level security. Backing the technological depth of CTC is a stamp of validation that speaks volumes. Our CTC-powered cameras are STQC Certified, aligning with India’s stringent cybersecurity and quality assurance standards. This certification reinforces the credibility and reliability of CTC-enabled solutions and showcases CP PLUS’s dedication to developing indigenized, Made-in-Bharat innovations that meet global benchmarks. In simpler terms, CTC Technology ensures that your surveillance system is protected: always. Whether it is the camera you have installed in your home, a large-scale deployment in a city surveillance project, or critical systems in financial, healthcare, or industrial sectors, CTC ensures that your data remains your own and your systems remain resilient against all cyber threats. At its core, CTC stands for CP PLUS Trusted Core Technology, a proprietary advancement developed with one clear mission: to protect surveillance systems from modern cyber threats that are constantly evolving. It safeguards users by addressing all possible touchpoints of vulnerability, including data access, device firmware, system operations, network communication, and even the origin of hardware components. It ensures that every camera, every stream, every piece of footage – and every byte of data – is protected Aditya KhemkaManaging Director,CP PLUS (Aditya Infotech Ltd.). With this launch, CP PLUS has once again demonstrated its ability to lead the industry not just in innovation, but in responsible and secure innovation. CTC Technology is not just a new feature, it is a new philosophy, one that believes surveillance should be about more than just watching; it should be about protecting, not just physical spaces, but digital sanctity too. The future of secure surveillance is here. Its name is CTC. And it is proudly brought to you by CP PLUS. Read More
CP PLUS Reveals Inspiring New Corporate Video
“Humne Bharat Ko Bante Dekha Hai”A Tribute to India’s Journey and Trust in Innovation CP PLUS, India’s leading surveillance and security brand, proudly reveals its latest corporate video titled “Humne Bharat Ko Bante Dekha Hai. Humne Bharat Mein Bante Dekha Hai. CP PLUS – Humne Bharat ka Kal, Aaj Aur Kal Dekha Hai!” – a stirring narrative that celebrates the spirit of a rising Bharat and the brand’s deep-rooted commitment to its growth story. The film is not just a visual showcase of technological prowess; it’s a tribute to the billion dreams that shape the nation. It reflects how CP PLUS, with every innovation and every milestone, has stood shoulder to shoulder with the aspirations of a new India – a Bharat that dreams, dares, and does. At the heart of this powerful message lies a simple truth – Your trust fuels our journey. Every product developed, every solution deployed, and every milestone achieved by CP PLUS carries within it the collective hopes of a country on the move. The corporate video beautifully encapsulates this sentiment, weaving together powerful imagery, emotion, and a message of shared progress. “Through every innovation we craft, every solution we design, and every promise we uphold, we carry the collective aspirations of a nation. At CP PLUS, your trust is more than a foundation, it’s a force. Because when you trust us, we don’t just deliver products, we deliver a commitment,” said Aditya Khemka, Managing Director, CP PLUS. The new corporate film is a resounding affirmation of CP PLUS’ steadfast dedication to innovation, nation-building, and customer-centricity. It reminds viewers that CP PLUS isn’t just witnessing India’s future, it’s actively shaping it. Read More
Hikvision India Introduces Smart Swing Barriers and Turnstiles with ‘All-in-One’ Flexible Solutions
Hikvision India has introduced the latest Smart Swing Barriers and Turnstiles for flexible entrance solutions for faster access. These entrance solutions offer advanced features and integrate many functions seamlessly as an All-in-One solution. Empowered by Hikvision’s self-developed motor control algorithms, access control technology, and intercom technologies, Hikvision speed gates and turnstiles offer a diversified product portfolio with impeccable quality, stability and durability, catering to the needs of various scenarios. These Smart Turnstiles and Smart Swing Barriers are crafted with modern and sleek industrial design. Future-proof design delivers safer and more comfortable user experience with faster access and aesthetic pleasure, perfectly integrating into diverse application scenarios. They offer flexible solutions for any scenario. A variety of products offers flexible combination of multiple authentication methods. When combined with built-in access controllers, users will enjoy one-stop entrance solution. Easy set of passenger passing mode The capability of customizing single or dual-way passing mode for different periods, as well as flexible set easy/ strict mode satisfies varied security level in different scenarios. Enhanced ease-of-use from installation to configuration Installation is simplified, requiring only one network cable and one power cable. The user-friendly configuration allows quick adjustments via a LAN interface or NFC tags on Android mobile devices. Impeccable stability and durability Empowered by industry-leading motor control algorithms, Hikvision’s Swing Barriers and turnstiles offer the best-in-class quality with extended lifespan. All products will undergo a number of tests at the Hikvision Test Center, including rain test, packaging vibration test, high and low temperature test and salt mist corrosion test. Third-party integration & great extensibility Featuring easy integration with third-party software and hardware such as access controller, users can flexibly realize visitor and flow management. Product Highlights Hikvision’s Smart Swing Barrier DS-K6B360 TX Series is equipped with smart security solutions and sleek design. It has single-sided dToF sensor and high lifetime servo motor. It is compatible with multiple authentication methods. Hikvision’s Smart Turnstile DS-K3B 961TX Series has a sleek and slender design to suit any interior. It is compatible with multiple authentication methods. The other features include easy installation and touch free access. Application scenarios: While Swing Barriers offer a fluid walk-through experience and flexible access control. Turnstiles act as a powerful deterrent against tailgating and unauthorized entry. The key application scenarios for speed gates and turnstile across verticals include corporate office buildings, schools and education institutions, manufacturing facilities and factories, banks and financial institutions, airports, seaports, metro rail and other railway stations.
Synology Unveils C2 Surveillance forScalable and Reliable Cloud Monitoring
Synology recently introduced C2 Surveillance, a new Video Surveillance as a Service (VSaaS) solution designed to provide a server-less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. “Our goal has always been to build a comprehensive surveillance ecosystem that enables seamless integration and management for our customers,” said Josh Lin, Director of Synology’s Surveillance Group, “With the addition of C2 Surveillance, customers now have the flexibility to deploy their surveillance solutions entirely on-premises or in the cloud, depending on their unique requirements.” C2 Surveillance is built to simplify surveillance deployment and management, especially for multi-site operations. With no device license requirements, users can add cameras without worrying about additional costs or constraints. Key highlights of C2 Surveillance include: C2 Surveillance is Synology’s new Video Surveillance as a Service (VSaaS) solution designed to provide a server-less, fast-to-deploy, and non-disruptive cloud monitoring with multi-site scalability. Effortless setup C2 Surveillance is built with ease of deployment and management at its core. The setup process is designed to be completed within minutes even on mobile devices. Benefit from its intuitive installation experience, administrators can quickly bring new sites online without any specialized training, making it highly accessible for businesses of all sizes. Advanced AI-powered detection tasks can also be configured easily through the user-friendly Synology interface, ensuring both accessibility and powerful functionality in just a few clicks. Continuity-first architecture C2 Surveillance is designed with a continuity-first architecture, ensuring uninterrupted recording even in the event of network disruptions. All footage is edge recorded to microSD cards, with the option to back up recordings to the C2 Cloud for extra protection. Additionally, C2 Surveillance supports failover offline mode, enabling local monitoring even when disconnected from the internet. To safeguard sensitive footage and user access, the system incorporates AES-128 encryption, multi-factor authentication, and granular permission settings, and adheres to industry-leading compliance standards including ISO 27001, SOC 2 Type II, and NDAA. Smart scalability To support organizations operating across multiple locations, C2 Surveillance leverages cloud infrastructure to centrally manage cameras across sites. With seamless integration with Windows Active Directory, it enables centralized identity and access management. Role-based access control allows administrators to easily delegate specific permissions across teams or locations. In addition, C2 Surveillance supports low bandwidth mode to reduce bandwidth consumption by up to 50% with minimal impact on video quality, making it ideal for environments with bandwidth constraints. C2 Surveillance leverages cloud infrastructure to enable customers centrally manage cameras across sites. Availability C2 Surveillance will be available later this year. For the latest updates, please visit the official Synology website.