eMagazine December 2022

Page 26

December 2022 ` 200/Volume VII • Issue 5 • Monthly • New Delhi (92 pages including 4 for cover) RNI No. DELENG/2016/68892 Redefining Security for SECURITY FIRST, SECURITY FOREMOST! (India’s Leading Monthly Magazine on Security, Safety & Fire) NexusBetweenTerrorism andOrganisedCrime AI in the Cloud The Future of Cognitive Analytics The 6 Technology Trends Affecting the Security Sector in 2023 5 Steps to Protect from Ransomware
October2022 `200/VolumeVII • Issue3 Monthly NewDelhi (92pagesincluding4forcover) RNINo.DELENG/2016/68892 Redefining Security for SECURITY FIRST, SECURITY FOREMOST! (India’s Leading Monthly Magazine on Security, Safety & Fire) Combating Financing Terrorism in India AGameChangerforPhysicalSecurity CloudBasedSecurityTechnology: InsiderThreatProtection: WhyEmployeesLeakCompanies’ DataandHowtoPrevent It ThroughoutSupportingCybersecuritytheDeviceLifecycle CloudAdoptionMeasurestoKeepin MindwithIncreasingCyberThreats Reach us at: editor@securitylinkindia.com August2022 `200/VolumeVII • Issue1 • Monthly • NewDelhi(92pagesincluding4forcover) RNINo.DELENG/2016/68892 RedefiningSecurityforSECURITYFIRST,SECURITYFOREMOST!(India’s Leading Monthly Magazine on Security, Safety & Fire) PankajJain Sr.GroupDirector&DigitalHead InformaMarkets E-Commerceand Securityofyour Warehouse BiometricTechnologies andCounter-Terrorism Better Safeguarding ofSchools September2022 `200/VolumeVII • Issue2 • Monthly • NewDelhi(92pagesincluding4forcover) RNINo.DELENG/2016/68892 Redefining Security for SECURITY FIRST, SECURITY FOREMOST! (India’s Leading Monthly Magazine on Security, Safety & Fire) SafestSafeguardingthe SecurityModeofTravel AspectsofSoft andVulnerableTargets SmartTopThreeBenefitsof BusinessesVideoforRetailers ShouldProactively MakeaSystematicApproach toCyberResilience CLOUDBUDGETING: AGuidetoPlanningand PredictingCloudSpend July2022 `200/VolumeVI • Issue12 • Monthly • NewDelhi (92pagesincluding4forcover) RNINo.DELENG/2016/68892 Redefining Security for SECURITY FIRST, SECURITY FOREMOST! (India’s Leading Monthly Magazine on Security, Safety & Fire) WorkinginTandem willbeaGreatOpportunity CISF & PSI Relookingat HospitalRelookingatSecurity HospitalSecurity DataSecurityandtheFormidable ChallengesoftheEra HowCanInternetofThings(IoT) TransformBusinesses
The Network of the Military Veterans in the Corporate Transforming Military Talent for Corporate Success www.forces-network.com @ForcesNetwork1 Magazine: https://www.forces-network.com/forcenetezine

KNOW WHAT IS HAPPENING. ACT WITH CERTAINTY.

Securing a hospital is a unique challenge and inefficient operations have major implications. Ensure your hospital is resilient and can adapt to a wide spectrum of threats and disruptions. Avigilon’s smart security solutions help protect patients and staff across hospital areas and locations, while securing technology and equipment.

NEXT-GENERATION VIDEO ANALYTICS

Detect up to 50 objects in a scene, even if they are stationary, providing greater accuracy for perimeter protection and in crowded environments. Expanded object classification goes beyond people and vehicles to include distinguishing between cars, trucks, buses, motorcycles, and bicycles.

MORE COVERAGE, FEWER CAMERAS

Avigilon ultra-high definition security cameras allow coverage of wider areas with fewer cameras, and High Definition Stream Management (HDSM)™ and HDSM SmartCodec™ technologies maintain exceptional image quality while reducing network bandwidth and storage capacity needs.

AVIGILON APPEARANCE SEARCH™

Avigilon Appearance Search technology enables you to quickly initiate a search for a person or vehicle using specific physical descriptions, such as a person’s gender, whether they are a child or adult, and their hair and clothing color. Similarly, search for vehicles by vehicle type and color.

www.avigilon.com/solutions/industry/healthcare | asksales@avigilon.com

Images and user interfaces have been simulated for illustrative purposes. © 2022, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, Avigilon High Definition Stream Management (HDSM), HDSM SmartCodec, Avigilon Control Center, Avigilon Appearance Search, Avigilon Access Control Manager and Avigilon Control Center are trademarks of Avigilon Corporation. MOTOROLA,MOTO, MOTOROLA SOLUTIONS, and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. (06-22)

SMART
FOR HEALTHCARE
VIDEO SECURITY SOLUTIONS

From the Editor’s Desk

Dear Readers, Greetings from SecurityLinkIndia!

Exhibitions and conferences have been a powerful marketing tool for various industries including that for security industry professionals. They provide a platform to promote their pertinent products and/ or services to the group that may have little or no knowledge of the services. They offer an opportunity to meet existing and potential customers of the industry. New markets can be opened up here. The forums are not solely for the promotions and selling, rather they also offer huge opportunity for learning about the competitions and new and emerging products and services.

This month has been swarming with security industry exhibition and conferences in New Delhi. Informa Markets organized a three day expo during 1-3 December 2022, 2nd time after Covid spell. It also comprised conferences on various security issues and technologies attended by eminent experts from across the security industry. The expo and conference combined had a good response from the industry and so declared better than last year. The event had commendable foot falls especially of dedicated visitors. Informa also organized and presented Industry Awards to the qualified companies and personnel.

The Federation of Indian Chambers of Commerce & Industry (FICCI) organized their FICCI CSO Conclave on 6 December 2022. The event was an attempt to learn from Chief Security Officers (CSOs) about their experience with changing risk landscape and requirements in terms of skilled manpower and technological solutions. The Conclave also provided an opportunity to technology companies and private security organizations to understand and cater to the needs of CSOs. The Conclave had a good response and attended by eminent speakers and professionals.

Central Association of Private Security Industry (CAPSI), the apex body of the Private Security Sector, organized its annual event – 17th Security Leadership Summit on 17 December 2022. A day-long summit took cognizance of the multiple trends impacting the development journey of the Private Security Industry and fostered informed and energetic discussions on managing these strands for the best outcomes for the industry. Personalities of national and international repute graced the event and shared their experiences and views on the topics of concern of the industry. The event also witnessed the presentation of Security Leadership Awards to the security professionals, including the Golden Guard Awards which have been presented to 25 woman security professionals.

The same day, Women Empowerment Safety, Security (WESS) foundation organized an event to pay tribute to Nirbhaya at Artemis hospital, Gurugram. Women from all walks of life came together under one roof for candle lighting.

The PHDCCI Defence & HLS Committee also organized the Industry Interactive Conference ‘Roadmap for Indigenisation of UAVs’ on 21 December 2022. The key objective of this Conference was to discuss on the achievable roadmap for indigenising the manufacturing of UAVs and counter UAVs as they are needed in multi sectors and India has to develop its indigenous capability for its growing future needs.

Further, ASIS New Delhi Chapter #207 held their Annual General Meeting (AGM) 2022 on 23 December 2022 to declare their 2023 team.

Wishing you Merry Christmas & Happy New Year 2023!

(92 pages including 4 for cover)

Volume VII • Issue 5 • December 2022

With warm regards,

Editor Santosh Pathak

SecurityLinkIndia

Registered Office

H-187/5, First Floor

Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 45768200 Mobile: +91 8368396689

E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com

Admin & Dispatch Snigdha Pathak Design S. S. Rawat

Portal Design & Maintenance Rahul Kumar Singh

Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014.

The editor’s name is Santosh Pathak.

Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana).

All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher

Santosh Pathak Mob: +91 9968172237

(The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLinkIndia.)

CERTIFIED
ISO 9001-2015

n Ation A l R oundup

Hikvision India’s Recent Participations in India’s Leading Exhibitions

CAPSI Security Leadership Summit 2022

WESS NGO Paid Tribute to Nirbhaya

Professional Stealers: Opportunistic Scammers Targeting Users in 111 Countries

NETGEAR Exhibits its Solutions at IFSEC India 2022 26 Commvault Witnesses Significant Momentum in India 28 Prama Excellence Meet – Bengaluru 30 IISSM Annual Global Conclave 2022 33 Samriddhi Signs MoU with Sahasra Electronics 34 Roadmap for Indigenisation of UAVs 36 Consistent Showcases its Extensive Security Portfolio at IFSEC India 2022

38 Hikvision Creates an Ultra-HighDefinition Experience with allEncompassing 8K Solution 40 Synolog y Records 100% Growth in India YoY since 2019 43 ASIS New Delhi Chapter #207 AGM 44 Matrix Partner Connect, Lucknow 46 FortiGuard Labs Predicts the Convergence of Advanced Persistent Threat Methods with Cybercrime 49 Right IoT Security Assessment Helps Keeping Endpoint Devices Safe 50 Genetec Alerts Organizations to Risks of Legacy Access Control Systems 51 eInfochips and Ambarella Announce Strategic Partnership 52 Hikvision Introduces the Evolutionary eDVR Series with eSSD Technology

Applic Ation/ c A se studies

Hikvision’s Classroom Hub Solution Offers Convergence of Real, Digital and Virtual Classrooms

HID is the Smart Ticket Producer for FIFA World Cup 2022

Old Spaghetti Factory Restaurants Choose Interface to Modernize Physical Security

Hanwha Protects the Piazza Lucio Dalla

63 Everbridge Selected to Power the Nationwide Public Alert System for Norway 64 City, University of London Modernizes Wireless Campus Infrastructure with Extreme Networks 65 Tenable Selected by Catholic Education Western Australia to Secure Student Data

NatioNal RouNdup 8 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
CONTENTS D E c EM b ER 2022
58
60
61
62
14
18
21
22
25
NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 9 CONTENTS DE c EM b ER 2022 F e Atu R e A R ticles A Focus on Emerging Threats: Cybersecurity Awareness Month 57 The 6 Technology Trends Affecting the Security Sector in 2023 66 What does Responsible use of AI in Businesses Mean Today? 69 5 Steps to Protect from Ransomware 80 AI in the Cloud: The Future of Cognitive Analytics 10 Nexus Between Terrorism and Organised Crime 54 i nte R n Ation A l upd Ates 70-79 pR oduct showc A se 82-89

AI IN The ClOud: The Future of Cognitive Analytics

In 2022 the world would have surpassed 1 billion video cameras in use. While the number is huge, the future is staggering. Today there is 1 camera for every 8 people. It is projected that by 2030 there will be 13 billion video cameras in use. In just 8 years we will move from 1 camera for every 8 people to 1.5 cameras for each person. We can aptly call it the World Vision Web.

returns on their CCTV video surveillance investment than ever before:

● Risk & compliance management.

● Unified threat management.

● Loss prevention/ detection systems.

● Business continuity/ reporting.

● Bulk video synopsis.

● Information and event management.

● Identity and safety management.

Impact of AI & ML on the Enterprise Security and Visual Monitoring and Inspection market

growth?

CLOUD based CCTV Video surveillance can be the bridge that will allow us to cross this challenge

The capabilities of CCTV video surveillance systems are now being transformed by fundamental shifts in how visual content inspection and monitoring data is gathered and analysed for actionable insights. This has profound implications not just for the effectiveness of CCTV video surveillance as a security tool but deployment of Video Content Analysis (VCA), for a range of other, non-security applications. There is clearly a requirement for newer ways these systems can provide organisations with more tangible

Traditional rule based VCA adoption is on the rise and more providers are incorporating it in their cameras (Edge) and Video Management Systems. But it is basically the mechanism to incorporate intelligence into Computer Vision devices through a pre-determined set of rules (algorithm). This may satisfy the needs of security and investigations, but are found lacking for the demanding visual content inspection and monitoring requirements.

How will technology cope with such a humongous
Image Courtesy: Open Source Image Courtesy: Source Security

When it comes to buzzwords, Artificial Intelligence (AI) has a higher recollect and is much used in the analytics domain than the more specific related terms machine learning and deep learning which are a better description of cognitive tools that are being deployed for computer vision.

Machine Learning: Machine Learning, a sub set of Artificial Intelligence (AI), uses statistical methods and is basically the process which provides the system (computer) to learn automatically and improve accordingly without being explicitly programmed. We can classify ML as Supervised Learning, Unsupervised Learning and Reinforcement Learning

Deep Learning: Deep Learning is basically a sub-part of the broader family of Machine Learning which makes use of Neural Networks with a large number of parameters layers classified as Convolutional Neural Networks, Recurrent Neural Networks and Recursive Neural Networks. DL works on larger sets of data when compared to ML and prediction mechanism is self-administered by machines.

Deep learning systems can continuously calibrate vectors assigned to various inputs to better understand their environment. While standard systems tend to scrutinise pixel values for input data, deep learning systems can also use temporal, spatial and other visual elements to recognise and classify objects and events. Deep learning algorithms can handle larger datasets, including unlabelled data, in less time than traditional algorithms.

Important reason for AI/ ML adoption will be more accuracy, reduced costs, improved productivity while requiring minimal human intervention to adapt and teach systems, which the AI will do itself as it continually learns. Deep learning algorithms, which continuously self-optimise based on analysis of data gathered, has supercharged VCA.

It will be the next best transformation for the Visual Content Inspection and Monitoring industry after adoption of Network video for CCTV Surveillance in the early 2008.

Industry experts agree that the mentioned environments will benefit most from AI/ ML deployments:

● Crowded places (public squares, shopping malls, sports stadia etc).

● Law enforcement.

● Manufacturing.

● Smart cities & infrastructure.

● Construction.

● Retail banking/ finance

● Transpor tation & warehousing.

● Utilities, energy, oil & gas.

● Healthcare.

● Education.

● Professional sports.

● Media & broadcasting.

Visionbot™ – Enabling the Convergence of Cloud and AI/ ML

While technology itself is evolving, computing power doubling, challenges do remain for the customer in deployment of AI/ ML. They are cost/ scalability/ technological obsolescence and adaptability to evolving organizational needs. Absence of an EXIT option once the organizational priority has moved on is also a bottleneck in customer adoption.

Cloud Based AI/ ML platform is an ideal solution for enterprises to onboard their transformational AI/ ML journey for visual monitoring and inspection needs.

Visionbot™ a brand of Amvar Datatech Pvt Ltd, an IT company focussed on computer software design for Machine Learning, computer software consultancy for artificial intelligence, Software as a Service for machine learning, Software as a Service for surveillance and other related services.

Visionbot ™ uses a patented and award winning innovative Open Technology Platform which utilizes modern AI/ DL technologies of computer vision and natural language processing to help derive objective insights and reporting from subjective visuals captured over realtime camera video, recorded camera images and streaming broadcast feeds.

Visionbot™ was conceptualized as an adaptive self-service platform to leverage Machine Learning and Deep Learning for Computer Vision to provide ‘Objective Data from Subjective Visuals.’

The platform offers organizations to get specific insights of their visual content helping derive powerful insights and driving decision making. Designed as a cloud-based Software as a Service (SaaS) model and also with an on-premise option, Visionbot™ lets users start benefitting from the system with minimal investment.

Mission: Democratizing Video AI for ALL

Tobe the accelerator in bringing customers the full benefits of their intelligent network video investments. Deliver a compelling convergence of adaptability, agility and affordability that dramatically simplify the deployment and acquisition of AI data with increased agility, sensible economics and a seamless end-user experience.

Addressing The Problem

Among all the workflow processes within any enterprise today – visual inspection and monitoring is still heavily dependent on human reporting. Human assessment and reporting are however subjective and is prone to errors due to fatigue and inconsistency/ non repeatability. It also

slows down the overall process throughput which are otherwise completely automated. Visionbot™ assists companies to reduce operational costs and mitigate safety and environmental risks through intelligent visual monitoring. With our platform clients are enabled to increase productivity through virtual asset inspections, improve HSE, and manage customizable outcomes with monitoring, automated reporting, and strengthen security through predictive activity detection and alerting.

VisionBot USP

delivers smarter adaptive Cloud based video AI solutions that provide maximum resource utilization, deliver high availability & performance accuracy for the applications that matter most. It provides a pre-trained machine learning model that can automatically identify a

Visionbot

large number of objects, locations, and actions in stored and streamed videos. It works out-of-the-box, offers high performance in common use cases, and is constantly being updated with new objects and concepts. AutoML Video Intelligence provides a graphical interface, allowing users with minimal machine learning experience to train custom models, in order to classify and track objects and events in a video.

Organizational Benefit

Cut routine site visits. Saves time and labour costs via online inspections and alerts. Prioritize activity. Gets automated notifications of activities when and where you want alerts, frequency of alerts and respond quickly to problems.

Image Courtesy- VisionBot

Improve productivity. Empower your operators to focus on productive and higher-value work.

Increase profitability. Decrease operating costs and improve production uptime.

Reduce Costs. Visual validation of WIP, decrease losses and ensuring greater accountability/ procedural compliance.

Increase security and activity awareness. Understand the activity that occurs and both manned & unmanned assets while increasing security with activity alerts.

Deploying VisionBot

VisionBot Partner Program

We believe in building strong industry partnerships to address the growing organizational demands for real time accurate data. Our cloud based, scalable SaaS platform will be a disruptor in the video AI analytics space and brings the value addition many service and infrastructure providers would like to provide to their customers. It also offers customers the fastest deployment cycle and immense scalability on the cloud.

As an agile start-up we bring a strong commitment to our partner relationships. Some of the ways you could choose to partner with us are as follows. Reach out to us to discuss how we can together assist customers in their AI/ ML journey.

1. Video Integration Partners: Companies Currently involved in delivering End to End Security and Surveillance Solutions.

2. Alliance Partners: Companies involved in providing SaaS services for IT and Video hosting.

3. Solution Development Partners: Companies and Consultants who would like to build service offerings viz: Business Reporting, Process Improvements etc, using information from the VisionBot Platform.

Hikvision India’s Recent Participations in India’s Leading Exhibitions

Hikvision India showcased its latest AI video security products and advanced solutions with an elaborate display at the IFSEC India Security Expo 2022. The smart security applications enabled by advanced technologies Artificial Intelligence (AI), Robotics and IoT Security Tech got an overwhelming response from the visitors. The 15th edition of IFSEC India Security Expo organized by Informa Markets at Pragati Maidan, New Delhi from 1-3 Dec, 2022, one of the premier events of the Indian security industry turned out to be a huge success for the stakeholders. Akhilesh Shrivastava,

IT advisor, Uttarakhand Government, and Rajesh Kumar, Joint Commissioner, Delhi Police, were the Chief Guests at the inaugural session of IFSEC India Security Expo. After the lamp lighting ceremony and Ganesh Vandana, they addressed the gathering by emphasizing on the need of quality security products and advanced security solutions.

Hikvision India hosted a special launch event during the IFSEC India event to introduce the eDVR Series into its expanding portfolio of security solutions for SMBs in India. Powered by embedded solid state drive (eSSD) technology, Hik-

vision’s eDVRs are compact, durable, easy-to-use, and energy-efficient. All this means they are ideal for small-to-medium-sized businesses and residential applications.

“We are happy to launch this innovative product eDVR Series in India. The eDVR Series is smarter, faster, more durable and more energy efficient than anything that’s gone before, not only helping to minimize negative environmental impacts, but also delivering major energy and cost savings for our customers,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd.

and X-Ray Baggage
parcel inspection
Showcased ai Video Security Cameras, Smart applications and advanced Security Solutions iFSEC
Game-changer edVR Series
&
System launched
india 2022

Hikvision India introduced the X-Ray Baggage & Parcel Inspection System at the event. It is powered by value added features like AI based threat identification, built in Artificial Intelligence and Real Time Video Monitoring etc. Hikvision X-Ray Baggage & Parcel Inspection System is an innovative product offering in the security inspection product segment.

Hikvision India booth has showcased its advanced security products and solutions at the IFSEC India Expo 2022. The discerning security professionals and visitors have expressed their keen interest in trending transformative technologies such as Artificial Intelligence (AI), Robotics and IoT Security Tech at the Hikvision India booth.

“We are thrilled to introduce our latest video security products and wide range of solutions in front of partners, end-users and the system integrators along with visitors and new prospects at our booth in the IFSEC India Security Expo. The key objective to be part of the flagship event is to connect with the security industry peers, end-users and partners. This time IFSEC India is very special due to lots of fringe programs,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd.

He further added, “Hikvision India is showcasing latest tech-

nological innovations in Artificial Intelligence (AI) and Robotics Technologies. We unveiled the latest products and solutions in the Video Security, Access Control, Intrusion Alarm, Inspection and Perimeter Security segments. We have also introduced Mobile Robot Products, Machine Vision Products and Logistic Vision Solutions.”

The key highlights of the technologies and solutions on display at Hikvision India booth, included AI, ColorVu, Thermal and AcuSense Technologies. The product categories on display will be the Command Control Center, Hikcentral, Intelligent Traffic System, Video Intercom, Security Inspection Products, AX Hub and AX-Hybrid Series Alarm System, HeatPro Thermal Cameras, Professional Transmission Solution, and Smart Storage Solutions. Smart Home Cameras (Solar and Battery), Next-Gen

Outdoor PTZ Cameras and Smart Locks were the key attraction at EZVIZ corner. The smartly designed Hikvision India booth showcased vertical solutions for Banking, Retail, Education, Industry, Smart Mobility, Healthcare and Hospitality verticals.

Hikvision India booth had showcased its advanced security solutions across product categories and conducted various fringe programs, including quiz contests to engage the visitors.

Hikvision India participated in the IFSEC India Conference on 1st December with a powerpacked presentation on the theme ‘Top Security Trends, Apps and Solutions that will shape the future,’ it was presented by Gagan Lamba, Vice President, Enterprise Verticals, Prama Hikvision India Pvt. Ltd.

In the post-lunch session an insightful panel discussion was conducted on a contemporary

theme ‘Technologies that Enhance Corporate Security – Video Surveillance, Access Control, Transportation Security, Information Security and More.’ Hikvision India was represented by A.L. Narasimhan, Vice President, Strategic Business Alliances, Prama Hikvision India Pvt. Ltd. in the panel discussion. He shared key insights on security solution trends based on AI, IoT

and Deep Learning technologies.

The event was supported by some of the leading the associations, including APSA (Asian Professional Security Association), Global UAV and ASIS etc. Ornately designed with a wide range of products and solutions at display Hikvision booth was the center of attraction at the event. Hikvision India was the Premier

Plus Partner of IFSEC India Security Expo 2022.

Hikvision India booth has received overwhelming response and applause from the key partners, trade visitors and key stakeholders at the IFSEC India. The IFSEC Security Expo concluded with the high footfall of security industry representatives and relevant visitors.

TrafficInfraTech Expo 2022

Showcases Latest Solutions for Transport Security, Traffic and Smart Mobility

Hikvision

India had participated in the 10th edition of TrafficInfraTech Expo 2022 to showcase the latest technologies, products and solutions for the India’s fast growing transportation sector. TrafficInfraTech, one of the Asia’s largest integrated expo on Traffic, Transportation Technol-

ogy, Road Technology and Smart Mobility was inaugurated by S.V.R. Srinivas, Metropolitan Commissioner, MMRDA in the presence of transportation industry leaders, government representatives and delegates. The expo was organized from 16-18 November at the Bombay Exhibition Center, Goregaon,

Mumbai. The booth at the expo showcased Hikvision’s latest Solutions for Transport Security, Traffic Safety and Urban Mobility.

“India’s rapidly growing Transportation Sector presents a great opportunity for the transportation security solution providers. We are offering the Smart Transpor-

tation and ITMS solutions for the key stakeholders of transportation sector. We have showcased innovative solutions for the various transportation segments at the Trafficinfratech Expo. The expo continues to be a relevant platform to demonstrate the latest technologies, products and solutions to the key stakeholders of the transportation ecosystem,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd.

At the TrafficInfraTech Expo Hikvision showcased its latest Products and solutions, including Command and Control Room Solutions, Toll Entrance and Exit Management Solution, Multi-lane free Flow Tolling, Intelligent Traffic Management Solutions (ITMS), Mobile Solutions, Automatic Number Plate Recognition Solution (ANPR), Artificial Intelligence (AI)

Technology Applications, Vehicle Surveillance, Smart Parking Solutions, Smart Boom Barriers, Command and Control, Under Vehicle Surveillance Solution (UVSS), Emergency Call Box (ECB) and Smart Pole.

The three-day Smart Mobility Conference 2022 was organised with the TrafficinfraTech Expo covered eclectic mix of contemporary themes on transportation,

traffic management, logistics, Mobility, Smart Cities Parking Management. On the second day of the conference, Rajiv Arora, National Manager-Roadways & Waterways, Prama Hikvision India Pvt. Ltd., gave a detailed presentation on the trendy theme ‘ATMS and ANPR Trends in Transportation Security.’ He also briefed about the latest Transportation security solutions offered by Hikvision India. His presentation got an overwhelming response from the conference delegates.

TrafficInfraTech Expo provided a networking forum for government representatives, experts, project heads, system integrators and service providers to collectively find solutions to urban transport challenges. The event concluded on a high note with impressive representation from the India’s transport sector.

This year Private Security Sector (PSS) has crossed the remarkable milestone of ONE CRORE security professionals making it one of the largest employment generators across the globe. It is a historic moment for the Industry in the sense private security industry generates employment for people from rural and remote areas who are generally from marginalised communities.

18 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Security Leadership Summit 2022 CapSi asks Govt to set authority and increase Fdi in private Security Sector
formulating BIS
private security personnel
Private Security Industry can fill the Gaps in Security Sector – Gen V K Singh
17th
CAPSI Chairman Kunwar Vikram Singh said the association is
standards for the private security industry so that
can get jobs at national and international level
Best Man Guarding Company of the Year – Vikram Mahurkar, Checkmate Services Pvt. Ltd.

Central Association of Private Security Industry (CAPSI) is the apex body representing the Private Security Sector, safeguarding the interest of security professionals and over 25,000 Private Security Companies operating pan India. CAPSI has organised its annual event – 17th Security Leadership Summit on 17th December 2022 at NDMC Convention Centre in New Delhi.

A day-long summit took cognizance of the multiple trends impacting the development journey of the Private Security Industry and fostered informed and energetic discussions on managing these strands for the best outcomes for the industry. Personalities of national and international repute graced the event and shared their experiences and views on the topics of concern of the industry.

The Minister continued that the private security sector needs to set standards and meet benchmarks which can match international standards so that they could be given the responsibility of safety and security of important installations not only in the country but also overseas. Today security is needed in all sectors, from government to industrial and residential. The security agencies need to adopt modern technologies and use artificial intelligence to upgrade their skills to meet future challenges.

The event was inaugurated by the Chief Guest Gen (Dr) V.K. Singh, Hon’ble Union Minister of State, Ministry of Road, Transport and Highways and Ministry of Civil Aviation. In his address the Minister said that there is a dearth of trained security personnel and the private security industry should take a lead in filling these gaps. He further said that several government establishments and places like airports and railway stations need security and the private security sector needs to train and equip its personnel to meet their requirements. It is a good opportunity for the Indian private security industry to cater to domestic as well as international markets.

Giving the example of Tequila, Gen VK Singh said Mexico set up a world class laboratory and an accreditation board to develop it as a liquor of global standard. Today Tequila is one of the internationally known premium brands. Indian private security industry also needs to evolve on the same model to make its personnel meet high quality of international standards.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 19
Security Professional of the year Lt Col J S Paul Award –Harvindra Singh, President ASIS Exemplary Security Leadership Award – Rajeev Sharma, Country Managing Director, G4S Security Personality of the Year – B R Lohia, CMD, Eagle Hunters

Addressing the conference, CAPSI Chairman Kunwar Vikram Singh said that the association is formulating BIS standards for the private security industry so that private security personnel can get jobs at national and international level. Indian private security agencies will also be upgraded as per the top ISO standards to meet global requirements. Private security industry will also employ Agniveers and give them specialised training so that they can get good jobs in the industry.

Mr Singh continued private security industry employs over 1 crore people making it one of the largest job-giver. He urged the Centre to make amendments in the Private Security Agencies (Regulation) Act to set up an Authority for the regulation of the sector and allow 74% FDI from the current 49% to spur growth of the sector.

In the last few years, it is noticed that a praiseworthy role is being played by the former military officers, especially women in corporate security management and operations. They have ushered a new phase of military leadership in the private security domain. Being an apex body of the PSI, CAPSI honoured the professional ability of women who are holding leadership positions in security industry during the summit. Along with that, the event also witnessed the distribution of Security Leadership Awards in various other categories.

The conference was also addressed by Bhanu Prakash Singh Verma, MOS – MSME, Rameshwar Teli, MOS – Labour, and Bhuvneshwar Kalita, Dy. Speaker Rajya Sabha and Chairman of the Parliamentary Standing Committee of Health & Family Welfare.

NatioNal RouNdup 20 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

WESS NGO Paid Tribute to Nirbhaya

WESS (Women Empowerment Safety, Security) Foundation –an association formed by 14 independent ladies, an NGO under the Haryana Society Act under the leadership of Veena Gupta, Indu Saini and Bharti Patwar, organized an event recently on 17 December 2022 to pay tribute to Nirbhaya at Artemis hospital, Gurugram. Women from all walks of life came together under one roof for candle lighting. The event witnessed eminent personalities were present from different walks of life and experience to explore and discuss solutions in the form of mindset change, corporal help, legal help, police support and available technology. Shakti Wearables was the technical partner, and SecurityLinkIndia was the media partner to the event.

The vision of WESS NGO is to create a safer society for all men and women pan India. WESS NGO Founder

Veena Gupta said, “I feel every girl should learn self defence and it’s time that women should have their safety in their own hand with which she supports India’s first anti rape device – Shakti .”

The special attraction of the event included an acid attack play by Ravij Kohli representing acid attack victims.

The Chief Guest of the event was SHO from Civil Lines Police, Gurugram – Ms Poonam Hooda, and one of the youngest philanthropist Jas Kalra from Earth Saviours Foundation keeping women safety as the central theme.

The event also paid special attention to women’s health like breast cancer by Dr Priya Tiwari and Dr Renu Sehgal.

A knowledgeable themed panel discussion – SheTalks – Main Bhi Shakti included corporate security leaders such as Maj. Vashita – Vice President of Security, Marsh McLennan; Ms Geetika Wahi – Security Director at Netrika Consulting; Navdeep Singh – Founder, Incredible Story; Shruti Mittal from Gurgaon circle of

MOM; Mohit Sharma from Gurgaon Civil Defence.

Special group of women executive club of India headed by Simran Chugh and Harish Gupta also showed their support towards women empowerment. Solution oriented women safety technical session was conducted by Veena Gupta and Srishti Sharma .

The technical session included some self defence techniques and India’s first anti rape device – Shakti Wearables –that electrifies an attacker on a button press and sends a user’s last live location to their top 3 contacts. Srishti Sharma is the founder of Shakti Wearables and is a serial entrepreneur, social activist and 5 timed TEDx speaker.

Veena Gupta is the founder of seam global consulting Singapore and google icon for #searchforchange.

Wess NGO and their team have expressed their emotions towards asking support from all corporate , government and departments to help them in their vision to distribute this device – Shakti free of cost to every Indian household, nukkad, gali, village and to the underprivileged section of society.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 21

Professional Stealers: Opportunistic Scammers Targeting Users of Steam, Roblox, and Amazon in 111 Countries

Over 50 million passwords stolen in 7 months of 2022 Underground market value of stolen logs and compromised card details around US$5.8 million

India saw the highest number of infected devices in the Asia Pacific, followed closely by Indonesia, Philippines and Vietnam

Group-IB, one of the leading global players in cybersecurity, has identified 34 Russian-speaking groups that are distributing info-stealing malware under the stealer-as-a-service model. The cybercriminals use mainly Racoon and Redline stealers to obtain passwords for gaming accounts on Steam and Roblox, credentials for Amazon and PayPal, as well as users’ payment records and crypto wallet credentials. In the first seven months of 2022, the g angs collectively infected over 890,000 user devices and stole over 50mn passwords. All the identified groups orchestrate their attacks through Russian-language Telegram groups, although they mainly target users in the United States, Brazil, India, Germany, and Indonesia. In 2022, info-stealing malware has grown into one of the most serious digitalthreats.

Classiscam graduates

By tracking the evolution of the popular scam scheme Classiscam,

Group-IB Digital Risk Protection analysts revealed how some ‘workers’ (lowrank online scammers) started shifting to a more dangerous criminal scheme that involves distributing info stealers. Moreover, the illicit business of stealers, which is coordinated via Telegram groups, uses exactly the same operational model as Classiscam

An info stealer is a type of malware that collects credentials stored in browsers (including gaming accounts,

email services, and social media), bank card details, and crypto wallet information from infected computers, and then sends all this data to the malware operator. After a successful attack, the scammers either obtain money themselves using the stolen data, or they sell the stolen infor mation in the cybercriminal underground. According to Group-IB, stealers are one of the top threats to watch in the coming year. The threat actor responsible for

NatioNal RouNdup 22 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

the most recent attack on Uber purchased the credentials compromised with the Racoon stealer

According to the Group-IB Digital Risk Protection team, (part of the Unified Risk Platform), the mass Telegram groups and bots designed to distribute info stealers first appeared in early 2021. By investigating a number of accounts, Group-IB analysts were able to confirm that members of several scam groups that previously participated in the Classiscam scheme began using stealers. In 2021 and 2022, Group-IB experts identified 34 active groups on Telegram. On average, such info stealer distribution groups have around 200 active members.

The most popular stealer among the groups examined by Group-IB is RedLine, which is used by 23 out of 34 gangs. Racoon ranks second: 8 groups employ this tool. Custom stealers are used in 3 communities. Administrators usually give workers both RedLine and Racoon in exchange for a share of the stolen data or money. However, the malware in question is offered for rent on the dark web for $150-200 per month. Some groups use 3 stealers at the same time, while others have only one stealer in their arsenal.

Having switched from scamming users of classified websites to stealers, some threat actors reproduced not only the hierarchy and model of Classiscam, but also its technical capabilities. In particular, Telegram bots that generate malicious content, communication between members, and all their shady accounting. The tasks of workers, the scammers of the lower-ranks, have also changed – they must now drive traffic to bait scam websites impersonating well-known companies and convince victims to download malicious files.

Cybercriminals embed links for downloading stealers into video reviews of popular games on YouTube, into mining software or NFT files on specialized forums and direct communication with NFT ar tists, and into lucky draws and lotteries on social media.

Telegram Stealers world tour

operators of the stealers in question infected 19,249 devices. In the first seven months of 2022, the number grew to 53,988. Scammers were able to retrieve 4,547,020 passwords, 4,657 sets of payment records, and 4,428 sets of crypto wallet information such as credentials, seed phrases, etc.

Group-IB

estimates that between March 1 (when Group-IB started researching the scheme) and December 31, 2021 stealers operated via Telegram groups were able to compromise 538,000 devices. In the first 7 months of 2022, Telegram stealers were found to be almost twice more active infecting more than 890,000 devices in 111 countries.

The top 5 most often attacked countries in 2022 were the United States, Brazil, India, Germany, and Indonesia with 91,565, 86,043, 53,988, 40,750, and 35,345 infected devices respectively.

List of countries in Asia Pacific by the number of infected devices include India, Indonesia, Philippines, Vietnam and Singapore. In India for example, from March to December 2021, the

Indonesia closely follows with a total of 35,345 infected devices and where scammers were able to retrieve 2,372,893 passwords. The Philippines recorded a total of 31,745 infected devices and Vietnam with a total of 22,739 devices infected and scammers retrieving 2,032,278 passwords. Australia had 5,794 devices infected and 549,640 passwords retrieved by scammers. Singapore saw 2,179 devices infected, with 185,689 passwords retrieved.

According to the analysis of Telegram groups, for the last 10 months of 2021 cybercriminals collected 27,875,879 sets of passwords, 1,215,532,572 cookie files, 56,779 sets of payment records, and data from 35,791 crypto wallets. In the first 7 months of 2022, threat actors stole 50,352,518 passwords, 2,117,626,523 cookie files, details of 103,150 bank

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 23

cards, and data from 113,204 crypto wallets. The underground market value of just the stolen logs and compromised card details is around $5.8 million, Group-IB experts estimate.

According to Group-IB, in 2021, threat actors worldwide most frequently collected PayPal account credentials (more than 25%) and Amazon credentials (more than 18%). In 2022, the most targeted ser vices are the same, namely PayPal (more than 16%) and Amazon (more than 13%). However, over the course of the year, cases of stealing passwords for gaming services (Steam, EpicGames, Roblox) in the logs have increased almost five-fold.

“The influx of a huge number of workers into the popular scam Classiscam – which Group-IB’s Unified Risk Platfor midentified, at its peak, comprised over a thousand criminal groups and hundreds of thousands of fake websites – has led to criminals competing for resources and looking for new ways to make profits,” said Ilia Rozhnov, Head of Group-IB’s Digital Risk Protection in the Asia Pacific, “The popularity of schemes involving stealers can be explained by the low entry barrier. Beginners do not need to have advanced technical knowledge as the process is fully automated and the worker’s only task is to create a file with a stealer in the Telegram bot and drive traffic to it. For victims whose computers become infected with a stealer, however, the consequences can be disastrous.”

To minimize potential risks, Group-IB Digital Risk Protection experts recommend that users refrain from downloading software from suspicious sources, use isolated virtual machines or alternative operating

systems for installation, avoid saving passwords in browsers, and regularly clear browser cookies. To prevent digital risks and unwanted consequences, companies should take a proactive approach to their brand’s digital security and use modern technologies for monitoring and response, such as GroupIB’s Digital Risk Protection.

Group-IB, with its headquarters in Singapore, is one of the leading solutions providers dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property. The company’s Threat Intelligence and Research Centers are located in the Middle East (Dubai), Asia-Pacific (Singapore), and Europe (Amsterdam).

Group-IB’s Unified Risk Platform is an ecosystem of solutions that understands each organization’s threat profile and tailors defenses against them in real time from a single interface. The Unified Risk Platform provides complete coverage of the cyber response chain. Group-IB’s products and services consolidated in GroupIB’s Unified Risk Platform include Group-IB’s Threat Intelligence, Managed XDR, Digital Risk Protection, Fraud Protection, Attack, Surface Management, Business Email Protection, Audit & Consulting, Education & Training, Digital Forensics & Incident Response, Managed Detection & Response, and Cyber Investigations. Group-IB’s Threat Intelligence system has been named one of the best in its class by Gar tner, Forrester, and IDC. Group-IB’s Managed XDR, intended for proactively searching for and protecting against complex and previously unknown cyber threats, has been recognized as one of the market

leaders in the Network Detection and Response category by KuppingerCole Analysts AG, the leading European analyst agency, while Group-IB itself has been recognized as a Product Leader and an Innovation Leader. Gartner has named Group-IB a Representative Vendor in Online Fraud Detection for its Fraud Protection. In addition, Group-IB was granted Frost & Sullivan’s Innovation Excellence award for Digital Risk Protection (DRP), an Al-driven platform for identifying and mitigating digital risks and counteracting brand impersonation attacks, with the company’s patented technologies at its core. Group-IB’s technological leadership and R&D capabilities are built on the company’s 19 years of hands-on experience in cybercrime investigations worldwide and over 70,000 hours of cybersecurity incident response accumulated in their leading DFIR Laboratory, High-Tech Crime Investigations Department, and roundthe-clock CERT-GIB.

Group-IB is an active partner in global investigations led by international law enforcement organizations such as Europol and INTERPOL. Group-IB is also a member of the Europol European Cybercrime Centre’s (EC3) Advisory Group on Internet Security, which was created to foster closer cooperation between Europol and its leading nonlaw enforcement partners.

Group-IB’s experience in threat hunting and cyber intelligence has been fused into an ecosystem of highly sophisticated software and hardware solutions designed to monitor, identify, and prevent cyberattacks. GroupIB’s mission is to protect its clients in cyberspace every day by creating and leveraging innovative solutions and services.

NatioNal RouNdup 24 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

NETGEAR Exhibits its Advanced Security and Surveillance Solutions at IFSEC India 2022

NETGEAR, a global networking solutions provider exhibited its wide product portfolio at IFSEC India 2022, organized in Pragati Maidan Delhi. The three-day event observed a gathering of industry veterans, and solution providers with both channel partners and senior decision-makers from the government and private sectors, across the globe.

NETGEAR’s executive team including Annamalai AR, Senior Manager and Abhishek Anand, Senior Sales Manager were available at the stall to discuss in detail with the visitors NETGEAR’s top-ofthe-line technology incorporated in their products. In line with security and surveillance solutions, NETGEAR demonstrated its products ranging from Pro Wi-Fi Access Points, ProAV solutions, PoE Switches etc. at the event.

Speaking about the event Marthesh Nagendra, Country Manager – India, ME & SAARC, NETGEAR said, “We are privileged to be a regular participant of IFSEC India that offers solution providers the perfect platform to reach clients. Such events give us a great opportunity to tap into the vast potential presented in the market through

thought leadership, product & solution showcases and year-round networking. We are confident that this year also the event will be a great success providing us with a lot of business opportunities owing to our innovative and state-of-art product range.”

As the world continues to adopt technologies such as audio, video and control over Ethernet as their delivery method of choice, NETGEAR is working to pave the way for new and improved experiences across the developing industries through its products. Over the years, NETGEAR Business has led the way by successfully enabling more than 50 million businesses worldwide. The company has more than 200 switching products in the portfolio that can be leveraged to power cameras and other security and surveillance products. With such a large portfolio customers are able to custom-

ize and fine tune their solutions from our product line.

Today, AV over IP is a fast-growing market and for good reasons – high quality, low latency video and audio distribution with increased scalability has far more room for innovation. NETGEAR’s comprehensive portfolio of switches offers advanced configuration and a robust set of features that enable businesses to order exactly the combination of their needs with room to expand for the future. These switches also provide businesses the ability to connect any type of AV over IP device, which offers flexible speed options from 1 Gigabit up to 100 Gigabit per port.

NETGEAR Pro Wi-Fi Access Points are built with the latest wireless technology and superior antenna design to achieve the fastest wireless speeds possible. Designed for small and midsize businesses and high-end residential custom installs, the APs are available in a variety of sizes and capabilities to provide a choice of the coverage area for connected devices with the ability to be powered via PoE for single cable deployment. These access points deliver both wired and wireless access without compromising on security through network segmentation, critical data networks can be securely separated from guest or client networks through Virtual Local Area Networks (VLANs) without sacrificing bandwidth or wireless connectivity.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 25

Commvault Witnesses Significant Momentum in India for Metallic Portfolio Running on Microsoft Azure

Commvault, a recognised global enterprise company in intelligent data services across on-premises, cloud, and software as a service (SaaS) environment, recently announced an excellent momentum for its SaaS division

Metallic in India since it was made available in the country three quarters ago. Metallic’s rapid growth in India is a testament of the successful collaboration between Commvault and Microsoft, offering two cloud technologies –Microsoft Azure and Metallic SaaS – to meet the need for proven data protection backed by powerful scale and multi-layered security for Indian enterprises.

One of the key reasons behind Metallic’s success is that it was built in the cloud, using the best of Azure’s native capabilities while leveraging Commvault’s enterprise technology – the same technology stack that large enterprises have entrusted to protect their mission-critical apps and data.

Additionally, with features such as air-gapping and eDiscovery, Metallic enhances protection of data across SaaS offerings, such as Microsoft 365, Microsoft Dynamics 365 and more, in the case of accidental deletion, corruption and malicious attacks, in the cloud and beyond.

“As the threat landscape continues to evolve, it is imperative to support our customers with holistic data protection solutions in their digital transformation journey. Benefitting from the secure and hyperscale cloud capabilities of Microsoft Azure, Metallic SaaS delivers a powerful solution for storing and protecting business-critical data for enterprise organizations. Our joint customers are already beginning to witness tremendous value through the collaboration between Commvault and Microsoft,” said Aditee Rele, Director – ISV, Global Partner Solutions, Microsoft India.

Since its global launch two

years ago, Metallic has experienced amazing growth and accomplished what most start-ups would dream of:

● Rapid-fire portfolio expansion – more than tripling our offerings from global launch.

● Growing from 1M to $50M ARR in six quarters.

● Expansion to serve more than 2,000 customers, with availability in more than 30 countries around the globe.

● Launched an access programme for ThreatWise, the company’s new offering following its acquisition of TrapX.

In India, several customers including IndiGrid, Indiassetz, Marcellus and India Glycols, among others have highly gained from its association with Metallic to move fast, stay agile, and put security first as they modernize their business.

“Commvault delivers a structured backup and recovery solution, which is both fast, reliable, simple to manage. In today’s hyper connected

NatioNal RouNdup 26 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Customers like IndiGrid, Indiassetz, and Marcellus have become secure & agile while modernizing their business

world, it’s not just the product that holds fort for us, it’s support and expert services are equally important to drive adoption. Commvault team has been engaging, responsive and trustworthy, supporting us to achieve desired business outcomes. Using Commvault, we have not only seen a three-fold improved productivity of the infrastructure team but also minimized security risks, address regulatory compliances through a robust data strategy”, said Atul Govil, Chief Transformation Officer & Head (SAP & IT), - Corporate, India Glycols Ltd.

“Metallic is an easy-to-learn, easy-to-implement and easy-touse solution. We especially liked its simplified interface and unlimited storage across endpoint backups, Microsoft 365 and Salesforce, ensuring our data is always available and rapidly recoverable, even in case of a disaster,” shared Siddharth Joshi, Technology Head, Marcellus.

Vinay Khot, Chief Technology Officer, Indiassetz, commented, “With silent backup and granular restores, Metallic Endpoint Protection secures laptop data without impacting our Employee Productivity.”

“Metallic is what I would call, the best of both worlds. Its virtual air-gapped infrastructure and a built-in Zero Trust approach delivers uncompromised data security

 Data is an enterprise’s crown jewel, and the demand for a powerful data management solution is at an alltime high. Metallic has proven to be a game-changer in this dynamic business landscape in India, with our customers tackling even the most complex data problems with ease. Through our collaboration with Microsoft, we will continue to empower enterprises with innovative and trusted solutions 

while a predictable subscription model ensures long-term savings, with no capex investments”, said Aryan Panchal, Chief Digital Officer, IndiGrid.

Metallic, A Commvault venture, was established to bring next-generation software-asa-service (SaaS) data protection to the market, delivering Commvault’s powerful core technology simply through the cloud. Together with its partners, Metallic offers a growing portfolio of SaaS backup and recovery solutions to help today’s companies keep their data protected, compliant and safe

from deletion, corruption and attack. Metallic operates as a division of Commvault.

Commvault believes in data readiness. Commvault helps organizations of all sizes intelligently manage data through solutions that store, protect, manage and use their most critical asset – their data. Commvault software, solutions and services are available from the company and through a global ecosystem of trusted partners. Commvault employs more than 2,300 highly-skilled individuals across markets worldwide.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 27

Prama excellence Meet – Bengaluru Gets overwhelming response from security business community

end-users while creating brand awareness. The event got an overwhelming response from the security business community.

‘Prama Excellence Meet’ was organized to engage, enable and empower the partners’ community. It is enabling a convergence of all the security professionals, dealers and distributors community associated with PRAMA. It is happy moment to offer the indigenously manufactured products and solutions to the people.

India’s

premier indigenous security and surveillance product manufacturing company, Prama India had organised the fourth leg of the Pan India roadshow event on November 5, at Bengaluru. The ‘Prama Excellence Meet’ event was inaugurated in the auspicious presence leading dignitaries. The event created significant buzz among the security business community in Karnataka.

The company has organized a pan-India events of Prama Excellence Meet’ in the key metro cities including Ahmedabad, Mumbai and New Delhi. The event is being planned to bring high quality, security and surveillance products as well as the latest tech-innovations closer to potential partners and

Through the ‘Prama Excellence Meet’, PRAMA is embarking on a new journey to build brand, launch new products and develop new solutions while creating new milestones and setting new benchmarks. The company will strive for the organic growth and expansion of the brand at pan-India level. This event has presentations about latest technologies, products and solutions. This initiative will help the PRAMA ecosystem partners to grow their business.

Today being a security professional and entrepreneur, one has to think about the fast changing dynamics of the Indian security market instantaneously and apply appropriate strategies for the future roadmap. This is the crux of entrepreneurial experience. The different phases of growth require different strategies.

While moving forward with the vision of Aatmanirbhar Bharat, Prama India is working diligently to realise the dream of a self-reliant India into reality. As the industry moves to new technology frontiers, there is a need to focus on indigenous security product manufacturing. These security systems are helping to resolve the physical security challenges in the private, government and commercial segments.

A corporate presentation was given by Vinay Mishra, Senior Vice President, Projects, Prama India Pvt. Ltd. It was followed by the awards distribution ceremony for top performing distributors and partners. The exciting glimpses of PRAMA product portfolio theme were presented by Himanshu Jain,

Assistant Vice President, Projects, Prama India Pvt. Ltd. An elaborate presentation on the ‘Key security Trends in the Indian Security Market-2022’ was given by Gagan Lamba, Vice President, Enterprise Business, Prama India Pvt. Ltd.

An elaborate presentation on ‘Prama Software’ was given by Vinit Narvekar, Manager Customer Trainings, Prama India Pvt. Ltd. It was followed by a detailed presentation on ‘Indigenous Vertical solutions for Public Safety’ by Rajesh Palkar, Vice President, Government and Consultant Business, Prama India Pvt. Ltd. The next presentation was on ‘New Product Initiatives’, it was presented by Ashish Gu-

jarathi, Associate Vice President (AVP) – Non-CCTV Products, Prama India Pvt. Ltd. This event had product demo kiosks to give glimpses of a wide range of products and solutions. There was an exciting line-up of fringe programs at the event venue with exciting prizes.

Prama Achiever’s Awards were given to top performing distribution and system integration partners. The key highlights were exclusive technology updates, product presentations and networking meet. The event got a resounding success due to overwhelming response from the security professional community.

32nd IISSM Annual Global Conclave 2022

Security, Safety & Loss Prevention: Enablers for Nation Building

The 32nd Annual Global Conclave of the International Institute of Security and Safety Management was held on 18th and 19th of November 2022 in a Hybrid Mode. The venue for the physical part of the Conclave was Hotel Crowne Plaza, Okhla, New Delhi. In addition, many speakers and participants joined in the virtual mode. The theme of the Conclave for this year was ‘Security, Safety & Loss Prevention: Enablers for Nation Building.’ The Conclave during its two days had four keynote speakers and four panel discussions on contemporary topics.

The inauguration ceremony commenced with the National Anthem and the traditional lighting of the lamp. S K Sharma extended a hearty welcome to all the guests, speakers, delegates, and other dignitaries for attending the con-

clave. He appreciated the efforts of the team IISSM for inviting the best of minds across the globe and expressed his best wishes for the grand success of the deliberations which were to be conducted over the next two days.

Thereafter, R K Sinha Former MP (Rajya Sabha) and Executive Chairman – IISSM, gave an insight into the genesis leading to the establishment of IISSM. He enumerated the role of IISSM and thanked the Late K N Prasad, Padma Shri for his guidance in establishing IISSM and seeing it through its primitive years.

He highlighted the following aspects: a) The need to promote growth in as much as to understand the problem and thereafter, find workable solutions.

R K Sinha, Former MP (Rajya Sabha) and Executive Chairman – IISSM, and S K Sharma, Former Director General, NCRB & Chairman – IISSM are lighting the Lamp at the Inaugural function

b) IISSM in its last 32 years has trained thousands of professionals and continues to do so to enable professionals benefiting from these Training Programmes to enable them to carry out their job in a better way.

Rajan Medhekar, IPS (Retd.), former DG, NSG and currently the DG, IISSM proposed a vote of thanks, thanking R K Sinha for sparing his valuable time despite a very heavy official schedule to inaugurate IISSM Annual Global Conclave 2022. He also thanked all the dignitaries and delegates for their support.

This was followed by the keynote address by PM Heblikar, Director, Maxgrid Securicor (India) Limited and former Special Secretary, Government of India on the topic ‘Role of Security, Safety and Loss Prevention in Nation Building.’ He highlighted the need for viewing security at a macro level and not through a narrow prism. In addition, the

moderated by Shankar Subramnian with 4 eminent panelists. The panel member highlighted that security and safety must lie at the heart of a nation to ensure prosperity. There was a need for involving the citizens in more activities for supporting the Government and other agencies in ensuring a safe and secure ecosystem.

The second keynote address was delivered by DC Pathak (IPS), (Retd); Former Director, Intelligence Bureau on –‘Understanding Security, Safety and Loss Prevention.” He highlighted that technology should be taken as a force multiplier, since, information needs to be protected. He mentioned that approximately two-third of information breaches were due to the involvement of insiders.

new normal as an outcome of the Corona Virus Pandemic 2019 and the recent Russian-Ukraine war affecting global security. Thereby, highlighting the need for the Private Security Industries to shoulder additional responsibilities for better security, safety, and loss prevention.

This was followed by a Panel discussion on ‘Role of Security, Safety and Loss Prevention in National Growth,”

Next was panel discussion on the ‘Role of Security, Safety and Loss Prevention in National Growth,’ moderated by Col (Dr.) Inderjit Singh. The panelists highlighted how digital transformation had changed the concept of security, wherein, the army does not have to physically invade countries, thereby, shifting the battlefields down to mobile phones and the virtual arena. It was necessary to analyze and continually review the aspects of technology being used is safe.

Panel 2 is in progress – 3 Panel speakers online from Australia and Nigeria

(First Panel: in progress – 3 Panel speakers online PM Heblikar delivering Keynote Address online D C Pathak being felicitated by R K Medhekar

The second day of Conclave commenced with the keynote address by Jason L Brown, National Director, Thales, Australia & New Zealand. It was conducted online. Mr. Brown highlighted the strategy that needed to be developed, keeping in mind the relationship that a country is maintaining with the world. In addition, he highlighted the threats that have existed or can come to the fore in the future and the impacts that this would have on the businesses and the business environment.

This was followed by a product presentation by Pushkar Gokhale, VP & Business Head, Godrej Security Solutions. He highlighted how his company was developing solutions in consultation with the customers for example a fogging system to blind burglars had been developed by Godrej Security Solutions to counter the burglary threat.

smart cities. He highlighted the strategies and technologies required to improve the functioning of smart cities by using the internet of things and artificial intelligence technologies.

The keynote address was followed by the fourth panel, which discussed ‘Management of Security, Safety and Loss Prevention in Smart Cities; Strengths, Weaknesses, Opportunities and Threats,’ moderated by Col Sumit Monga, Lenovo. The panelists highlighted that the culture of working in silos needs to be shed and stressed the need for integration of all the systems and services to draw maximum benefits. In addition, the need to balance between the opportunities and threats, viz-a-viz the privacy aspects must be done.

The Valediction Ceremony of the 32nd IISSM Annual Global Conclave was done by R K Sinha who mentioned that the Conclave was conducted in the hybrid mode on an experimental basis. This experiment was found to be successful, since, in addition to the participants who were present physically, lots of participants had joined in the virtual mode. During the last

Next panel discussion on ‘Cyber Security, Robotics and Drones in Security, Safety and Loss Prevention’ was moderated by Dr. MJ Shankar Raman, IIT Madras. The panel highlighted the need to cater to future threats and the technology required to be developed as countermeasures to defeat those threats. In addition, the scope and threats from drones, the use of artificial intelligence, and possible countermeasures were discussed.

Post lunch the conclave commenced with the keynote address by David Cavanagh, Managing Director, Integrated Energy Private Limited and Chief Hydrogen Officer, Hydrogen West, Australia. Some of the aspects highlighted related to how to improve the efficiency in the functioning of

two days, it was very pleasing to note the interaction between the panelists and participants. The question-answer sessions, after all the panel discussions were very interesting and invigorating. He mentioned that despite tremendous leaps made by technology, the human element would continue to stay in the field of security, safety, and loss prevention.

Thereafter, a vote of thanks was proposed by DG-IISSM and the Conclave came to a close with the playing of the National Anthem.

Panel 3: in progress – 2 Speakers online Keynote Address by Mr. David Cavanagh Jason Brown delivering Keynote address online Panel 4: in progress – 2 speakers online

Samriddhi Signs MoU with Sahasra Electronics

Sahasra & IT ACCESSORIES

Sahasra Electronics to supply ‘Made in India’ memory chips and solid-state drives to

Sparsh

PLI awardee and Indian ODM Sahasra Electronics signed MoU with DLI awardee Samriddhi Automations Pvt. Ltd. (Sparsh CCTV), India’s leading Indian CCTV and surveillance systems designer and manufacturer, to supply made in India memory chips and solid-state drives.

A major development in India’s aspiration to become self-sufficient in semiconductors, this MoU between Sparsh and Sahasra is a validation of the GoI’s strategy to promote electronic manufacturing through the PLI prog ram.

Sahasra is setting up a state-ofthe-art plant with Japanese/ Taiwanese technology for OSAT of semiconductor ICs. In Phase-I Sahasra will focus on memory ICs and memor y Subsystems. Memory semiconductors constitute 20% by value of the $550 BN semiconductor market and set to grow to 3x% of $1.0 TN semiconductor market by 2030.

Speaking on the occasion Sanjeev Sehgal, MD Sparsh said, “This is the next step in designed and made in India security system, where memory and storage semiconductor will be of Made in India.” He highlighted that in the six layers of cyber security, hardware assurance is the first and most critical level that needs to be fulfilled. Sparsh is committed and working towards full backward in -

tegration, achieved more than 85% domestic value addition (VA) as per PPP-MII Policy and now working towards Atmanirbhar Bharat on semiconductors.

With India already a major center for semiconductor design, this capability being set up by Sahasra will soon see designed and made in India semiconductors being shipped out.

Speaking on the occasion Amrit Manwani, CMD, Sahasra Semiconductors said we will commence manuf acturing next month with Micro SD & SD cards. Once the production stabilises we plan to move up the value chain to NAND Flash BGA and eMMC & eMCP packaging. This will enable the memory product OEMs to source memories locally that will be truly

‘Made in India.’ The memories will be used in pen drives, SSDs, mobile phones, laptops, desktops and tablets. Sparsh has launched IP cameras and recorders with in-built memory, bringing in next-generation products in video surveillance domain.

In a MoU signing ceremony hosted by ELCINA at Delhi and graced by senior officials from MEITY and India Semiconductor Mission, Joint Secretary Amitesh Kumar Sinha, said that this is a major development for the country on its journey to ATMA Nirbharta in Semiconductors. To give further impetus to the industry in this mission, he added that the GoI will soon be coming out with schemes to attract more Semiconductor FABs and OSATs into the country.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 33

Industry will have to Create a Sustainable Approach to drone Manufacturing in India

The PHDCCI Defence & HLS Committee recently organized the Industry Interactive Conference ‘Roadmap for Indigenisation of UAVs at PHD House, New Delhi. The key objective of this Conference was to discuss on the achievable roadmap for indigenising the manufacturing of UAVs and counter UAVs as they are needed in multi sectors and India has to develop its indigenous capability for its growing future needs.

Air Vice Marshal Rajiva Ranjan, VM, Assistant Chief of Integrated Defence Staff (ACIDS) (PP & FS), Headquarters Integrated Defence Staff (HQ IDS), Ministry of Defence was the Chief Guest for the Conference. AVM Ranjan gave his forthright views on India’s drone market, the armed forces perspective and pointers for the industry and spoke of global trends and how the character of war has changed in the recent past and so has the technology with the 4th industrial revolution. He also highlighted that the weakness in the entire value chain was in the ideation phase and subsequently

in the inability to convert that into a product. Industries must be involved during the Preliminary Design Review and Concept Design Review phases to be able to create a product roadmap and execute it right first time. He also put forth that industry consider the Essential Parameters B of any RFP to the benefit of the Armed Force. AVM Ranjan also suggested that while the opportunities exist the industry must come forward and register their company and products with the concerned agencies like IDS, DGQA and DDP.

Dr. (Smt.) Ranjana Nallamalli, Scientist ‘G’, Director, Directorate of Systems and Technology Analysis (DSTA) Defence Research and Development Organisation (DRDO) said that many subsystems of UAVs are still procured from abroad – Carbon fibre, core aerodynamics, camera. She also highlighted that 40% of TDF funding can be used to engage academia.

Arjun Kumar, DRDS Additional Director & Scientist Directorate Technology Development Fund (TDF)

Defence Research & Development Organisation Ministry of Defence, Govt. of India gave a detailed presentation on their sanctioned projects and the underlying opportunities to MSMEs & Start-Ups through funding support and assistance in product development.

Col. Manik Anand, Planning Officer (Aerospace) Department of Defence Production Ministry of Defence, Govt. of India highlighted the various initiatives taken by the DDP to promote the MSMEs & Start-Ups in the Defence & aerospace sector.

Col. Sanjeev Nair (Retd.), Program Director, DIO-iDEX Department of Defence Production Ministry of Defence, Govt. of India encouraged the industry to apply for projects even with proof of concept, not limit to sanctioned/ uploaded projects.

Rudra Shriram, Chair, Defence & HLS Committee, PHDCCI & Joint President, DCM Shriram Ltd explained how Drone technology and startups are helping solve several real-world problems like high utility bills and poor security by bringing innovative solutions using drones.

Mridul Babbar, Director & Co-Founder, Sagar Defence Engineering highlighted the various opportunities particularly in the Drone Industry.

Smit Shah, President, Drone Federation of India (DFI) explained how Drone Federation of India is working towards operationalizing procedures and processes for the drone industry.

Prof. Sudipto Mukherjee, Ford Chair Professor, Department of Mechanical Engineering, IIT Delhi, shared the various initiatives and support that they are giving to the Startups and MSMEs in the defence and aerospace sector.

R. K. Narang, Director – Strategic Initiatives, Drone Federation of India (DFI) talked about how Indigenisa-

tion is bridging gaps, reducing vulnerabilities, increasing design, manufacturing and exports and also highlighted the real challenges on the subject.

Col. Ramit Arora, Senior Vice President, NewSpace Research & Technologies gave insight that 17 to 18 cases of autonomous flying drones being progressed by the Indian Army and NSRT produces 100% indigenous products.

Abhinav Varrey, Head of Sales & Communication, JOHNNETTE Technologies Pvt. Ltd explained how JOHNNETTE is working closely with IA for a project for the last 1-1.5 years.

Rimanshu Pandey, Co-Founder and CTO, TSAW Drones shared his thoughts on civil space and explained about their organisation projects.

The session was moderated by Col. K V Kuber, Indian Army Veteran, Director – Aerospace & Defence, Ernst and Young.

It was attended by more than 150 industry delegates especially from the Start-Ups & the MSMES.

Consistent Showcases its Extensive Make-In-India Security, Surveillance & Networking Portfolio at IFSEC India 2022

Withyears of expertise in the field of Information Technology, Security & Surveillance, Networking, Electronics and Print Consumables Consistent Infosystems Pvt. Ltd. participated in South Asia’s largest security, surveillance & networking expo and conference – IFSEC India 2022 held from 1st to 3rd December 2022. Consistent displayed its security, surveillance, protection and networking portfolio that has been built under Make-in-India initiative after deep research, employing in-depth tech solutions, and multiple tests.

As a technology solution Indian brand that has a consistent futuristic approach towards all its products and innovations, has become a major market player in the Security, Surveillance and Networking domain of the country. Founded by Nitin Bansal and Yogesh Agarwal in 2011, the brand has achieved a decade-long experience and significant market share in India.

At IFSEC, the tech-based products of Consistent that were showcased are CCTV cameras, CCTV SMPS, Wireless Routers, 4G USB Dongle, PoE Switches, CCTV cables, CAT6 cable, Micro SD cards, HDDs,

and Networking Racks etc. Besides this, Consistent also showcased its LED Monitors and LED TVs which goes with security & surveillance solutions at the Expo.

In a statement, the CEO of CONSISTENT Infosystems Pvt Ltd, Yogesh Agarwal said, “We are confident that IFSEC India 2022 will assist us in giving our products greater exposure. The platform will significantly help us understand the changing trends, meet with industry-level experts and enable us to further disrupt the security surveillance and networking industry in the future.”

Security and protection are the necessities of today. Consistent was launched with the belief that the future needs to be smarter, better and best for mankind. It has remained firm on this ideology and has innovated products that align with the modern needs of households and commercial properties.

A detailed look at the product range that was on display are as follows:

CCTV IP Camera

It features IP6, completely weather-proof. It gives three access

adjustment housing and a strong single-anti-interference ability. The operating temperature has a range of 10°C to 50°C. Bullet and dome both models of cameras are available.

CCTV Camera SMPS

Security cameras are as good as nothing without a power supply. Consistent’s 4 Port and 8 Port and switching type as well as single output type CCTV power supply units are intricately designed for power supply-based security cameras. The brand uses high frequency switching technology that makes the final product not just compact but also reliable. Additionally, it has power LED indicators.

CCTV & Networking Cables

Consistent’s CAT6 and 3+1 CCTV cables are fit to be used in homes, buildings, industrial buildings and other commercial properties. The brand’s wire comes with one hundred percent conductivity. These cables are long-term durability and also come with extra density shields.

NatioNal RouNdup 36 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
surveillance, protection and networking products
manufactured
in-india
Security,
are
under make-
initiative after deep research, employing in-depth tech solutions, and multiple tests

Networking Racks (2U/ 4U)

Consistent DVR Rack DVR walls mount are specially designed for CCTV surveillance network rack and are available in two variants 2U/ 4U. Modular Rack – DVRs/ NVRs/ Switches Size – 2U, Network Rack – Modular Rack – DVRs/ NVRs/ Switches Size – 4U.

4G Dongles & Wireless Routers

eos, documents etc. that buyers need to be a portable for backup PC or serve as a network drive Hard Disk Drive (HDD) utilizing magnetic storage to store and retrieve computerized information data media one or more rigid rapidly rotating platter coated with magnetic things. These are available in 4TB, 6TB and 8TB capacities.

MicroSD Memory Card

LED Television exhibits vigorous sets for high-definition picture delivery large screens made up of thousands of extremely bright LED lights. The size of LED’s is mostly too big and full of chunks to use in TVs, but they are ideally suited as a light source for backlighting LCD crystals.

Consistent

showcased dongles that offer different functionalities, such as providing mobile internet access, speeding data transfer, running secured software, or connecting multiple devices to the computer. Also, its high-end plug and play routers enables wireless network packet forwarding and routing, and serves as an access point in a local area network. It works much like a wired router but replaces wires with wireless radio signals to communicate within and to external network environments. The range includes dual-band Wi-Fi. Extensive range with Beam-forming. Router/ access point/ range extender multiple modes. IPTV and 4K TV supported 4G/ LTE band of wireless connectivity.

HDD Storage

Consistent’s

Made in India HDDs are typically one of the best HDDs with huge space to store data and are used for images, vid-

Consistent

MicroSD card is no ordinary card. It is a high-endurance MicroSD card that provides higher storage and longer recording hours. Slow speeds and dropped frames can never be an issue when this card is put to use in continuous-use security cameras. Available in three capacities 64GB, 128GB and 256GB.

LED Monitor & LED Television

Consistent Ultra-Slim Full HD LED Monitors are available in 22-inch and 24-inch variants. The new displays feature enhanced picture quality for crisp and sharp images apart from inbuilt stereo speakers for incredibly clear audio performance. Additionally, VGA and HDMI inputs are compatible with all known operating systems (Windows, Mac, Linux etc.) making them perfect displays for every use – be it desktops, laptops, servers, gaming rigs, and more. Consitent’s

Consistent Infosystems Private Limited is a leading provider of IT hardware products, security & surveillance products, print consumables products, and electronics & home entertainment products in India. It started its journey back in the year 2011 from the capital city of India, New Delhi. Since the venture started Consistent Infosystems Private Limited has become one of the fastest-growing Indian IT organizations in the era of technology and has already put its remarkable footprints in the Information Technology, Electronics & Home Entertainment industries.

With its world-class technical support and servicing along with multiple service centers across the country the organization has ensured complete customer satisfaction. Quality and Service are the only modus operandi for Consistent Infosys Private Limited and with these parameters in sync, the brand has defined the working ethics of the organization nationally as well as on a global level.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 37

Hikvision Creates an UltraHigh-Definition Experience with all-Encompassing 8K Solution

Recently, there has been much talk out ultra-high-definition solutions in the security market. More often than not, media has focused on 8K cameras. Nevertheless, a True 8K solution requires more than just UHD cameras. Hikvision stands out from the crowd by providing an all-encompassing solution powered by front- and backend products with 8K capabilities

The trend toward clear, high-definition imaging

As Hikvision predicted earlier this year in its Top 8 trends for the security industry in 2022,

crystal clear imaging has continued to be a basic requirement in the security industry. The ability to zoom into large scenes to view exact details without loss of quality is crucial for security management. The enormous value in employing high-definition cameras with 8K resolution to ensure clear imaging in the case of security incidents cannot be overstated.

8K cameras come equipped with dedicated Image Signal Processors (ISPs) that convert RAW images from high-performance imaging sensors into high-quality images, as well as carry out various types of image processing effectively and effortless-

ly. ISP algorithms including de-mosaicing, de-noising, de-blurring, and sharpening all help to deliver enhanced imaging with reduced visual noise and well-preserved details.

Nevertheless, even when 8K technology gives people an unprecedented capacity to get more detail from a scene, these resolutions come with tradeoffs – they require higher processing power than other forms because there’s so much information being processed at once. In addition, they also need storage devices compatible with the 8K standards to access, store, transfer, decode, and output videos, before video images can be viewed. Without 8K NVRs and displays, 8K cameras would just be superfluous.

Hikvision’s all-encompassing 8K solution

In order to deliver a ‘True 8K’ experience to users, Hikvision has developed a total solution, complete with 8K cameras, 8K NVRs, and 8K displays. Cameras such as the 32MP 360° Panoramic & PTZ Camera and 32MP 180° PanoVu Network Camera are capable of capturing ultra-high-resolution video images – specifically 7680x4320 pixels – which is four times the resolution of 4K and 16 times that of 1080p.

At the back-end, Hikvision recently launched its M-Series NVRs to handle video access, storage, transfer, decoding, and rendering of 8K images. Videos can then be displayed on 8K LED screens made up of P0.9 Fine Pixel Pitch COB LED Display Units. The combination of these front and back-end products takes full advantage of the power of 8K technology, and offers a ‘True 8K’ experience with incredibly clear imaging with fluid preview and playback. But here is one of the most significant advan-

tages to this solution – since 8K resolution displays images with intricate detail, it lays the foundation for more precise and efficient video analytics. With 8K imaging, AI recognition rates improve significantly, and video analytics provides security operators with highly accurate alerts and clear image detail, enhancing their ability to effectively intervene and take action when an incident occurs. In other words, the whole investment pays off better on every level.

Even when videos are manually reviewed for real-time monitoring or post-incident investigation, the ultra-clear, true-to-life 8K visuals provide images that are rich in detail, improving security operators’ target identification ability, providing them the most accurate evidence available to investigate and promptly respond to an event.

With

such powerful front and back-end products, Hikvision’s all-encompassing 8K solution gives customers an extremely clear and detailed visual experience in all kinds of scenarios. The solution significantly boosts video content analysis, forensic evidence gathering, security staff resources, and more. The LED display products provide a more vivid – even stunning – visual experience, as 8K cameras and 8K NVRs are used in both indoor and outdoor spaces such as airports, harbors, public halls, squares, stadiums, stations etc., where wider angles of view, and sharper, more detailed images are required. They empower users from all kinds of industries with the capacity to zoom into large scenes to view strikingly realistic details without quality loss.

A total solution that serves users from all kinds of industries

Synology Records 100% Growth in India YoY since 2019

Synology, a pioneer and one of the world leaders in data storage and management, recently unveiled its game plan for achieving 300% growth in 2023, riding on its track record of 100% growth YoY in India since 2019 and the strength of its new range of data storage and backup, file collaboration, video surveillance, and network infrastructure solutions.

Synology has been growing exponentially YoY in revenue, units shipped, installed base, customers, and active partner accounts since 2019. Synology server deployments in India have doubled YoY, especially among Small and Midsize Businesses (SMBs), emerging as key growth drivers for the company. The manufacturing sector, seeking multi-site solutions to share and sync mission-critical data, accounts for more than 30% of Synology revenues in India. Professional services (ex. hospitals) seeking on-demand data protection, security and backup solutions, and the entertainment industry seeking PETA volume data storage and high I/O data management solutions follow with a 15% share each.

Events since 2019 have changed the way businesses and their employees manage and share data, testing organization-wide IT resilience. During the pandemic, Synology NAS used for file collaboration and remote access fulfilled a critical need

for SMBs and enterprises to have an integrated infrastructure providing networking, collaboration, security, and file storage solutions, to minimize IT efforts and enable them to focus on running their business in a challenging environment. Designed to simplify and empower users, regardless of skill level, to tackle common IT issues, Synology NAS servers enhanced the business resilience of SMBs.

“The Indian economy is poised for exponential growth in 2023 and beyond. Our new line of data management solutions enables us to address unmet market demands and drive digital transformation for customers in India,” said Michael Chang, Regional Sales Head, Asia Pacific, Synology.

Staying at the forefront of data management, Synology is bringing new possibilities to the table, including solutions for data storage and backup, file collaboration, video surveillance, and network infrastructure – all designed with one goal in mind – presenting a centralized platform to simplify IT administration while driving digital transformation for enterprises, SMBs and SOHO users in India. Encompassing all products and spanning data management, data protection, and IT infrastructure security, the newly launched Synology solutions will transform the way data is stored and managed setting the bar even higher for reliability, security, and scalability.

NatioNal RouNdup 40 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Aiming 300% growth in 2023 with the launch of innovative solutions for data storage and backup, file collaboration, video surveillance, and IT infrastructure security

Data Management Solutions

SMB multichannel transfer support makes use of all network connections available between servers and clients to greatly boost SMB file transfer performance.

Scale Out NAS – Next-Gen Storage Servers

Protect Data Against Ransomware and Cyberthreats With DSM 7.2

Expected in early 2023, DSM 7.2 will introduce full-volume encryption, offering greater peace of mind while boosting storage performance by 48% over shared folder-based encryption. DSM 7.2 will also introduce ‘write once, read many’ (WORM) folders. These tamper-proof folders prevent modification or deletion of data during a set period of time. And just like new immutable backups in Hyper Backup, which bar any changes after creation, it helps protect data against ransomware and cyberthreats.

Share and Collaborate with Ease Using Synology Drive

Updates to Synology’s private cloud solution, Synology Drive, help keep files safe during sharing between teams with watermarks and download policies. Remote wipe capabilities help minimize security risks by removing synced folders from stolen Windows and macOS clients. Automatic login with AD credentials following mass deployment, as well as the provisioning of backup and syncing tasks, make mass deployment simpler. Sharing data over SMB will be safer and more efficient in DSM 7.2. Cross-protocol file locking between SMB file shares and Synology Drive ensures that in-use files are not edited or overwritten. And

Also

launching in 2023 are new scale-out systems designed for file and object storage. Scale-out clusters will be considerably faster than Synology’s current largest solutions, with near linear scaling of performance and capabilities as more units are added. The first generation of scale-out systems will support clusters of up to 60 servers for more than 12PB of effective storage, over 60GB/s sequential write performance, and more than 80,000 concurrent connections. The clusters will offer upwards of 99.99% availability and support Synology’s Hyper Backup and Active Backup data protection suites.

Data Protection Solutions

Worldwide Backup Management Platform

Anew

management platform for Active Backup and C2 Backup aims to enable seamless management, deployment, and monitoring of backup tasks across an organization’s IT infrastructure, regardless of location or scale. The new platform

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 41

brings together Synology on-premises and cloudbased solutions, providing IT admins and MSPs with the most efficient tools to protect and ensure timely recovery of any device or service.

Video Surveillance

Synology 500 Series AI-Powered Cameras

Launching in early 2023, Synology 500 Series IP cameras will offer superior performance, security, and integration, with all camera settings managed directly from Surveillance Station. Edge AI capabilities, such as guarding intrusion detection zones, free up recording server resources to allow larger AI-powered deployments, while dedicated processing speeds up people and vehicle searches anywhere in the video frame. Coming in two form factors, Synology 500 Series cameras feature 5MP sensors for wide-angle 16:9, 3K (2880x1620) recording at 30fps. The cameras support PoE and are weatherproof (IP67), enabling flexible placement indoors or outdoors. Synology 500-series cameras are US NDAA/ TAA compliant and are designed for security, introducing similar security innovations and hardening methods found on Synology enterprise products.

Networking Solutions

WRX560 Wi-Fi 6 Router with

Advanced

Networking

Features

Building on the SRM 1.3 platform, the new WRX560 brings the same high-end network

management features from the RT6600ax into a more affordable price point. With powerful internal dual-band radios and a 2.5GbE LAN/ WAN port, WRX560 can easily be added as a mesh node to any RT6600ax router or utilized as a standalone solution for homes and offices.

Hybrid-Cloud Services

Active Insight – Automated Breach and Misuse Detection

Insight is evolving to automatically prevent user activities in breach of data protection rules. The new data loss prevention feature monitors user activities such as logins, file access, sharing task creation, while comparing checksums of files that are uploaded or shared. When thresholds or rules are triggered, the system can either send

Active

NatioNal RouNdup 42 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

alerts or take actions, such as disconnecting clients suspected of being infected by ransomware.

Synology C2 Identity Platform –Securing Devices and Credentials

The Synology C2 Identity platform continues to grow, with a heavy emphasis on blending good security practices with convenience. In 2023, C2 Identity will receive several improvements to enable passwordless logins to both online and local services and devices. Integration with Windows Hello and Apple’s Face ID/ Touch ID facilitates easy authentication on endpoints managed by C2 Identity. And combined with an upcoming C2 Identity user portal, employees using managed endpoints can be automatically signed in to web services supporting SAML, with the option to enable 2FA for more sensitive services such as a company’s ERP or CRM systems.

Synology solutions help manage and protect the world’s data. At its core, Synology is transforming how customers store and manage their data, from flash to disk to multiple cloud architectures – at the scale needed to accommodate the exponential data growth of the digital world. The Synology product portfolio encompasses a wide array of data storage and backup, surveillance, networking, and cloud solutions that enable customers to organize, protect, and share data regardless of scale, infrastructure, and expertise. With over 10 million installations and 70+ Exabytes of data currently managed by its devices, Synology solutions offer a centralized platform to simplify IT administration while driving digital transformation for businesses worldwide. In India, the company has a large customer base, an extensive network of reseller, SI, and VAR partners, and a rapidly expanding market share.

ASIS New Delhi Chapter #207 AGM

ASIS New Delhi Chapter #207 recently held their Annual General Meeting (AGM) 2022 at Hotel Le Meridian, New Delhi. The event witnessed over 120 security industry professionals in attendance with high zeal and enthusiasm. The event had a great agenda. After the welcome speech, Dr. Firoze, CSO, Delhivery took over the podium and elaborately spoke on the subject of ‘Expanding Role of CSOs.’ Further Abhay Ranjan, DirectorBusiness Development, Acktron Security System (P) Ltd. explained the understanding and requirement of ‘NDAA Compliance.’ Chapter Chair Harvinder Singh and Chapter Treasurer Pravesh Tiwari took the audience through various chapter details, activities and statement of account and compliances.

Post presentations all the volunteers from various committees were felicitated for their valuable contribution and services for the chapter activities.

The event also witnessed the introduction of the newly elected chapter core committee members by the election officer. The chapter office bearers of ASIS New Delhi Chapter #207 for the year 2023 are Harvinder Singh –Chapter Chair, Pravesh Tiwari – Chapter Vice Chairman, Girish Kaushik – Chapter Secretary, and Maj. Vashita Mehra – Chapter Treasurer.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 43

Matrix Presented its Enterprise Grade Solutions Covering Security and Telecom at Matrix Partner Connect, Lucknow

With its establishment three decades ago, Matrix has been a growing name across Telecom and Security domains internationally. Matrix covers the entire security and communication needs of organizations ranging in all sizes with its extensive solution range in the domain of Video Surveillance, Access Control, Time-Attendance, and Telecom.

Matrix focuses on providing customer-centered technology-driven solutions by providing world-class products indigenously researched, designed, and developed in India. With research and development consisting of 40% of its human resources, Matrix has a wide range of 60+ technologically advanced products spread across its 4 domains. With a worldwide network of 2500+ Partners serving over 1 million users globally, Matrix solely focuses on sales through its channel partners.

With intensive research at the forefront, Matrix builds innovative enterprise-grade solutions on a national and international scale. To highlight these latest innovations in the security and telecom domain, Matrix presented its ideation event – MATRIX PARTNER CONNECT 2022. To bridge the gap surrounding the pandemic, through this event, Matrix converged with partners and system integrators for furthering business possibilities.

Working hand in hand with its channel partner – MIRACLE AUTOMATION, Matrix rolled out its next episode of MATRIX PARTNER CONNECT in the city of Lucknow. With its status as a defense corridor, fastest-growing infra, and largest spiritual circuitry, Lucknow has become a city with a growing industrial presence. Especially with full-fledged connectivity to various nearby industrial hubs, Lucknow – this ‘heart-of-the-nation’ location is a spot with extensive potential for growing Matrix Business and its SI network. The event was held at the Centrum, Lucknow.

In this edition of Partner Connect, Matrix put out its entire IP Video Surveillance solutions that consist of server-based enterprise-grade NVRs, UL-listed Cameras, Matrix VMS, and more. Focusing on customer challenges

NatioNal RouNdup 44 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

such as bandwidth utilization, storage cost, managing multi-site offices, and reactive security, Matrix supplements all organizational needs. On-display Cameras included the Matrix range of Turret, Dome, Bullet, and PTZ Cameras. Ranging from 2MP to 8MP, Matrix Cameras are stamped with UL Certification, a global standard for safety, and NEMA Certification for protection against environmental hazards, providing high-clarity images for better scenario detailing. Alongside this, Matrix put forth its Server-based Enterprise grade NVRs on display. With Pre-installed Video Management Software supporting redundancies and hot-swappable hard disks – HDD/ SSD capable of up to 144TB storage capacity, this tech marvel suffices all organizational security concerns.

When it comes to Access Control and Time-Attendance, Matrix is the only OEM that manufactures all the elements ranging from panels, door controllers, and readers to software in-house. Within the segment of Time-Attendance, Matrix presented its Aadhaar Enabled Biometric Attendance

Device (AEBAS) designed explicitly for government organizations – COSEC VEGA FAXQ. Using Aadhaar information from the UIDAI server securely, this device helps the government accurately mark the attendance of their employees. Besides this, Matrix displayed its best-in-class facial recognition-based door controller boasting high accuracy, an identification speed of less than 0.5 sec, and a massive user capacity of 50K – COSEC ARGO FACE. Incorporating multiple connectivity options such as Wi-Fi, PoE, and Ethernet, these devices provide the best for modern organizations.

In Access Control Domain, Matrix showcased its Multifaceted Site Controller controlling up to 255 COSEC door controllers and 25,000 Users – COSEC PANEL200P. Also, Matrix brought its pure access door controller with multiple benefits over the conventional access control terminal – COSEC ARC DC200P. Its PoE abilities and multiple mounting options make it easy to install even in constrained spaces with minimalistic wiring. This event showcased the entire Matrix access control product range.

In the domain of Telecommunications, Matrix is the sole OEM that puts forward all the business communication products and solutions. Under the umbrella of Telecom solutions, Matrix presented its product and solutions consisting of PBXs, IP-PBXs, Server-based PBXs, Media Gateways, Communication endpoints, and softphones.

Anil Mehra, Senior VP-Sales and Marketing stated, “With its exclusive event – Matrix Partner Connect 2022, Matrix wishes to bring all System Integrators and Business prospects on the same platform. Through this event, one of our major aims is to connect with organizations through system integrators, present our successful case studies internationally, and demonstrate how Matrix caters to various verticals through our enterprise-grade solutions.”

SecurityLinkIndia | December 2022 | www.securitylinkindia.com 45

FortiGuard Labs Predicts the Convergence of Advanced Persistent Threat Methods with Cybercrime

Fortinet®, a global company in broad, integrated, and automated cybersecurity solutions, recently unveiled predictions from the FortiGuard Labs global threat intelligence and research team about the cyberthreat landscape for the next 12 months and beyond. From quickly evolving Cybercrime-as-a-Service (CaaS)-fuelled attacks to new exploits on non-traditional targets like edge devices or online worlds, the volume, variety, and scale of cyberthreats will keep security teams on high alert in 2023 and beyond. Highlights of the predictions can be found below, but for a more detailed view of the predictions and key takeaways for CISOs, read our blog.

1) Success of RaaS is a Preview of what is to Come with CaaS

Givencybercriminal success with Ransomware-as-a-Service (RaaS), a growing number of additional attack vectors will be made available as a service through the dark web to fuel a significant expansion of Cybercrime-as-a-Service. Beyond the sale of ransomware and other Malwareas-a-Service offerings, new a la carte services will emerge. CaaS presents an attractive business model for threat actors. With varying skill levels they can easily take advantage of turnkey offerings without investing the time and resources up front to craft their own unique attack plan. And for seasoned cybercriminals, creating and selling attack portfoli-

os as-a-service offers a simple, quick, and repeatable payday. Going forward, subscription-based CaaS offerings could potentially provide additional revenue streams. In addition, threat actors will also begin to leverage emerging attack vectors such as deepfakes, offering these videos and audio recordings and related algorithms more broadly for purchase.

One of the most important methods to defend against these developments is cybersecurity awareness education and training. While many organizations offer basic security training programs for employees, organizations should consider adding new modules that provide education on spotting evolving methods such as AI-enabled threats.

2) Reconnaissance-as-a-Service Models could Make Attacks more Effective

Another aspect of how the organized nature of cybercrime will enable more effective attack strategies involves the future of reconnaissance. As attacks become more targeted, threat actors will likely hire ‘detectives’ on the dark web to gather intelligence on a particular target before launching an attack. Like the insights one might gain from hiring a private investigator, Reconnaissance-as-a-Service offerings may serve up attack blueprints to include an organization’s security schema, key cybersecurity personnel, the number of servers they have, known external vulnerabilities, and even compromised credentials for sale, or more, to help

NatioNal RouNdup 46 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Advanced persistent cybercrime enables new wave of destructive attacks at scale fueled by Cybercrime-as-a-Service

a cybercriminal carry out a highly targeted and effective attack. Attacks fueled by CaaS models means stopping adversaries earlier during reconnaissance will be important.

Luring cybercriminals with deception technology will be a helpful way to not only counter RaaS but also CaaS at the reconnaissance phase. Cybersecurity deception coupled with a digital risk protection (DRP) service can help organizations know the enemy and gain advantage.

3) Money Laundering gets a Boost from Automation to Create LaaS

To grow cybercriminal organizations, leaders and affiliate programs employ money mules who are knowingly or unknowingly used to help launder money. The money shuffling is typically done through anonymous wire transfer services or through crypto exchanges to avoid detection. Setting up money mule recruitment campaigns has historically been a time-consuming process, as cybercrime leaders go to great lengths to create websites for fake organizations and subsequent job listings to make their businesses seem legitimate. Cybercriminals will soon start using machine learning (ML) for recruitment targeting, helping them to better identify potential mules while reducing the time it takes to find these recruits. Manual mule campaigns will be replaced with automated services that move money through layers of crypto exchanges, making the process faster and more challenging to trace. Money Laundering-as-a-Service (LaaS) could quickly become mainstream as part of the growing CaaS portfolio. And for the organizations or individuals that fall victim to this type of cybercrime, the move to automation means that money laundering will be harder to trace, decreasing the chances of recovering stolen funds.

Looking outside an organization for clues about future attack methods will be more important than ever, to help prepare before attacks take place. DRP services are critical for external threat surface assessments, to find and remediate security issues, and to help gain contextual insights on current and imminent threats before an attack takes place.

4) Virtual Cities and Online Worlds are New Attack Surfaces to Fuel Cybercrime

The metaverse is giving rise to new, fully immersive experiences in the online world, and virtual cities are some of the first to foray into this new version of the internet driven by augmented reality technologies. Retailers are even launching digital goods available for purchase in these virtual worlds. While these new online destinations open a world of possibilities, they also open the door to an unprecedented increase in cybercrime in unchartered territory. For example, an individual’s avatar is essentially a gateway to personally identifiable information (PII), making them prime targets for attackers. Because individuals can purchase goods and services in virtual cities, digital wallets, crypto exchanges, NFTs, and any currencies used to transact offer threat actors yet another emerging attack surface. Biometric hacking could also become a real possibility because of the AR and VR-driven components of virtual cities, making it easier for a cybercriminal to steal fingerprint mapping, facial recognition data, or retina scans and then use them for malicious purposes. In addition, the applications, protocols, and transactions within these environments are all also possible targets for adversaries.

Regardless of work-from-anywhere, learning-from-anywhere, or immersive experienc-

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 47

es-from-anywhere, real-time visibility, protection, and mitigation is essential with advanced endpoint detection and response (EDR) to enable real-time analysis, protection, and remediation.

5) Commoditization of Wiper Malware will Enable more Destructive Attacks

Wiper malware has made a dramatic comeback in 2022, with attackers introducing new variants of this decade-old attack method.

According to the 1H 2022 FortiGuard Labs Global Threat Landscape report, there was an increase in disk-wiping malware in conjunction with the war in Ukraine, but it was also detected in 24 additional countries, not just in Europe. Its growth in prevalence is alarming because this could be just the start of something more destructive. Beyond the existing reality of threat actors combining a computer worm with wiper malware, and even ransomware for maximum impact, the concern going forward is the commoditization of wiper malware for cybercriminals. Malware that may have been developed and deployed by nation-state actors could be picked up and re-used by criminal groups and used throughout the CaaS model. Given its broader availability combined with the right exploit, wiper malware could cause massive destruction in a short period of time given the organized nature of cybercrime today. This makes time to detection and the speed at which security teams can remediate paramount.

Using AI-powered inline sandboxing is a good starting point to protect against sophisticated ransomware and wiper malware threats. It allows real-time protection against evolving attacks because it can ensure only benign files will be delivered to endpoints if integrated with a cybersecurity platform.

What these Attack Trends mean for Cybersecurity Professionals

Theworld of cybercrime and the attack methods of cyber adversaries in general continue to scale at great speed. The good news is that many of the tactics they are using to execute these attacks are familiar, which better positions security teams to protect against them. Security solutions should be enhanced with machine learning (ML) and artificial intelligence (AI) so they can detect attack patterns and stop threats in real time. However, a collection of point security solutions is not effective in today’s landscape. A broad, integrated, and automated cybersecurity mesh platform is essential for reducing complexity and increasing security resiliency. It can enable tighter integration, improved visibility, and more rapid, coordinated, and effective response to threats across the network.

Vishak Raman, Vice President of Sales, India, SAARC & Southeast Asia at Fortinet said, “As cybercrime converges with advanced persistent threat methods, cybercriminals are finding ways to weaponize new technologies at scale to enable more disruption and destruction. They are not just targeting the traditional attack surface but also beneath it, meaning both outside and inside traditional network environments. At the same time, they are spending more time on reconnaissance to attempt to evade detection, intelligence, and controls. All of this means cyber risk continues to escalate, and that CISOs need to be just as nimble and methodical as the adversary. Organizations will be better positioned to protect against these attacks with a cybersecurity platform integrated across networks, endpoints, and clouds to enable automated and actionable threat intelligence, coupled with advanced behavior-based detection and response capabilities.”

NatioNal RouNdup 48 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

Right IoT Security Assessment Helps Keeping Endpoint Devices Safe

The speed with which IoT has been accepted as the go-to technology by the world is surprisingly fast and this acceptance is only seen spreading to all verticals and organizations of all sizes. Today all the devices being used in our lives are either connected to or through IoT. While this has eased our experience with technology and provided more comfort, the door to this vortex has an opening on the other end too. This means, that how easily we can utilize IoT via various tools of technology be it devices or applications, solution platforms, and more, the same tools and our data connected with them are vulnerable to threats from the other side too. As per research conducted by Symantec, per month, on average IoT devices experience 5,200 attacks. 5G which is considered to be a boost to IoT has now started functioning in a few metropolitan cities in India and enterprises too can now get 5G separately to run their businesses. This, while it may seem to help enhance the use and benefits of technology to upgrade their current standards, the chances of us via our endpoint devices becoming vulnerable to cyber threats is the downside.

Keysight is the acknowledged gold standard for device security testing and has been doing cybersecurity research for nearly two decades. One can attack virtually any device – from smartwatches to headphones and connected cars to medical implants. Keysight’s IoT Security Assessment is built to tackle any attack on any device. Here, Keysight’s team validates the security up and down the stack, from low-layer protocol fuzz-

The Mirai-distributed DDoS worm was the third most common IoT threat in 2018. This could have been stopped if a comprehensive testing practice would have been in place. As such attacks have only increased, it becomes very important to safeguard our endpoints connected through IoT devices for which the organizations utilizing IoT should adhere to get their devices tested through comprehensive testing. Keysight’s IoT Security Assessment has just the right team and the right tools to test devices that can be and are vulnerable to external threats due to their association with IoT 

CTO at RAH Infotech

ing up to application-layer attacks. It can be driven by UI or a comprehensive REST API for easy integration into a CI/ CD pipeline and its modular design enables snap-in integration for additional capabilities from – Keysight, a 3rd party or even in-house code. With a few mouse clicks or API calls, Keysight’s decades of security testing expertise can find the hidden vulnerabilities in virtually any connected device, using real-world attack techniques and methods.

The Open Web Application Security Project (OWASP) has compiled a list of the top 10 vulnerabilities common to IoT devices and Keysight’s IoT Security Assessment solves 9 of those – everything but physical hardening. So, while the users have to lock the door themselves, Keysight’s IoT Security Assessment will assess:

● Use of Insecure or outdated components.

● Insufficient privacy protection.

● Insecure data transfer and storage.

● Lack of device management.

● Secure default settings.

● Weak, easy-to-guess, or hardcoded passwords.

● Insecure network services.

● Insecure ecosystem interfaces.

● Lack of secure update mechanisms. Keysight’s IoT Security Assessment attacks connected devices to find both known and unknown attacks. Upper-layer attacks such as brute-force password discovery and weak encryption discovery handle common and cataloged vulnerabilities, and intensive protocol fuzzing discovers hard-to-find weaknesses in networking implementations. This lets one simultaneously discover and address vulnerabilities in the RF and link-layer protocols that might be hiding in the communication chipset as well as higher-level weaknesses.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 49

Genetec Alerts Organizations to Risks of Legacy Access Control Systems in Light of Rising Cyberattacks

Company shares best practices for protecting access control systems from cyberattacks

With the ever-increasing rise in cybercrime, Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions, is cautioning organizations of all sizes to be vigilant about the cybersecurity risk posed by legacy access control systems.

“Many organizations are operating with access control systems that date back 10 years or more. While these older systems still allow employees to badge in and out, there’s a very high likelihood that these systems employ technologies that are extremely vulnerable to modern cyber threats,” said Christian Morin, Vice President of Product Engineering and Chief Security Officer at Genetec Inc.

Vulnerabilities in legacy access control systems can introduce cybersecurity weaknesses that may put an entire organization at risk. Cybercriminals can exploit weaknesses in access control system credentials, controllers, servers, readers, or workstations connected to the network. Once a cybercriminal has breached access control system credentials, they can then move on to an organization’s network and can gain control of other building systems, view or steal confidential information from internal records, or launch attacks designed to take key systems offline.

Companies that are affected pay a heavy price; the average cost of a data

breach rose from USD4.24 million in 2021 to USD4.35 million in 2022. Hence, it’s never been more important for organizations to be educated on the risks associated with legacy systems and the advantages that new cybersecure access solutions can offer.

Cybersecurity Best Practices for Access Control Systems

To improve the cybersecurity of access control systems, Genetec recommends the following steps:

● Upgrade the system. Older systems were not built to address today’s threats. When evaluating a new access control system or upgrading an existing system, make sure that cybersecurity is a key component of the vendor selection criteria.

● Use advanced secure credentials and the latest communications protocols to secure data transmission since older credentials are easy to clone using readily available tools.

● Educate employees and partners about cybersecurity best practices and ensure they are prompted to change passwords often.

● Regularly check for firmware and software updates and install once available.

● Use a centralized identity access management system to ensure virtual and physical authentication and authorization of employees for

NatioNal RouNdup 50 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

better control and more effective maintenance of your systems.

● Create a dedicated network for access control systems so that there is clear segregation of networks based on their purpose.

● Choose a security provider who can demonstrate compliance with established security certifications.

● Ensure that the access control system uses proven data encryption standards as well as multi-factor authentication.

● Work with a partner that has strong supply chain risk management, a dedicated team to monitor cyber threats, and ensures software is updated frequently and patched as needed.

Access control technology has undergone a huge transformation in recent years. Customers are gradually freeing themselves from proprietary solutions and demanding more flexible, open solutions. Forward-thinking technology manufacturers have now introduced a new breed of more cybersecure solutions that offer benefits beyond locking and unlocking doors.

A unified access control system that uses the latest cybersecurity standards to secure communication, servers, and data such as Genetec Security Center Synergis™ can not only protect an organization’s assets and people but help them improve their business operations and decision-making. By choosing an open architecture IP-based access control system, organizations have the flexibility to upgrade to the latest supported technology at any time, move at their own pace, and work within their available budget.

eInfochips and Ambarella Announce Strategic Partnership to Accelerate Edge AI Vision Design Services

an Arrow Electronics company, a leading provider of product engineering services, and Ambarella, Inc., an edge AI semiconductor company have announced a comprehensive relationship to expand design and development services for the next-generation AI camera products based on Ambarella’s industry-leading CVflow® edge AI SoC platform.

Infochips,

With the rapidly growing IoT and AI market loaded with amazing opportunities, this collaboration enables companies to leverage the dual advantage of Ambarella’s industry-leading technology prowess and state-of-the-art design resources of eInfochips to accelerate their evaluation and design cycles. In addition to prototype and manufacturing support, this collaboration enables eInfochips to deliver a wide variety of product design and development services for Ambarella-based camera solutions, including:

● Multi-sensor camera designs and video analytics.

● Camera SDK and system software development.

● Image sensor tuning in its state-of-the-art image-tuning lab.

● AI and machine learning algorithm porting and machine vision enablement.

“This relationship will enable us to better address this wave of new opportunities. eInfochips’ proven design expertise will allow Ambarella to penetrate new markets, including robotics, access control, and ML cameras, and grow our mutual customer base,” said Chris Day, Vice President of Marketing and Business Development, Ambarella.

“With over 25 years of experience providing product engineering services, eInfochips has substantial design expertise across a wide variety of camera technologies and protocols, including RGB-IR cameras, PTZ, ONVIF, PSIA, ZigBee wireless, on-camera DVRs, and multi-imager designs. This synergistic partnership will unleash our deep knowledge and design expertise for companies looking to take full advantage of the excellent AI performance per watt that Ambarella can bring to their computer vision designs,” Said Parag Mehta, Chief Sales, and Business Development Officer at eInfochips.

NatioNal RouNdup SecurityLinkIndia | December 2022 | www.securitylinkindia.com 51
The combined expertise accelerates AI perception-based product design and innovation

Hikvision Introduces Evolutionary eDVR Series with eSSD Technology

Hikvision recently added the eDVR Series into its expanding portfolio of security solutions for SMBs. Powered by embedded solid state drive (eSSD) technology, Hikvision’s eDVRs are compact, durable, easy-to-use, and energy-efficient. All this means they are ideal for small-to-medium-sized businesses and residential applications.

“The eDVR Series is smarter, faster, more durable and more energy efficient than anything that’s gone before, not only helping to minimize negative environmental impacts, but also delivering major energy and cost savings for our customers,” said Wenson Zhou, Product Director at Hikvision.

New possibilities for efficiency and sustainability

Eco-friendliness and 45% energy saving

The ultra-low power consumption of chip-level eSSDs makes Hikvision eDVRs more sustainable. Since these devices don’t have spindle motor engines built in, their energy consumption is 45% lower than that of the conventional DVRs, not only helping users to make long-term savings on their electricity bills, but also enabling them to reduce carbon emissions.

In addition, the use of eSSDs makes the prod-

ucts more durable than conventional DVRs that use HDD drives. This is because there are fewer moving parts, such as actuator arms. With longer product life cycles, the eDVR Series contributes to eco-efficiency and sustainability.

Endurable storage with a 25% improvement in efficiency

Being powered by ‘eSSD’ technology, with solid-state storage components down to chip level, the Hikvision eDVRs have exceptional storage efficiency and system stability. The storage efficiency of eDVR Series is further enhanced by ‘scene adaptive bitrate control technology,’ which automatically optimizes encoding for video footage, and improves the coding efficiency by 25%. Specifically, complex scenes with human or vehicle movements are allocated higher bitrates to ensure great video quality. At the same time, low-complexity scenes with little or no movement are assigned a lower bitrate to optimize storage efficiency.

Compact design for ease of use and simplicity of installation

As the eDVRs are embedded with SSDs and have a ‘screwless’ design, tool-free installation is made possible. Besides, without the traditional horizontal mounting requirements of conventional HDDs, the devices are also easier to assemble and set up. Thanks to this ease and flexibility of installation, both end-customers and installers can save time and reduce their maintenance and operating costs.

Compared to conventional SSD DVRs, Hikvision’s eDVRs are highly compact, helping to save on space. They can fit anywhere – be it behind a

monitor, under a table, on a bookshelf, or hidden inside a custom stand.

Smart motion detection

Embedded with Motion Detection 2.0 technology, the eDVR Series can distinguish human beings and vehicles from other objects in any given environment, enabling property owners to respond much more quickly and effectively to potential security breaches. The technology also enable property owners to search video footage based on the appearances of people or vehicles during a specific period of time, saving time and reducing their workloads and costs.

Effective for residential and SMB applications

The innovative features of the Hikvision eDVR Series make these solutions equally effective for residential, SMB, and commercial applications. In all cases, end-customers benefit from an easy and flexible installation process, low energy consumption, minimal maintenance requirements, and high performance video capture, storage, and processing.

The compact format of Hikvision eDVRs also increases the solution’s versatility. For example, eDVRs can easily fit into residential homes. The devices’ storage drives also operate with virtually no noise or vibrations, and generate very little heat, which makes them ideal for residential applica tions. These advantages, along with the eDVRs’ affordability, functionality, and sustainability, also make the product range an ideal choice for SMBs such as convenience stores, grocery shops, restaurants, workshops, bars, and more.

Nexus Between terrorism and organised Crime

The nexus between transnational organised crime and terrorism epitomises a worldwide threat. The convergence of criminals and terrorists, tactics and resources empower them to gain more substantial capacities to threaten world peace, security and economic development. UNSC resolution 2482 (2019) is a vital resolution passed under the Chapter VI of the UN Charter and articulated in depth the nexus between terrorists and organised crimes.1 Expressing its concerns that terrorists could benefit from domestic or international organised crimes as a source of financing and logistic support. Elaborating further, it emphasised that there is a need to coordinate efforts at local, regional, national and international levels to respond adequately to these challenges in accordance with the law of the land. But overplaying the connexion between organised crime and terrorism might lead to actions that endorse the risk management tools of the domestic criminal justice system.

Terrorists can benefit from organised crimes such as the trafficking of arms, drugs, artefacts, cultural property and trafficking in human beings, illicit trade etc. There is a general difference of opinion regarding understanding terms such as ‘terrorism’, ‘violent extremism’ or ‘organised crime.’ Different nations are dealing with these terms differently, thus leading to variance in protecting and promoting human rights.2

Numerous UN agencies and related world enforcement bodies are the programme of action to prevent, combat and eradicate the illicit trade in small arms and light weapons, the International Tracing Instrument, UNODC, the UN Commission on Crime Prevention and Criminal Justice, and the UN Commission on Narcotic Drugs, UNCTED. Other regulating agencies are the Financial Action Task Force (FATF) and its Global Network of FATF-style regional bodies and the Global Counterterrorism Forum (GCTF), INTERPOL etc.

Organised crime could be designated as the actions of any group or a composite of groups operative as an organised grid, linking numerous players, organisations and activities at various echelons to bend, manipulate or violate the laws of the land, to create money and survive on fear and corruption. Organised crime systems can be as small as inside a locality indulging in extortion. They could become as large as involving transnational crime groups and carrying out numerous activities such as drug trafficking, arms smuggling, terrorism, money laundering etc. It employs illicit methods such as monopolisation, terror, violence, extortion and tax evasion to drive out or control lawful ownership and leadership and to extract illegal profits from the public. It also corrupts public officials to prevent the interference of the government and thus becomes all the time more erudite. In India, along with its original domains of actions like extortion, seeking protection money, contract killing, boot-

2 IBID
1 OrganizedCrimeSGReport.docx – ohchr https://www.ohchr.org ‘ files ‘ Issues ‘ Terrorism. Accessed on 11 Dec 2022.

legging, making a bet, prostitution and trafficking, now indulge in drug trafficking, illicit arms trading, money laundering, terror and acts of violence.

The linkage between terrorism and organised crime

Terrorism is a grave problem which India is facing. Theoretically, terrorism does not come in the category of organised crime, as the overriding motive for terrorism is political or ideological and not gaining of money-power. Nevertheless, the Indian experience exhibits a very minute variance between criminals and terrorists. There is an indication to show that, be the terrorists of J&K, insurgents of the North East States or, for that matter, the Left Wing Extremists, all of them indulge in the methods and tactics of organised crime to mobilise funds for their organisations. They have been indulging in activities like drug trafficking, gun running, extortion, kidnapping or, for that matter, even contract killing in some instances to raise money for their organisations and themselves. Further, in some instances, the existing criminal networks of organised crime are being utilised by the terrorist leaders to complete their operations, as was the case of the Dawood Ibrahim gang being used by the Jihadis to conduct a series of bomb blasts in Mumbai in 1993. Terrorist groups share relations with organised criminals at several levels, including conducting operations to raise money and seek assistance from organised crime networks. This is done to fulfil their requirements of money and ammunition and oblige the organised crime gangs to return to conduct their operations in the regions that these terrorists control.

Various aspects in which both terrorists and criminals are related include

● The terrorists themselves indulge in drug trafficking to support their movement.

● Sympathisers of terrorists living abroad indulge in drug trafficking and send part of their illegal profits to fund the terrorist movements.

● Terrorists join with drug lords to gain access to those in power in other countries and sympathise to their cause.

● Terrorists give protection and support to drug traffickers with firearms, and the drug traffickers, being acquainted with the routes, assist the terrorists in border crossings to bring arms, counterfeit currency and drugs in the target country. Organised crime gangs and terrorists directly utilise the proceeds from these operations and the counterfeit currency to fund their operations and allied activities in the region.

● The areas primarily affected by terrorism in India are the border states which also happen to be transit routes for narcotics to their destinations elsewhere in the world. It is not a coincidence that the growth of the terrorist movement in Punjab synchronised with the emergence of the Golden Crescent as a central drug-producing area in the early 1980s. The emergence of drug mafias in the Golden Crescent countries and their linkages with smugglers in the border States of India have given impetus to gun running.

● There is also evidence that the money generated abroad by the smugglers was used to purchase weapons smuggled into the country for terrorist activities. To illustrate, Dawood Ibrahim utilised the existing smuggling network in landing consignments of arms and explosives on the west coast in early 1993, used for causing serial blasts in Bombay.

In India, like many parts of the world, discontentment, alienation, and perceived victimhood

Preventing the formation of the nexus between terrorism & crimes

among the populace could be exploited by terrorists and criminals to achieve their clandestine aims and objectives. There is a large influx of migrants from Bangladesh, Myanmar and Pakistan with the expectations of building a better future. Often such prospects are met with discontent and helplessness to integrate into local communities. At the same time, domestic expectations and the rise of fundamentalism have fueled an environment of intolerance.

The lack of government actions to address these issues may lead disgruntled and susceptible individuals to seek inclusion, status and capital through criminal and terrorist means. As criminals, these groups are already outlaws in society, making them easier to identify, radicalise, and recruit as terrorists. Furthermore, such individuals already have the means to fund terrorist activities by committing crimes.

To tackle this problem, policymakers must move beyond traditional law enforcement methods to adopt a more nuanced, phased, multi-sector approach. Firstly by scrutinising and countering the similarities and distinctions between factors which enable criminality and terrorism. Then by recognising, managing and mitigating the dynamics that make these vulnerabilities worse and create prevailing winds. Finally, recognising the types of catalytic triggers or conditions may prove the helping factor in an individual’s decision-making process and follow-on actions.3

Addressing these challenges requires increased sophistication and a coordinated international response, with real-time intelligence sharing, capacity building and technology assistance. There also needs to be much greater rigour and transparency in implementing instruments already at the disposal of the UNO.

3 Examining the Nexus between Organised Crime and https://icct.nl ‘ 2017/04 ‘ OC-Terror-Nexus-Final Aceesed on 12 Dec, 2022.

Conclusion

The twin nuisances of terror and organised crime cater to the same lifelines. Their relationship may differ, but they are sustained by the same malicious forces that seek to undermine governance, development and social cohesion through the illegitimate use of violence. The terror-crime connexion is a worldwide empirical threat, the outlines of which are changing daily.

The global community must keep ahead of the new trends and technologies to combat this threat. This can only be achieved if we work together with a zero-tolerance approach, without double standards.

The other challenge in the nexus between terror and organised crime is the role of new and emerging technologies, including virtual currencies, encrypted communications and artificial intelligence. Such technologies are making networks loosely associated on the ground, closely intertwined in cyber-space.

In modern time, managing a terrorist organisation require considerable funds to maintain its administrative and command network. Funding is the lifeline of terrorism. The nexus between terrorism and crime foster this funding. Therefore one of the most effective ways of dealing with terrorist organisations is to obstruct the flow of money to the organisation. At least some obstacles must be placed to stop this funding. But these activities require national as well as international levels specific legislation and cooperation. Recently, two important international conferences, i.e., UNCTED and No Money For Terror, were held in India. They stressed coping with emerging and new technology and funding terrorism as tools for countering terrorism worldwide.

A Focus on Emerging Threats: Cybersecurity Awareness Month

In 2022, cybercrime is ever-increasing, and the number of attacks and bad actors continues to increase exponentially. As soon as we’ve learned to eliminate a threat, perpetrators are creating new ways to breach networks. It can feel like a never-ending cycle.

And it is no surprise because successful attacks on Medibank, the Colonial Pipeline, and SolarWinds demonstrate the significant need for cybersecurity efforts that act differently than traditional practices. A holistic approach must be defined and expanded to cover applications and workloads during runtime wherever they may reside to protect our enterprise systems better. This is the only way to ensure that the correct code and processes can execute and nothing else, regardless of the threat environment.

Cybercrime’s threat to individuals and organizations leaves them feeling anxious, thinking about the possibilities that can take place without appropriate security practices or solutions. In response to this increasing threat, we as an industry must commit to being as proactive as possible by educating, training, and staying updated on security-leading practices.

As you can imagine, our cybersecurity strategies have undergone immense changes over the years, and significant strides have been made by security teams across the globe. Since its introduction in October 2003, Cybersecurity Awareness Month (CSAM) has brought greater awareness to this global issue. Leaders and employees have been more aware of their role in mitigating threats, while ISOs and CISOs worldwide are now developing greater Security Education Training and Awareness (SETA) programs. The bottom line is that security knowledge should be focused on awareness for all, training employees with key roles, and educating cybersecurity specialists. SETA programs are not a one size fits all, and many now include phishing exercises, tabletop security incidents rehearsal, and simulated attacks with Red and Blue teams.

The theme of this year’s CSAM campaign is ‘See Yourself in Cyber,’ demonstrating that while cybersecurity might seem complex, it is all about teamwork. ACRE recognizes that all members of an organization play a role in defend-

ing our organization’s data, assets, and employees. We also all play a part in protecting personal data in our day-to-day life. Currently, employees need to keep a mindset of security in all tasks that they complete, whether cyber or physical. Supporting this initiative is our SETA program, which is designed to promote cybersecurity awareness. Additionally, our team has developed other campaigns to enhance our employee’s overall security knowledge through workshops, assessments, and security incident scenario rehearsal to help reduce our security risks.

Regarding our security solutions, ACRE strives to balance our security strategy with our core product pillars of identifying, protecting, detecting, responding, and recovering. Adhering to cybersecurity best practices, we actively train our specialists to be conscious of security and data protection in every step of the product lifecycle from the initial concept through retirement.

In a world where ever-evolving technology produces incredible innovations, it raises threats more than ever before. We believe that one factor contributing to this is the risk of complacency. Any organization that believes it is doing enough or becomes too negligent in security strategies could be heading down a dangerous path. Organizations must stay engaged and vigilant and remain dedicated to keeping their employees, suppliers, and customers informed. After all, security is and will always be a team effort.

Hikvision’s Classroom Hub Solution Offers Convergence of Real, Digital and Virtual Classrooms

Themovement toward informatization in education is continually being pursued. Also, students growing up in a technological world are eager for more immersive learning experiences and better education resources. Hikvision’s Classroom Hub stands at the forefront of this movement, extending real classrooms to digital, virtual classrooms, bridging all kinds of gaps between teaching and learning. This solution overcomes a variety of challenges by offering digital teaching, remote learning, and multi-classroom instruction. The Classroom Hub Solution empowers all educational staff to enjoy more connectivity, engagement, and learning

breakthroughs using our smart teaching assistant, easy-to-use software, and collaboration of multiple applications.

In-class applications Challenges

In conventional classrooms, teaching tools offer limited formats for writing, illustration, and other resources, which also makes learning very challenging for the students sitting in the back row or students with other learning difficulties. Moreover, classroom-bound teachers need a whole host of tools to create lessons, including chalk, markers, a

projector, chalkboard or whiteboard, pointer, and so on. ‘Teaching’ and ‘efficiency’ do not commonly go together.

Hikvision’s Interactive Flat Panel presents a new kind of intelligent teaching assistant. It integrates

materials across multiple teaching formats

● With flexible white board software, users will enjoy more powerful visual experiences than with a traditional blackboard.

● Equipped with world-class, cutting-edge panel technologies, a great display, flexible visual aids, and better eye protection can be guaranteed.

● Educators can explore more possibilities with the openness to third-party applications from Window or Android.

the latest technologies in touch controls, high-definition display, video processing, network communications, interactivity, and audio features, with abundant third-party teaching resources available as well. Teachers can intuitively create digital instruction to boost the learning environment and experience, enjoying more interactivity with students.

Benefits

● Easy wireless projection from a smartphone, iPad, PC or Mac, sharing multimedia teaching

Features

● 150 mesh, ultra-fine sandblasting frame for an extraordinary user experience.

● Filters out >90% ultrashort-wave blue light to protect eyes.

● Supports up to 4 terminals projecting simultaneously via window splicing.

● Up to 20-point IR touch sensitivity so several people can use the panel display at the same time.

For the Third Consecutive Time, HID is the Smart Ticket Producer for FIFA World Cup 2022

attendee experience and facilitate emergency evacuations

HID, a worldwide company in trusted identity solutions, announces it is for the third consecutive time the smart ticket producer of FIFA World Cup, one of the largest and most popular sporting events in the world. This year, HID is also providing a fully custom solution for outer-perimeter access control and all exit gates to ensure a smooth exit and facilitate emergency evacuations.

Featuring eight stadiums spread across five Qatari cities, the Middle Eastern country expects more than 1.2 million visitors to attend the games, happening from November 20 to December 18. Counterfeiting is a concern of event organizers, so FIFA relied on HID to deliver approximately 2 million paper tickets manufactured with unique security features, including a Radio Frequency Identification (RFID) inlay.

Unlike barcoded tickets, which can be counterfeited more easily, RFID transmits the unique identity of a ticket and ticket holder via radio waves. And because RFID scanners do not need a direct line of sight like traditional barcode scanners, ticket validation is frictionless, dramat-

ically speeding up admissions in high-volume events such as World Cup matches.

“It is exciting to see our smart ticket solutions help fuel the fan experience for one of the world’s largest and most-watched events,” said Björn Lidefelt, EVP and Head of HID, “Helping bring the world together for an event like the World Cup is what our technology is all about.”

As part of the project, HID is also providing personalization solution for the secure tickets, including self-service kiosks for media seat assignment tickets, cabinets for tickets instant issuing with special printers for on-the-go ticket personalization, thousands of handheld scanners and on-site support during each match. An accompanying Event Management Platform (EMP) from HID will provide real-time data and reporting through several user-friendly dashboards, which will help security officials and event organizers to remotely monitor and manage everything from the number of attendees at each entry and exit point to media credentialing and crowd control.

Novel

solution with

limitless potential HID

was also requested to provide an outer-perimeter access control layer of security checks in each stadium and training fields across the country. To support this, hundreds of gates embed a new, patent-pending, UHF booster technology developed by HID, which serves as a companion device for common UHF readers to enhance the RFID tag reading capacity in challenging use cases. Units are integrated within the HID EMP for real-time events tracking and monitoring of the system health. Most importantly, this all happens automatically to maintain a seamless flow in and out of the gates, and ensure optimum user experience for the fans.

“Having real-time data of when ticket holders are going in and out of the perimeter is crucial for event organizers to ensure the best possible experience for fans to accredited people, as well as obtain intelligence as to where a particular gate needs more attention in terms of crowd control and emergency evacuation,” explained Cesare Paciello, HID’s Vice President of Events and Mobility Solutions for Identification Technologies and head of the project.

ApplicAtion/ cAse study 60 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Unique RAIN RFID technology added to exit gates to improve

Interface Systems, a leading managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, recently announced that The Old Spaghetti Factory (OSF), a family-owned and operated restaurant chain with over 40 locations across 13 states, has chosen Interface’s suite of managed services to transform its network, voice and security infrastructure.

Network Upgrade

The OSF IT team wanted to standardize network equipment across all their locations to increase efficiencies and reduce downtime. Since implementing Interface’s restaurant-networkin-a-box, which guarantees 99% uptime and includes 4G wireless WAN failover, OSF has experienced significantly better network uptime resulting in improved employee productivity, and better guest experience.

“Interface’s restaurant-networkin-a-box has allowed us to upgrade to

a high-speed, secure network at all our locations and reduced the need for our employees to spend time troubleshooting network issues,” explained Travis Crownover, Director of IT at The Old Spaghetti Factory.

Physical security

OSF’s legacy alarm systems were complex to manage and maintain. To improve security, Interface deployed a managed alarm solution. The new solution includes a mobile application that enables OSF employees to arm or disarm alarm systems via smartphones,

and easily manage alarm systems at any location they are deployed to without additional training.

The managed alarm solution has streamlined security operations and reduced operating costs. “By making the switch to Interface for intrusion monitoring, we realized a cost savings of at least 30%,” said Crownover, “Our restaurants rely on our IT department and Interface has really helped us take a lot of the workload off of our own IT team.”

Replacing an outdated phone system

OSF’s aging phone systems made operations difficult due to poor call quality and a lack of flexibility when systems failed. OSF chose to replace their phone system with Interface’s business VoIP solution. “Interface’s phone system gives us improved call quality and the auto-attendant feature allows us to handle customer calls at scale,” said Crownover.

application/ case study SecurityLinkIndia | December 2022 | www.securitylinkindia.com 61
Modernize Network, Voice,
Spaghetti Factory implements Interface’s comprehensive suite of network, voice, and managed intrusion solutions to modernize outdated systems and streamline operations across 40+ locations
Old Spaghetti Factory Restaurants Choose Interface to
and Physical Security Old

protecting the piazza Lucio dalla

Keeping visitors safe at the newly inaugurated Piazza Lucio Dalla in the city of Bologna, Italy

the image quality delivered and the complete integration with the monitoring system already in use in the control rooms.

The

Piazza Lucio Dalla in the Comune di Bologna is a covered square of 5,882 square metres that has recently been restored and inaugurated in Summer 2022. Named after Bolognese singer-songwriter, musician and actor Lucio Dalla, the space will become the new ‘Piazza Grande’ for Bologna, according to Matteo Lepore, mayor of Bologna. The square hosts a range of events and entertainment for people of all ages, including concerts, theatre performances, street food and children’s workshops. The new space is also a meeting point that can be used in all weathers thanks to the canopy designed by architect Renato Bernardi in the 1950s.

A durable security system

Aspart of the restoration, the city authorities realised the need for a video surveillance system that could monitor the square in all conditions, morning and night. Wisenet Q Series PTZ cameras were chosen due to their reputation for durability and robustness,

The cameras are installed across the square, with pan, tilt, and zoom cameras chosen to move easily across the square when investigating an event or tracking a person of interest. The cameras provide up to 23x optical zoom, with IR LED to monitor images clearly in low light conditions. They can identify objects up to 100 metres away in Full HR resolution.

Intelligence built-in

accurate control by the authorities and the operators.

The system integrates with Genetec Security Center Video Analysis, and video feeds are monitored by the local police operational centre.

The

cameras also come with built-in analytics, including motion detection, directional detection, virtual line, enter/ exit, and tampering, to allow more

Future innovation

Comune

di Bologna is currently undergoing a digital transformation as part of the local Digital Agenda. “It was important that we implemented the right technology as part of the restoration of Piazza Lucio Dall. The Wisenet cameras play an important role in keeping people using the busy piazza safe and secure, but also integrate with other systems, including Genetec’s, to improve collaboration across departments and agencies. It also gives us greater options for exploring future integrations –as the Settore innovazione digitale e dati initiative includes IoT and 5G technologies,” explained Ing. Alberto Nuzzo, Head of Office ‘Digital Infrastructure’ presso Comune di Bologna.

ApplicAtion/ cAse study 62 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

Everbridge Selected to Power the Nationwide Public Alert System for Norway

Everbridge, Inc., the leading global company in critical event management (CEM) and national public warning solutions, recently announced the selection by Norway to deploy its next-generation population alerting technology to help keep the country’s more than five million residents, and nearly seven million annual visitors, safe and informed in case of an emergency.

“It will be a big boost for public security,” said Norwegian Minister of Justice and Emergency Preparedness Emilie Enger Mehl at a press conference, “We can send precise warnings about danger or other information to everyone in Norway who has a mobile phone within a few seconds.”

“With this solution, we receive a significant strengthening of our population alerting technology in Norway,” said Elisabeth S. Aarsæther, Director of the Norwegian Directorate for Civil Protection, in an official statement, “The new mobile alert will be much more precise and can, when it is fully implemented, be received directly on all phones in a defined area.”

The new country-wide public alert system of Norway features Everbridge’s enhanced Public Warning Center, a multi-channel front-end interface with the ability to transmit cell broadcast alerts from a single console. The platform will enable authorities to reach people rapidly during national emergencies such as health

crises, terror attacks, industrial incidents, typhoons, and flooding, targeting mobile phones of residents and visitors present in the area impacted by the disaster.

Mehl continued, “We are happy that we can quickly get it in place. It was important for the governing parties to move forward with this project because the current notification system does not cover the entire population and cannot provide concrete information.”

In 2020, Norway’s Directorate of Health leveraged Everbridge to quickly alert tens of thousands of Norwegians traveling outside the country of the changing risk landscape related to COVID-19 as well as the latest procedures and protocols such as recommended quarantine guidelines. Due to mounting coronavirus cases in multiple tourist destinations, Norwegian authorities relied on Everbridge to inform citizens abroad of new guidelines necessary upon re-entering their home country.

“Norway is once again prepared when it comes to ensuring the health and safety of its population,” said Valerie Risk, Vice President of Public Safety Solutions at Everbridge, “The country was one of the first to implement location-based technology to inform and protect its people and are now following that with the adoption of cell-broadcast to reach citizens and visitors. With this latest addition of cell broadcast and the full Public Warning Center solution,

Norwegians can rest assured they are protected by the most innovative public safety solution available today.”

Everbridge Public Warning leverages existing telecom infrastructure, with no opt-in required, to reach everyone within a geographic area to reduce disaster risk, support first responder communications, and analyze disaster communication effectiveness for subsequent mitigation activities. The platform is fully compliant with data privacy regulations including GDPR.

More governments across the globe deploy the Everbridge population alerting solutions than any other provider, offering the ability to reach over two billion residents and visitors in more than 200 countries and territories including Spain, the Netherlands, United Kingdom, Germany, Estonia, Sweden, Iceland, Singapore, New Zealand, Australia, Peru, and multiple countries across the Middle East and Africa.

Following recent wins in Germany, the United Kingdom, and the Netherlands to deploy its Public Warning solution on a country-wide basis, Everbridge serves more countries in Europe and around the world than any other provider

City, University of London Modernizes Wireless Campus infrastructure with Extreme Networks

Extreme Networks, Inc., a leading company in cloud networking, recently announced the deployment of a new Wi-Fi 6 wireless network for UK-based City, University of London, providing connectivity to over 18,000 students and 2,000 staff. The new infrastructure includes the ExtremeCloud™ IQ platform, which simplifies network management and provides the IT team with full visibility and advanced analytics around network performance, usage and security. ExtremeCloud IQ also delivers insights that will help the university improve the student experience and drive operational efficiencies.

Alongside Charterhouse Group, Extreme Networks delivered a wireless solution that seamlessly integrates with the university’s existing wired infrastructure and offers greater reliability, flexibility, control and security across the campus.

Key Benefits

● Improved Learning Experience for Students: The deployment of a new Wi-Fi 6 wireless network provides seamless connectivity throughout high-density environments across campus. The enhanced network easily handles an ever-increasing load of media-rich content and devices. Students benefit from faster speeds and low latency, allowing them to access educational platforms or stream videos without delay from anywhere on campus. It

also future-proofs the university for the emergence of new programs and curriculum that will rely on Wi-Fi connectivity.

● Simplified, Streamlined Network Management and Visibility of Applications for IT Staff: The powerful combination of ExtremeCloud IQ – Site Engine and ExtremeAnalytics provides the university’s IT team with an easy, effective and automated way to operate and manage all network functions via the cloud. Now, the university can automate the provisioning of new devices, freeing up staff to focus on other tasks and projects, and use hyper-segmentation to drastically increase the university’s security posture by creating stealth networks that separate certain user and device groups to minimize the risk of unauthorized access. Analytics empower the staff to troubleshoot and identify the root cause of issues, understand usage patterns to optimize application performance, leverage insights around foot traffic and identify operational efficiencies.

Paulo Leal, Network Architect, City, University of London said, “The student experience is crucial to us and the technological facilities we provide underpin that. Our goal with Extreme from the get-go was to deploy a network infrastructure that could provide students and staff with seamless connectivity both in the classroom and across the campus. Extreme was able to support us in our

ambitions to modernize the student experience. Our new architecture provides us with exactly that and frees up staff to focus on other activities, while allowing students to enjoy a superior education experience.”

Tony Brar, Director, Charterhouse Group said, “There are many complexities when it comes to a university’s network due to the number of campuses and varying user demands. However, as one of Extreme’s key partners, Charterhouse has full access to their portfolio of wired, wireless, management and NAC/ Analytics enabling us to deliver exactly what City, University of London needs to provide a world-class educational experience. This is the latest in a long line of transformation projects we have worked on alongside Extreme.”

John Morrison, SVP EMEA Sales and Services, Extreme Networks said, “Today’s students expect seamless and reliable connectivity to be readily available on campus, while modern curriculums require high-bandwidth, low latency networks to successfully activate new applications and programs. Our deployment at City, University of London provides the foundation for advanced, asynchronous learning of the future. Meanwhile, we’re making it easier for IT teams and network admins to manage the network, gain visibility into usage and performance, better understand the preferences of the student population and drive more operational efficiency across their entire campus.”

64 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

Tenable Selected by Catholic Education Western Australia to Secure Student Data

Tenable®, Inc. the Exposure Management company, recently announced that Catholic Education Western Australia (CEWA) has chosen both Tenable Vulnerability Management and Tenable Active Directory Security to reduce cyber risk across its network of schools and colleges.

The increasing number of cyberattacks on Australia’s education sector has significant implications for teaching, funding and protecting sensitive data. Recognising this, CEWA, a not-for-profit organisation with over 100,000 students and employees across its network of 149 schools and colleges selected Tenable Vulnerability Management in the cloud and Tenable Active Directory Security to harden and monitor Active Directory (AD) in real-time. CEWA consulted with industry analysts following a consolidation exercise and Tenable was highly recommended as the solution to help the organisation step up its vulnerability and exposure management efforts.

“Not only is student data commonly targeted because of its value to cybercriminals for conducting fraud, but students are often less vigilant about monitoring and controlling their online activities which makes them especially vulnerable to being victims of identity theft and fraud for longer periods of time before taking action to protect themselves,” said Lee Swift, Chief Information Security Officer, CEWA, “Having the security function of the 149 schools across our system consolidated into a central platform promotes collaboration. However, it also means the impact of a cyberattack can ripple across other parts of the organisation. Ensuring that security was embedded across every function of CEWA and making sure that student and employee data were protected is vital

to maintaining the faith and trust of the communities we serve.”

With the high-volume usage of thousands of connected devices such as smartphones, web cameras and Apple TVs, having visibility over such a huge footprint can be challenging. Since deploying Tenable.io, the security team is able to run automated, automated scans without the need for agents frequently and has full visibility across 17,000 assets. The entire assessment to remediation process has also been streamlined by leveraging Tenable’s Predictive Prioritization capabilities, which yields a Vulnerability Priority Rating (VPR) score, that combines vulnerability information, threat intelligence and data science to predict which vulnerabilities will likely be exploited. With more predictability and less guesswork, CEWA is able to focus on the vulnerabilities that need to be remediated first based on actual cyber risk.

Dr Debra Sayce, Catholic Education WA, Executive Director said, “We have a responsibility to ensure that students entrusted into our care are learning in environments which are safe. Ensuring that our cyber security policies and platforms are of the highest standard across our 149 schools is critical to protecting student data and ensuring they use technology safely.”

Given that identity is central to authenticating users and providing access to network resources, Tenable Active Directory Security is critical to helping CEWA identify any misconfigurations and prevent any attack paths that attempt to leverage Active Directory. “Prior to using Tenable Active Directory Security, we were only using Microsoft Security Suite and running point-in-time assessments. The

ability for Tenable to enhance what we are working with and make our approach to cybersecurity more proactive has been a real differentiator,” added Swift.

Effective Analytics and Reporting

CEWA’s

cybersecurity program has quickly become the cornerstone for a more holistic and proactive approach to cybersecurity across the organisation. In addition to running weekly vulnerability reports, Swift’s team also presents quarterly to CEWA’s risk committee. “I’m now able to have open and transparent conversations with our leadership team and board of directors about the good, the bad and the ugly and the resources needed to strengthen our risk posture. Tenable makes these conversations easier and helps us understand risk better as an organisation,” said Swift.

Having an effective vulnerability management program has freed up resources for Swift and his team to also work on enhancing CEWA’s Cyber Culture program which helps students and employees understand their role in cybersecurity.

“The positive impact technology has had on learning is significant. These days if a teacher wants to bring an internet-connected weather station into the classroom, security teams have the ability to secure it instead of stopping the connection of the external device altogether,” said Scott McKinnel, Country Manager, Tenable ANZ, “Cybersecurity is about keeping schools, students and teachers secure and shouldn’t be seen as a barrier to innovation and learning. CEWA is a shining example of an organisation that values innovative learning experiences whilst keeping students and teachers secure on that journey,” said McKinnel.

application/ case study SecurityLinkIndia | December 2022 | www.securitylinkindia.com 65

The 6 Technology Trends Affecting the Security Sector in 2023

The

fact that technology has become pervasive in our personal and work lives is not news. This is largely due to the benefits that new technologies bring to business and citizens around the world in delivering new, more effective, and increasingly efficient services.

However, the depth of technology’s integration into our lives, advances in its capabilities, and heightened awareness of its implications in society are also greater than ever and continue to accelerate.

Given this, many of the broad macro trends around the globe – spanning geopolitical issues, economic uncertainty, environmental concerns, and human rights – have implications for all technology sectors, the security industry included.

Ours is a sector making use of increasingly intelligent technology, one inherently involved in collecting sensitive data, and as impacted by geopolitical issues affecting international trade as any. Yet we’re still resolute in our view that our innovations will create a smarter, safer world.

These are the six key technology trends that we believe will affect the security sector in 2023.

A move towards actionable insights

The increasing application of AI and machine learning have seen a focus on the opportunity for advanced analytics in recent years. Moving forward, the shift in focus will move from the analytics themselves, to the actionable insights they deliver in specific use

cases. It’s less about telling you something is wrong, and more about helping you decide what action to take.

A key driver for employing analytics to deliver actionable insights is the huge increase in data being generated by surveillance cameras, along with other sensors integrated into a solution. The data (and metadata) being created would be impossible for human operators to interpret and act upon quickly enough, even with huge and costly increases in resources.

The use of analytics can drive real-time actions which support safety, security, and operational efficiency. From prompts to call emergency services in the case of incidents, to redirecting traffic in cities to alleviate jams, to redeploying staff in busy retail outlets, to saving energy in buildings through more efficient lighting and heating, analytics are recommending, prompting, and even starting to take the actions that support human operators.

Beyond ‘live’ actionable insights, analytics can support in forensic analysis post-incident. Again, given the vast amount of data being created by surveillance cameras, finding the relevant views of a scene can take significant time. This can hinder investigations and reduce the likelihood of suspects being found. Assisted search addresses this issue, helping operators quickly find individuals and objects of interest among hours of footage.

Finally, proposed actions promoted by analytics are increasingly forward-looking. Downtime in industrial

sites and factories can be costly. A combination of sensors allows intelligent analytics to propose preventative maintenance ahead of outright failure.

‘From analytics to action’ will become a mantra for 2023.

Use case-defined hybrid architectures

Aswe’ve highlighted in previous technology trends

posts, it’s now commonly accepted that a hybrid technology architecture is best-suited for security systems, mixing on-premise servers, cloud-based compute, and powerful edge devices.

No one architecture fits all scenarios, however. But here lies the solution – first assess what needs to be addressed in your specific use case, and then define the hybrid solution that will meet your needs. A number of factors need to be considered.

Undoubtedly the advantages of advanced analytics embedded in surveillance cameras on the edge of the network are clear to see. Analysis of the highest-quality images the instant they are captured gives organizations the best chance to react in real-time.

Equally, the data generated by surveillance cameras is now useful beyond the real-time view. Analysis of trends over time can deliver insights leading to operational efficiencies. This analysis often demands the processing power found in on-premise servers or the cloud.

And of course, there are the requirements – often defined by regulation – around data privacy and storage that vary from country-to-country and region-to-region. These can define the difference between on-premise storage and the use of the cloud.

What’s essential is not to tie yourself to a single architecture. Remain open, give yourself the flexibility to create the hybrid architecture best suited to your specific needs.

The emergence of cybersecurity sub-trends

importance of cybersecurity is also highlighted through the requirement to remain compliant. For

instance, the proposed European Commission’s Cyber Resilience Act will place greater demands on producers of hardware and software across all sectors to ensure the cybersecurity of their products, through fewer vulnerabilities at launch, and better cybersecurity management throughout the products’ lifecycles. The security and surveillance sector will, of course, be included.

The Act demonstrates both the importance and the complexity of cybersecurity. No longer can it be seen as one subject, but rather several interlinked areas. Some of these are well established, but others are emerging.

In the video surveillance sector, cybersecurity measures that ensure the authenticity and safety of data as it is captured and transferred from camera to cloud to server will be essential to maintain trust in its value.

We will see a more proactive approach by technology vendors in identifying vulnerabilities, with ‘bug bounty’ programs becoming commonplace to incentivize external parties.

And customers will expect transparency regarding the cybersecurity of security solutions, with a Software Bill of Materials becoming standard in assessing software security and risk management.

Beyond security

One

of the most significant trends for the security sector, and with it an equally-significant opportunity, is the move beyond security.

Surveillance cameras have become powerful sensors. The quality of video information they capture, in all conditions, has increased year-on-year for decades. Today, through advanced analytics, they also create metadata – information about the video data – which adds another layer of information and value.

This of course improves and enhances their ability to support safety and operational efficiency use cases in addition to security. The opportunity now exists to combine the data created by surveillance cameras with that from other sensors – monitoring temperature, noise, air and water quality, vibration, weather, and

The

more – creating an advanced sensory network allowing data-driven decisions.

We’re already seeing some use of such networks in industrial environments through the monitoring of processes and supporting proactive maintenance. But the use cases in which these network could be applied are limited only by our imaginations, but without doubt they can help improve almost every aspect of our lives, including our safety.

Sustainability always, climate change at the forefront

Sustainability has been featured in several of our annual technology trends predictions, and we see no less of a need to maintain momentum behind sustainability initiatives in their broadest sense over the coming year. Ensuring that organizations continue to measure and improve the environmental, societal, and business governance practices of their businesses will be essential in respecting people, being a trusted business partner, innovating responsibly, and protecting our planet. All these aspects will come under increasing scrutiny from customers of security and safety solutions.

However, given the extreme conditions of the past year, we do expect a more acute focus specifically on addressing climate change in 2023. It’s clear that we are not yet doing enough to stop the acceleration of global warming, and every sector will be expected to double its efforts.

For Axis, a key step has been committing to the Science-Based Targets Initiative (SBTi) which will see us setting targets for reducing emissions, not only in our own business but through our entire value chain. And this is a key point. While organisations might make great efforts to reduce emissions from their own operations, these can be undermined if their upstream and downstream value chains are not aligned to the same targets.

For technology companies, however, scrutiny of their own business operations will be just one side of the climate change coin. They will also be expected to demonstrate how their products and services support the sustainability goals of their own customers, creating efficiencies that also help those organizations reduce emissions.

An increased regulatory focus

Inevitably, given its pervasiveness and power, the technology sector as a whole and specific technologies are coming under more regulatory and policy maker scrutiny. We still believe that the focus should always be on regulation of the use cases for technology, not technology itself, and will always comply with local, regional, and international regulation. But it can be a complicated picture.

The European Commission is one of the most active in looking to regulate technology in an ongoing effort to protect the privacy and rights of citizens. Its proposed AI Act, part of the Commission’s European AI Strategy, aims to assign specific risk categories to uses of AI and would be the first legal framework on AI. Like the Commission’s AI Liability Directive, the AI Act will no doubt be the subject much debate before it becomes law.

But whether in relation to AI, demands around cybersecurity, data privacy, curbing the influence of ‘big tech,’ or establishing tech sovereignty, it’s clear that technology companies in the security sector will increasingly need to adhere to more stringent regulations. In broad terms, this should be welcomed as ensuring business transparency and ethical practice continue to be critical.

The greatest opportunity for our sector continues to be in aligning continued commercial success with our responsibility to address the critical issues facing the planet and our population. As ever, we’re optimistic that the combination of our human inventiveness, advances in technology, and ethical business practice can be combined to make the world a better place.

What does Responsible use of ai in Businesses Mean Today?

Artificial Intelligence is no longer just a cliched topic in the entertainment world. AI today has developed into a ‘must-have’ for every vertical from the government to basic applications on our gadgets. The use and dependency of AI especially in businesses have increased multifold, be it for understanding the customers or developing new products to suit the needs of the users. While the use of AI is opening up never-seen-before opportunities and possibilities for organizations across verticals, it also brings in incredible responsibility to safeguard the data and ensure transparency. Ethics seem to play a bigger part in ensuring that organizations take up a responsible path in using AI for their businesses.

Data breaches, irresponsible use of the data collected and its processing using AI, and irresponsible use of AI to an extent of violating ethics have become the main concern for the people, government and businesses. A brand’s image is now connected to how responsibly they use AI which is at its disposal without breaching the trust of its customers. In February 2021, NITI Aayog released an approach document on ‘Principles for Responsible AI’ under the hashtag #AIFORALL. The document spoke about ethics, legal, social and technology, surrounding AI. While the Indian government is slowly approaching the subject, keeping in mind the need for AI and its impact on business, society and legal standpoint, the US and EU nations too have started working now on how to bring the responsible use of AI as part of the governance. Until there is an actual policy, which can be brought in regarding the responsible use of AI, the onus is on industry leaders and their organizations to ensure the safe and responsible use of AI in their businesses.

So, what is responsible AI in businesses mean?

French writer Voltaire said – with great power comes great responsibility, and AI is a power which many believe is only in its 1st leg of being discovered. The understand-

ing of what can be achieved by delving deeper into AI is only something that is being understood now. The veterans of the AI industry believe that ‘responsible’ means ethical and democratized use of AI – a tool, which is now available to any person, who has access to the technology. To elaborate, it is the practice of designing, developing and deploying AI with the intention to empower employees and businesses. Responsible AI’s target is to deliver trust, transparency and an unbiased approach to customers or users in the work environment. Organizations deploying AI should follow important practices and the right AI techniques that are compliant with new and pending guidelines and regulations of AI governance. This will help to deliver a trustworthy and transparent deployment.

One might ask, why is AI needed for businesses when the risks and ethical dilemmas outweigh the uses as of today?

The answer is simple – with AI, businesses have an edge in developing more robust and user-friendly products that help them stay a step ahead of their competition. The data collected helps businesses understand what exactly their customers are looking for and how they can deliver it. Today’s customer service is heavily dependent on AI and good customer service is what makes a brand successful. These are just a few instances of how AI can help businesses stay ahead during times when technology is the knight in shining armour.

This is why one needs to understand the principles of Responsible AI that revolve around minimizing unintended bias, ensuring AI transparency, protecting data privacy and security, and benefiting clients and markets. Organizations deploying AI systems should keep these in mind and put them into practice to attain the desired deployment which is more ethical in compliance with Responsible AI.

An eye on the following key facts for reaping the benefits of Responsible AI

● Data security has been and should be the top priority, so organizations deploying AI should use top-of-the-line data encryption practices. Use approved techniques such as customer lockboxes and data masking to protect the data from unauthorized access by other software.

● The AI-based products should have a human-centric design and once it is developed and deployed, they should go through regular operational routines for maintaining the whole idea of it being designed to be human-centric.

● The AI system should be developed to anonymize sensitive data of clientele and automatically delete the data after the purpose is fulfilled.

● Restricted data transfers between different stakeholders

● It is very important to put in place an explicit approval system for data access during service operations.

● A good amount of incident management training and Strict data usage policies can help in times of crises.

● Keep a check on risks and threats by performing regular audits and vulnerability assessments.

Considering the above factors during AI system deployment will not only help in addressing the principles of Responsible AI but also help businesses develop ethically bound AI applications for their work operations.

Cyber-Enabled Financial Crime: USD130 Million

Intercepted in Global INTERPOL Police Operation

An INTERPOL police operation to tackle online fraud has seen almost 1000 suspects arrested and the seizure of USD129,975,440 worth of virtual assets.

Fraud investigators around the world worked together over five months (28 June – 23 November) to intercept money and virtual assets linked to a wide range of cyber-enabled financial crimes and money laundering, assisting countries to recover and return illicitly obtained funds to victims.

Specifically targeting voice phishing, romance scams, sextortion, investment fraud and money laundering associated with illegal online gambling, Operation HAECHI III was coordinated by INTERPOL’s Financial Crime and Anti-Corruption Centre (IFCACC) which supported 30 countries via their respective INTERPOL National Central Bureaus (NCBs).

In total, the operation resulted in the arrest of 975 individuals and allowed investigators to resolve more than 1,600 cases. In addition almost 2,800 bank and virtual-asset accounts linked to the illicit proceeds of online financial crime were blocked.

Operation HAECHI III investigations generated the publication of

95 INTERPOL Notices and diffusions, and the detection of 16 new crime trends.

Taking the profit out of financial crime

ted through the use of instant messaging apps where encrypted information is exchanged promoting the use of cryptocurrency wallets for payment.

Operation

HAECHI III brought together law enforcement agencies, Financial Intelligence Units, asset recovery offices, prosecutors and private sector financial experts to identify illicit funds and money mules, detect money laundering activities and deactivate associated bank accounts.

“The success of this operation is based on two key elements for law enforcement, follow the money and cooperation via INTERPOL. We have highlighted the need for greater efforts to deprive criminals of their illegal gains and this operation has seen member countries doing just that,” INTERPOL Secretary General, Jürgen Stock.

International police cooperation during Operation HAECHI III unveiled several emerging online financial crime trends, particularly variations on impersonation scams, romance frauds, sextortion and investment frauds.

Investigators also reported a surge in fraudulent investment schemes commit-

In one investigation, two Red Notice fugitives wanted by Korea for suspected involvement in a global Ponzi scheme were arrested in Greece and Italy after embezzling EUR28 million from 2,000 Korean victims.

In another case, the Austrian and Indian NCBs identified a group of online criminals who had been impersonating INTERPOL officers, persuading victims to transfer some USD159,000 through financial institutions, cryptocurrency exchanges and online gift cards. Indian authorities raided the call centre, seizing four cryptocurrency wallets and other crucial crime evidence.

“As we look to the future, we recognize the importance for decisive and concerted law enforcement action across borders. This year’s leg of Operation HAECHI III speaks volumes of IFCACC’s dedicated coordination and the strong commitment of participating countries, all of which foretell of new law enforcement victories ahead,” said Hyung Se Lee, Head of NCB Seoul.

InternatIonal Updates 70 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Operation HAECHI III cracks down on voice phishing, romance scams, sextortion, investment fraud, business email compromise and money laundering associated with illegal online gambling

From test pilot to live policing tool: ARRP

After several months of pilot testing, Operation HAECHI III saw investigators launch INTERPOL’s new global stop-payment mechanism, known as the Anti-Money Laundering Rapid Response Protocol (ARRP), which enables countries to work together to submit and handle requests to restrain criminal proceeds.

Among many ARRP successes during the operation, NCBs Manchester and Dublin worked together to trace and seize some EUR1.2 million lost to business email scams perpetrated in Ireland. The funds were returned in full to the victim’s Irish bank account, and investigations continue.

Since January 2022, in total the ARRP has helped member countries recover more than USD120 million in criminal proceeds from cyber-enabled fraud.

HAECHI III participating countries: Australia, Austria, Brunei, Cambodia, Cote d’Ivoire, France, Ghana, Hong-Kong (China), India, Indonesia, Ireland, Japan, Korea, Kyrgyzstan, Laos, Malaysia, Maldives, Nigeria, Philippines, Poland, Romania, Singapore, Slovenia, South Africa, Spain, Sweden, Thailand, United Arab Emirates, United Kingdom, United States.

The HAECHI III Operation is global in scope, conducted under the aegis of a three-year project to tackle cyberenabled financial crime supported by the Republic of Korea, with the participation of INTERPOL member countries on every continent.

STMicroelectronics, a global semiconductor company serving customers across the spectrum of electronics applications, has announced it has completed EMVCo1 certification for its STPay-Topaz-Bio biometric payment card platform. Certification confirms the security of the platform and its interoperability with payment systems. Mastercard and Visa payment schemes certifications are expected by early 2023.

The achievement makes STPay-Topaz-Bio and the underlying secure hardware the first one-stop-shop EMVCo-certified platform to comprise a biometric secure element and secure operating system (OS). The market for biometric payment cards is forecasted to grow at over 200% CAGR through 2026.

“Card issuers everywhere can now take advantage of our certified STPay platform to deliver new products to market quickly, protected by biometric authentication that is extremely robust as well as easy to use,” said Laurent Degauque, Marketing Director, Secure Microcontroller Division, STMicroelectronics, “The secure element IC that anchors this solution leverages our expertise in hardware security for computing and Internet-of-Things (IoT) applications and is built for contact and contactless transactions.”

ST’s ST31N600 secure element IC provides state-of-the-art defenses for card-payment applications and sensitive processes. These include the biometric template matching for cardholder authentication, which uses software libraries developed with Fingerprint Cards AB (Fingerprints™). The ST31N600 runs a secure OS and the latest Arm® SecurCore® architecture for secure microcontrollers. In addition, designers can introduce value-added card features by securely connecting various types of peripherals.

Co-packaged with ST’s STM32L443 ultra-low-power general-purpose microcontroller in a module compliant with EMV® specifications, STPay-Topaz-Bio delivers a cost-effective Biometric System-on-Card (BSoC) solution. The STM32L443 handles non-sensitive aspects including managing the card’s fingerprint sensor module and ensures seamless experiences for users. Also featuring energy harvesting for batteryless operation, STPay-Topaz-Bio meets EMV ISO 7816, ISO 14443, standards for contact and contactless cards.

InternatIonal Updates SecurityLinkIndia | December 2022 | www.securitylinkindia.com 71
achieves EMVCo certification for biometric-payment platform, cutting time-to-market for card issuers ST’s complete certified technology platform combines embedded secure element and ultra-low-power generalpurpose microcontroller for cost-effective and robust protection
STMicroelectronics

LenelS2 Expands Artificial Intelligence Portfolio with Hakimo Reseller Agreement

LenelS2, the global company in advanced security systems and services, recently announced a global reseller agreement with Hakimo, a technology company dedicated to modernizing physical security through its artificial intelligence (AI) software. The agreement allows LenelS2 to offer the Hakimo solution, which integrates with LenelS2’s market-leading OnGuard® and NetBox™ access control systems, to its value-added reseller community. LenelS2 is a part of Carrier Global Corporation, the leading global provider of healthy, safe, sustainable and intelligent building and cold chain solutions.

Hakimo AI software automatically prioritizes alarms based on security risk, allowing security teams to quickly respond to actual incidents and dramatically reduce door-forced-open and door-held-open nuisance alarms. The Hakimo solution also assesses access control events to uncover tailgating violations, or unauthorized access by people and vehicles, that might otherwise go undetected. Digital records of all events support personnel responding to incidents as well as compliance efforts in highly regulated sectors such as energy, critical infrastructure and avi-

ation. Insights produced by the Hakimo solution can guide security system maintenance and help inform security programs and planning.

“We are excited to announce our deepened relationship with Hakimo, which aligns with our AI product strategy and roadmap,” said Jeff Stanek, President, LenelS2, “Hakimo’s award-winning solution addresses two of the top challenges that enterprise security teams face – false alarms and tailgating.”

“Hakimo’s AI solution is revolutionizing enterprise physical security monitoring,” said Samuel Joseph, Co-Founder and CEO, Hakimo, “We look forward to bringing the technology to many more security operations teams through our collaboration with LenelS2, the leading access control provider.”

The bi-directional, integrated solution available through this agreement allows Hakimo AI data and alarms to display within the LenelS2 OnGuard and

NetBox dashboards, enabling customers with the ability to enjoy single-source access control alarm management. Enterprise security end users can activate this immersive solution through their LenelS2 value-added resellers.

Earlier this year, the Hakimo solution won the Security Industry Association (SIA) New Products and Solutions Judges’ Choice award at ISC West.

LenelS2 is the global company in advanced physical security solutions, including access control, video surveillance and mobile credentialing. Our technology includes web-based and mobile applications enhanced by cloud-based services. Incorporating open architecture, LenelS2 provides scalable, unified security management solutions to customers ranging from global enterprises to small- and mid-size organizations. Easy to install and use, LenelS2 products are supported by an experienced, responsive team dedicated to providing exceptional service. LenelS2 serves segments worldwide including corporate, education, healthcare and government. LenelS2 is a part of Carrier Global Corporation, the leading global provider of healthy, safe, sustainable and intelligent building and cold chain solutions.

InternatIonal Updates 72 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Collaboration further expands capabilities of unified LenelS2 security systems and helps address false alarm and tailgating challenges

Gallagher Named Security Software Manufacturer of the Year at the 2022 Security & Fire Excellence Awards

Global security manufacturer, Gallagher has been awarded the Security Software Manufacturer of the Year accolade at the 2022 Security & Fire Excellence Awards.

The Security Software Manufacturer award category was created to celebrate the efforts of a security software vendor who has gone above and beyond in the areas of innovation; marketing; commitment to high physical, integration and cybersecurity standards; being a great employer, and building products that meet or exceed the latest environmental and energy usage standards.

On winning the award, Gallagher’s Regional General Manager for the UK and Europe, Richard Huison said, “We’re absolutely delighted to be named ‘Security Software Manufacturer’ of the year and to be recognised for the all-round excellence of our Gallagher Security Command Centre software.

“Our customers are at the forefront of what inspires our innovation and I believe that our ability to consistently deliver such a high standard of product and service is

a direct reflection of the outstanding levels of knowledge and skill held by our employees.

“This culture of innovation and excellence ensures that Gallagher remains a market leader and creates the enduring and successful partnerships we experience with our customers.”

Command Centre is the powerful software at the heart of Gallagher’s integrated security solutions, a centralised platform that gives unparalleled control of every aspect of a site.

Fully scalable and supported by continuous investment in research and development, Com -

mand Centre supports future growth and changing security requirements.

Providing perimeter solutions, intelligent access control and building management, for critical sites with some of today’s highest security requirements, Command Centre is designed with people, site, business and building management in mind.

Now in their twenty-third year, the Security & Fire Excellence Awards highlights the very best people, projects and processes that the security and fire sectors have to offer.

InternatIonal Updates SecurityLinkIndia | December 2022 | www.securitylinkindia.com 73

Genetec Releases 2022 State of Physical Security Report

Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions, recently shared the results of its 2022 State Physical Security report. Based on insights from over 3,700 physical security leaders worldwide (including end users and systems integrators/ installers/ providers), the report looks at the security strategies organizations are putting in place to effectively navigate the realities of a changing landscape.

Cybersecurity concerns are rising

The convergence of information technology (IT) and security is inspiring new approaches to implementing and managing a strong cybersecurity strategy. 64% of IT respondents and 54% of security respondents indicated that cybersecurity tools are a top focus this year.

Use of physical security for business operations

The future of security is hybrid 54% of end-user respondents indicated that their organization’s target vision for security deployment is a blend of on-premises and cloud-based solutions. A hybrid approach enables organizations to optimize their existing on-premises investments while leveraging cloud options to save cost, increase security and efficiency, and enable remote access to systems and sensors.

The survey showed that almost two-thirds (63%) of all respondents and 7 in every 10 organizations with over 10,000 employees described physical security and related data as ‘mission-critical.’ Over the last few years, physical security has become a strategic asset to cope with a variety of challenges that go beyond just mitigating risk and is now playing a much more significant role in organizations’ digital transformation.

InternatIonal Updates 74 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
Cybersecurity concerns are on the rise; Data from physical security technology seen as ‘mission-critical’ tool for business operations; Industry embraces hybrid cloud infrastructure and unified solutions

Elbit Systems’ Simulation Infrastructure Becomes Cloud

Physical security gets unified

Most respondents (64%) reported that they run both video surveillance and access control in their physical security deployments. Of those, 77% indicated that their organization had implemented either integration between video surveillance and access control systems from different vendors, or a unified video surveillance and access control solution from one manufacturer.

“Every organization wants to get their hands on the latest technology. However, faced with budget constraints, talent shortages, and ever-changing priorities, security leaders are required to do more with less,” said Pervez Siddiqui, Vice-President of Offerings and Transformation at Genetec, “A unified security platform gives organizations a path to modernize their aging systems while leveraging their existing infrastructure. And they can do this without expensive and complex custom development.”

Survey methodology

Genetec Inc. surveyed physical security professionals from August 25 to September 21, 2022. Following a review of submissions, 3,711 respondents were included in the sample for analysis. Survey samples were run across all regions including North America, Central America, Caribbean, South America, Europe, Middle East, Africa, East Asia, Southern Asia, South-Eastern Asia, Central Asia, Western Asia, and Australia-New Zealand.

Elbit

Systems transformed its OneSim™ simulation software infrastructure to be cloud native, and its services can now be delivered to authorized users from a Microsoft Azure cloud. Working closely with Microsoft engineers, Elbit Systems redesigned the architecture of the OneSim infrastructure to meet the requirements of cloud solutions and upload the OneSim to the Microsoft Azure cloud.

OneSim is Elbit Systems’ platform-agnostic simulation software infrastructure that provides land, air and marine users a complete solution for training systems, from a standalone simulator and up to multi-platform Mission Training Centers.

“We believe that going to the cloud is essential as militaries across the globe seek to scale-up their synthetic training capabilities, introducing complex multi-domain training and allowing location-agnostic, force-agnostic training sessions. Running a cloud-based simulation infrastructure can make it simpler to conduct joint training sessions, integrating forces of various types that are stationed at different locations,” commented Alon Afik, VP – Training and Simulation at Elbit Systems, “I believe that having our OneSim simulation software infrastructure running on a global public cloud solution such as the Microsoft Azure, demonstrates our capability to run OneSim on any of our users’ private clouds.”

Beyond the significant operational advantages the cloud native OneSim simulation infrastructure also greatly improves efficiency as it enables to simplify updates, upgrades and maintenance activities.

InternatIonal Updates SecurityLinkIndia | December 2022 | www.securitylinkindia.com 75
Native
A cloud native infrastructure enhances scalability and connectivity, while simplifying upgrades and maintenance

Tenable Research Finds 72% of Organizations Remain Vulnerable to ‘Nightmare’ Log4j Vulnerability

Tenable®, the Exposure Management company, recently announced the results of a telemetry study examining the scope and impact of the critical Log4j vulnerability, known as Log4Shell, in the months following its initial disclosure. According to the data collected from over 500 million tests, 72% of organizations remain vulnerable to the Log4Shell vulnerability as of October 1, 2022. The data highlights legacy vulnerability remediation challenges, which are the root cause of the majority of data breaches.

When Log4Shell was discovered in December 2021, organizations around the world scrambled to determine their risk. In the weeks following its disclosure, organizations significantly reallocated resources and invested tens of thousands of hours to identification and remediation efforts. One federal cabinet department reported that its security team devoted 33,000 hours to Log4j vulnerability response alone.

Tenable telemetry found that one in 10 assets1 was vulnerable to Log4Shell as of December 2021, including a wide range of servers, web applications, containers and IoT devices. October 2022

data showed improvements, with 2.5% of assets vulnerable. Yet nearly one third (29%) of these assets had recurrences of Log4Shell after full remediation was achieved.

“Full remediation is very difficult to achieve for a vulnerability that is so pervasive and it’s important to keep in mind that vulnerability remediation is not a ‘one and done’ process,” said Bob Huber, Chief Security Officer, Tenable, “While an organization may have been fully remediated at some point, as they’ve added new assets to their environments, they are likely to encounter Log4Shell again and again. Eradicating Log4Shell is an ongoing battle that calls for organizations to continually assess their environments for the flaw, as well as other known vulnerabilities.”

Other key findings from the data include:

● 28% of organizations across the globe have fully remediated Log4Shell as of October 1, 2022, a 14-point improvement from May 2022.

● 53% of organizations were vulnerable to Log4j during the time period of the study, which underscores the

pervasive nature of Log4j and the necessary ongoing efforts to remediate even if full remediation was previously achieved.

● As of October 2022, 29% of vulnerable assets saw the reintroduction of Log4Shell after full remediation was achieved.

● Some industries are in better shape than others, with engineering (45%), legal services (38%), financial services (35%), non-profit (33%) and government (30%) leading the pack with the most organizations fully remediated. Approximately 28% of CISA-defined critical infrastructure organizations have fully remediated.

● Nearly one third of Nor th American organizations have fully remediated Log4j (28%), followed by Europe, Middle East and Africa (27%), Asia-Pacific (25%) and Latin America (21%).

● Similarly, North America is the top region with the percentage of organizations that have partially remediated (90%), Europe, Middle East and Africa (85%), Asia-Pacific (85%), and Latin America (81%).

InternatIonal Updates 76 SecurityLinkIndia | December 2022 | www.securitylinkindia.com

Quantum Wins Three Video Surveillance Industry Awards Demonstrating Continued Technology Leadership

QuantumCorporation, the leading company in solutions for video and unstructured data, today announced that it has been recognized with three awards in two leading security industry programs – The American Security Today (AST) ‘ASTORS’ 2022 Awards and Security Today’s 2022 New Product of the Year Awards. Following the acquisitions of hyperconverged infrastructure (HCI) software companies Pivot3 and EnCloudEn in 2021, Quantum has rapidly strengthened and continued to innovate on its end-to-end portfolio to store, manage, and enrich video surveillance data across its entire lifecycle, resulting in recognition from several industry awards.

The AST ‘ASTORS’ are the preeminent U.S. Homeland Security awards program to recognize industry leaders of physical and border security, cybersecurity, law enforcement, first responders, and federal, state and municipal government agencies in the acknowledgment of their outstanding efforts to keep our nation secure. Quantum was recognized with two 2022 ‘ASTORS’ awards for the company’s latest video surveillance solutions, Quantum Smart NVR (Gold-level award) and Quantum Unified Surveillance Platform (Platinum-level award), both in the video surveillance category.

Quantum’s Unified Surveillance

Platform (USP) was also named Security Today’s 2022 New Product of the Year in the Video Surveillance Data Storage category. The Security Today New Product of the Year Award honors the outstanding product development achievements of security equipment manufacturers whose products are considered to be particularly noteworthy in their ability to improve security.

Quantum USP and Smart NVR were both introduced at the ISC West 2022 tradeshow in March. The Unified Surveillance Platform provides a highly resilient, flexible, and secure platform for capturing, storing, and managing mission-critical video and hosting other physical security applications, including video analytics, access control, and visitor management. For organizations with smaller implementations, the Quantum Smart NVR combines Quantum USP software with a purpose-built recording server to create a next-generation, integrated appliance for capturing and recording surveillance video.

“The amount of data being generated by video surveillance cameras and other physical security applications is growing exponentially, which is why we’re committed to providing customers with comprehensive, end-to-end solutions that help them to manage and find value in video data throughout its entire lifecycle,” said Choon-Seng Tan, Gener-

al Manager, Strategic Markets for Quantum, “Today’s solutions for storing video data – like standard NVRs – cannot keep up with the rapid growth of data and increasing requirements to retain data for longer periods of time. Our USP software, which was a result of the innovation our team developed to enhance the technologies we acquired from Pivot3 and EnCloudEn, enables customers to scale as needed and offers the highest level of resilience to ensure data is not lost or degraded. These industry awards are proof points to our leading solutions that support today’s modern video surveillance needs.”

“With more data to manage, store and retain and the wide range of physical security applications they have to support, customers need a flexible infrastructure that will grow with them and deliver the best TCO,” said Tom Larson, President of Velasea, a full-service OEM system builder and distributor for the physical security market, “We only partner with companies that offer the best solutions to help security integrators and their customers reduce costs and allow them to evolve their security infrastructure to keep pace with ever-changing technology, compliance regulations, and requirements over time, which is why we chose to work with Quantum and the innovative solutions they provide.”

InternatIonal Updates SecurityLinkIndia | December 2022 | www.securitylinkindia.com 77
Innovative new product offerings and subsequent industry awards underscore Quantum’s leadership and expansion in the video surveillance and analytics market

Elbit Systems Awarded a $72 Million Contract to Supply Hermes 900 Unmanned Aircraft Systems to an International Customer

Elbit Systems Ltd., was recently awarded a contract valued at $72 million to supply Hermes™ 900 Unmanned Aircraft Systems (UAS) and training capabilities to an international customer. The contract will be performed over a two-year period.

Under the contract, Elbit Systems will supply Hermes 900 UAS equipped with the SkEye™ Wide Area Persistent Surveillance system, SPECTRO™ XR multi-spectral Electro-Optical payload, Satellite Communication, Signal Intelligence (SIGINT) payloads and additional capabilities.

The Hermes 900 UAS has been selected to-date by more than 15 customers attesting to its competitive edge combining technological sophistication, reliability, open architecture and a solid growth path.

Yoram Shmuely,

Systems Aerospace, commented, “This contract is another vote of confidence in the Hermes family of UAS. We are witnessing growing demand around the globe for our unmanned solutions that are capable of effective integration with manned forces to address the rap-

idly evolving threats in all domains of operation.”

Elbit Systems Ltd. is an international high technology company engaged in a wide range of defense, homeland security and commercial programs throughout the world. The Company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance (C4ISR), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios, cyber-based systems and munitions. The Company also focuses on the upgrading of existing platforms, developing new technologies for defense, homeland security and commercial applications and providing a range of support services, including training and simulation systems.

InternatIonal Updates 78 SecurityLinkIndia | December 2022 | www.securitylinkindia.com
General Manager of Elbit

Trends

Law Enforcement Agencies

DI Ltd., a global company in Digital Intelligence (DI) solutions for the public and private sectors, recently announced the results of the 2022 Industry Trends report. The 2022 Industry Trends report, a study commissioned by Cellebrite, reveal that most law enforcement agencies and prosecutors believe that digital evidence is more important than physical evidence and DNA in successfully prosecuting cases.

Cellebrite

The data, gathered from over 2,000 chiefs of police, agency managers, examiners, investigators, and prosecutors, illustrates the extent to which digital evidence sources – including smartphones, laptops, social media, opensource, cryptocurrency, CCTV, vehicles and drones – are creating enhanced challenges for law enforcement.

The study’s findings reinforce the need for law enforcement agencies across the world to invest in digital forensics trainings or existing staff, recruit more technology expertise into their teams and partner with software providers than can help them manage digital evidence more efficiently.

Below are some of the study’s key findings:

● 74 percent of agency managers agree that there is a growing technology skills gap in policing, making it even tougher for police forces to collect,

manage, analyse, store and use the digital evidence required to secure court judgements.

● 48 percent of police chiefs and agency managers believe that their digital transformation strategy is poor or mediocre.

● 66 percent of respondents agree digital evidence has overtaken physical evidence – including laptops, mobiles, thumb drives, CCTV – in its significance to solving cases.

● 51 percent of examiners agree that the backlog of devices that need evidence extraction has increased in the last year.

● The average number of days it takes for investigators to receive an extraction report has leapt from six days to nine days in the last year.

Detective Sargent Chris Collins of the Lake Jackson Police Department expanded, “Access to digital evidence is vitally important to resolve cases more quickly, and the data from this survey is proof positive of this fact. As digital evidence grows in volume and breadth, investigators, analysts and prosecutors need accurate data to accelerate the time to justice, and Cellebrite offers solutions to achieve this goal.”

Leeor Ben-Peretz, Chief Strategy Officer at Cellebrite commented, “There is a common misconception amongst the pub-

lic that gathering evidence to prosecute crimes is all about plastic bags, fingerprints and DNA swabs. This is an arcane view of the policing world – informed by movies and TV shows – and one that fundamentally ignores the massive, growing role that digital evidence plays.”

Cellebrite’s 4th annual Industry Trends Survey provides an in-depth look at the trends affecting and defining how global law enforcement agencies, military organizations, and the intelligence community are operating today.

Based on 2,000 responses from law enforcement professionals in 119 countries, the 2022 Industry Trends Survey provides a snapshot of how agencies are coping with wide-ranging challenges.

Cellebrite’s mission is to enable its customers to protect and save lives, accelerate justice, and preserve privacy in communities around the world. We are a global leader in Digital Intelligence solutions for the public and private sectors, empowering organizations in mastering the complexities of legally sanctioned digital investigations by streamlining intelligence processes. Trusted by thousands of leading agencies and companies worldwide, Cellebrite’s Digital Intelligence platform and solutions transform how customers collect, review, analyze and manage data in legally sanctioned investigations.

InternatIonal Updates SecurityLinkIndia | December 2022 | www.securitylinkindia.com 79
Cellebrite’s 2022 Industry
Study Reveals the Digital Evidence ‘Tipping Point’ has been Reached, Creating New Challenges for
Digital evidence ‘more important’ than physical evidence and DNA in successfully prosecuting cases New challenges include a growing backlog of devices delaying investigations

Ransomware attacks are Growing in Cost and Frequency: Companies Should Take These 5 Steps to protect Themselves

Ransomware attacks continue to impact organizations worldwide – and the costs are staggering. A new survey by Arcserve of over a thousand IT decision-makers at small and midsize companies across India, found that 63% had been targeted by a ransomware attack, with 67% asked to pay over ‘$10k – $100k in ransom, 17% to pay between $100k – $1m and another 17% to pay in ‘$10m – $100m.

These numbers are not expected to improve soon. The sad truth is that, despite spending billions on cybersecurity tools, businesses are still poorly prepared for ransomware attacks. Only around 18% of all respondents to the survey said they’re very confident in their ability to recover lost data in the event of a ransomware attack. Smaller businesses are even less well prepared.

Meanwhile, the attack surface continues to expand as organizations using technologies like IoT, artificial intelligence, and 5G generate even more data – data that can be compromised and held captive by ransomware attackers.

For this reason, companies must take a new approach to data resilience. They must strengthen their disaster-recovery strategies, backup systems, and immutable storage solutions to prevent the loss of mission-critical data . Many organizations do invest on strategies for data resilience. The survey a lso found that 49% of organizations in India are making additional investments to protect against ransomware attacks, with the top areas of investment being security software,

training and certification (33%), and managed services (35%).

While these investments are encouraging, more should be done. Because, for most companies, it’s not a matter of if their data will be compromised; it’s a matter of when. With ransomware attacks increasing yearly, data backup and recovery should be at the very top of every organization’s priority list.

Here are five steps businesses can take now to reduce their exposure to ransomware and avoid staggering losses.

1. Educate employees

It’s essential to invest in training for staff so that they’re aware of how ransomware works. From there, employees will be better prepared to recognize and prevent it. They should know that ransomware can sneak in from anywhere. The training should remind them to scrutinize every link in emails and not open attachments in unsolicited emails.

Employees should be reminded to download only software – especially free – from websites they know and trust.

When possible, employees should verify the integrity of downloaded software through a digital signature before execution.

Focus on cures

2.
as well as prevention Companies continue to invest loads of money in cybersecurity solutions like next-generation fire-
india & sAARc

walls and extended detection and response (XDR) systems designed to prevent attacks. Yet these same companies are still falling prey to ransomware and being forced to pay a hefty price.

It’s time for companies to stop focusing entirely on prevention. They should also invest in curative measures like backup & recovery and immutable storage that allow them to quickly restore their data and avoid paying the ransom when attackers break in.

Regular data backups and encryption play a key role in protecting an organization’s data. A consistent backup schedule will enable you to seamlessly restore any compromised systems or data. Multi-factor authentication (MFA) can again help in enforcing zero-trust. MFA makes it difficult for an unauthorized person to access end-points that can compromise network security. If one factor is compromised or broken, the attacker still has at least one or more barriers to breach before successfully breaking into the target. Other than that, encrypting your sensitive data is also highly recommended. After all, if ransomware attackers gain access to your critical assets, encryption has the benefit of keeping data from being read and further exploited by the bad guys.

3. Place a premium on data resilience

Your data resilience is only as strong as your weakest link. Monitor your weaknesses, fix them when you find them, and you can bounce back quickly from disruption and return to normal operation. To do this, you must have the technologies required to back up your data and recover it if necessary, along with the proper mindset. That means a defensive posture is regularly sustained with drills that simulate an intrusion to measure your resiliency and bolster it where necessary.

Many companies develop a strategy and then neglect to test it. That’s like a basketball team devising a sophisticated defense and never bothering to practice it. All companies should regularly test their data backup and recovery plans to ensure they can effectively restore their data and systems if an attack or natural disaster occurs.

4. Know what data is most critical

Data varies in value. If you’re concerned about costs, as most organizations are these days, you don’t have to store or back up all your data in the same place. Look into storage solutions that provide options like data tiering. These enable you to place less-important data in less-expensive levels of storage or ‘tiers.’

Another upside of data tiering is lower energy costs. You’ll use less compute power if you’re not storing every last byte of your data at the highest security level.

5. Put a disaster-recovery plan in place

Despite all the preventive measures you take, you need to prepare for the possibility that you will get hit. So, it would be best if you had a disaster-recovery plan. You need to be able to back up data as often as is appropriate – ideally every 15 minutes for critical data. You also need to easily verify that your whole environment is backed up, including your remote workers and any SaaS applications you use, such as Microsoft 365.

A good disaster-recovery solution will back up your data to a location of your choice and on a schedule that suits you. It will also be easy to test, which is crucial because testing is the only way you can validate that your recovery-time goals can be met. It may seem obvious, but this is where a lot of solutions fall short. Your disaster-recovery solution must be able to recover your data every time and on time. When ransomware hits, you want to be confident you can recover your data and get on with business as soon as possible.

Final takeaway

There is no perfect defense against ransomware. The best approach is a multilayered one that includes educating your staff, investing in reliable data backup & recovery and immutable storage solutions, and having a robust disaster recovery plan. That’s how organizations can stay ahead of this growing threat and protect their data and bottom line.

cameras

others. This means there are models suitable for multiple settings and scenarios, including residential dwellings, small shops, restaurants, small factories, small farms, and other kinds of small and medium-sized operations. Where these cameras are applied depends on the user’s requirements in terms of how cameras should look in that particular setting.

Advantage for SMB Customers

First,

has launched a new range of PT-Series pan & tilt cameras to meet the needs of small and medium-sized businesses. This means the cameras are simple to install, easy to use, and able to cover a wide range of security scenarios based on the ability to turn on two axes to keep security incidents within the field of view.

Hikvision

Hikvision PT-Series Cameras

the installation of the traditional fixed camera tends to be complicated and time consuming. In addition, fixed cameras are unable to turn flexibly, resulting in a limited vision. The PT-Series addresses these challenges. Featuring a versatile bracket, PT Cameras allow installers to mount the camera easily with no need to adjust the viewing angle on site. This minimizes installers’ efforts and reduces cost for SMB customers. Besides, SMB customers can adjust the camera angle from their mobile device using the Hik-Connect app, giving them a much more convenient experience. They can also check live video feeds, get event notifications, communicate remotely with two-way audio, and more. All these features make security more engaging for them, while also helping them to see the big picture with a much broader field of vision.

Hikvision

PT-Series Cameras is the new camera series. PT Cameras use a motor to move vertically and horizontally. The motorized panning and tilting function can be used with the mobile APP, enabling users to get greatly expanded video coverage, including areas that were previously ‘hidden’ from fixed cameras.

The Difference Between PT & PTZ

There’s only one letter of difference between them. In terms of functionality, the main difference is that PT Cameras have slightly scaled down features compared to the PTZ Cameras. For example, the PT Cameras offer basic rotation for a full view of security and tend to have 0x-4x optical zoom capabilities, which is typically perfect for SMB settings and budgets. On the other hand, PTZ Cameras offer more advanced and comprehensive features, making them ideal for enterprises and public organizations with larger-scale or more demanding security requirements.

Recommended Application Scenarios

PT Cameras come in different forms such as PT dome cameras, PT bullet cameras, PT turret cameras and

How to Choose the Right PT Camera

The PT Cameras solve users’ needs with ‘motion’ capabilities, but they may also offer capabilities such as ColorVu and AcuSense to meet customers’ specific needs. For example, customers who need full-color video imaging with additional motion function can choose the PT Camera with ColorVu technology, and those who want a camera that can distinguish between humans, vehicles and other innocent moving objects such as pets or falling leaves may opt for a PT Camera with embedded AcuSense technology.

Additional Protection Measures for PT Cameras

Toprovide better waterproofing performance, we have optimized the structure of PT products, drawing on our experience of designing highly resilient traditional dome cameras. The waterproof and dust-proof performance of PT-Series cameras complies with the IP66 water and dust-resistance standard, making them suitable for both indoor and outdoor environments.

what to expect from hikvision’s new pt-series

dis expands enterprise

IDIS, one of the largest manufacturers of trusted South Korean-made video tech, has enhanced its range of enterprise-class network video recorders with the launch of a powerful new 64-channel model, the DR-8564.

The NDAA-compliant 4K recorder delivers outstanding transmission speed and quality using the latest Intel® chipset technology. Boasting an incoming throughput of 540Mbps and up to 1920ips UHD real-time recording, the DR-8564 utilizes Intelligent Codec to reduce bandwidth and storage requirements, and gives users the assurance of RAID 1, 5, and 10 as well as redundant power.

TLS with IDIS’s proprietary protocols, plug-and-play mutual device authentication and two-factor authentication. IDIS iBank, a specialist database structure and Chained Fingerprint, also ensures the integrity of recorded footage for use as forensic evidence.

Dennis Choi, General Manager, IDIS Middle East and Africa stated, “The IDIS DR-8564 is set to be one of our most robust recording solutions yet. The latest Intel chipset technology enables the DR-8564 to deliver unmatched transmission speed and quality, while extended warranties, industry-leading low hard drive failures, and DirectIP plugand-play installation with an extensive range of cameras guarantees a low total cost of ownership.”

3xloGic Announces launch of viGil cloud in europe

With outstanding recording and simultaneous live view capabilities with no visible latency, the IDIS DR-8564 offers enterprise-level performance, inherent cybersecurity, and critical redundancy, while reducing cost and complexity. Leveraging the power of IDIS DirectIP® and FEN (For Every Network) technology, the DR-8564 benefits from simple plug-and-play installation and rapid one-click configuration for multi-site deployments as well as supporting ONVIF for third-party camera integration.

Ideal for a range of mid-large sized applications, the recorder comes with the assurance of cybersecurity combining

3xLOGIC,

the leading provider of integrated and intelligent security solutions, has announced the availability of its innovative VIGIL CLOUD system across Europe. Originally launched in the U.S. in 2020, VIGIL CLOUD extends the scope of 3xLOGIC’s award-winning VIGIL Video Management System into the cloud, and has proven popular among organisations looking for a powerful, scalable and easy-to-use platform.

Expanding Ecosystem

“We are incredibly excited that VIGIL CLOUD is now part of our European product ecosystem and look forward to building on its incredible success in the USA,” said

i
Range with the launch of a new 64-channel n v R
New NDAA-compliant network video recorder uses latest Intel chipset to deliver outstanding transmission speed and quality

Alex Buckle, 3xLOGIC’s UK Business Development Manager, “3xLOGIC recognised early on the potential of extending our innovative VIGIL VMS solution to the cloud, and VIGIL CLOUD was born. VIGIL CLOUD delivers the holistic view of your security system you’ve been looking for and can grow with your ever-changing needs.”

a combination of clips to be shared or archived. Changing permissions or adding and removing users is straightforward, while regular automatic upgrades to software and compatible hardware ensure the user has the latest, most powerful features.

Data Protection

VIGIL CLOUD can be accessed via desktop or mobile app. Users can view live and playback video from cloud cameras; bookmark cameras for quick and easy access from the main dashboard; check camera heath status; export footage clips; and collect and package related video events together in case files that can be easily retrieved at a later date – anytime, anywhere, from any device.

Smart Search

Using

VIGIL’s innovative Smart Search capability, users can focus their enquiries on just the areas or frames that most interest them. An intuitive interface makes it possible to narrow down footage search results by selecting as many or as few blocks of the image as desired within the playback field of view. In addition, the mobile app makes tasks like viewing video and reacting to notifications simple and efficient. The VIGIL CLOUD dashboard provides convenient access to the most recently viewed cameras, cases and locations in an intuitive point-and-click user interface.

Team Collaboration

Collaboration

with team members and other stakeholders is a snap with VIGIL CLOUD, which is especially important considering how hard it can be to share large video files. VIGIL CLOUD also offers a highly effective case management feature, where users can share critical information and insights and work together on projects. It is a simple yet effective way to select, store and annotate a single clip or

Data

protection is an area where failure is not an option and VIGIL CLOUD has been designed to offer end users peace of mind in this area through encryption and the continuous monitoring of cybersecurity threats. By leveraging Amazon Web Services’ (AWS) expertise, infrastructure and internet of things (IoT) services, VIGIL CLOUD is a highly secure way to collect, store and process video at scale using the cloud.

“With the rapid growth in the amount of data created by surveillance cameras and other security technology, the ability to manage and archive video and other security data via the cloud is highly attractive,” Buckle said, “Cloud processing and storage also offer significant financial savings by enabling more cost-effective scaling, alongside a vast reduction in hardware maintenance and management costs. The availability of 3xLOGIC’s VIGIL CLOUD throughout Europe will change the way video is managed across the continent, while offering a secure platform for today and far into the future.”

Allied Vision integrates Sony 1st generation IMX global shutter sensors with Pregius sensor Technology into its Alvium camera portfolio. With the new camera models, the Sony IMX249 sensor is now also available in Alvium cameras with either GigE Vision (Alvium G1-234), USB3 Vision (Alvium U-234), or MIPI CSI-2 (Alvium C-234) interface.

Alvium cameras with sony iMX249 and iMX174 sensors expand Available Alvium portfolio
Sony Pregius IMX sensor generations
Allied Vision now supports all

The faster Sony IMX174 Sensor has also been integrated into the Alvium USB3 Vision camera series (Alvium U-235) as well as into the Alvium CSI-2 camera series (Alvium C-235).

The IMX249 and IMX 174 sensors with a large pixel size of 5.86µm are known for their saturation capacity of more than 30000e-. They can catch much light before saturating giving them a large dynamic range of 73dB.

New camera models at a glance

ModelSensor

load on the host side can be achieved.

Along with Vimba 6.1 Allied Vision is releasing a new version of the Alvium CIS-2 driver 4 for NVIDIA Jetson, enabling the user to benefit from the Machine learning and AI capabilities of the latest NVIDIA® Jetson™ systems. With the released driver, NVIDIA Jetpack 4.6.1 is supported and NVIDIA Jetson TX2 NX is added to the list of supported Jetson systems. A beta version supporting NVIDIA Jetpack 5.0.2 is also available, so that designers of embedded system can already integrate Alvium CSI-2 cameras also into NVIDIA Jetson AGX Orin based systems.

Alvium C-234

Alvium U-234 IMX 249 2.3 MP 1936 (H) x 1216

40fps 5.86µm1/1.2”

Alvium U-235 IMX174 155fps

Alvium C-235

CSI-2 cameras for embedded systems

Together with the hardware release, user of Alvium CSI2 cameras can benefit from a new version of Allied Vision Software development Kit Vimba. As CSI-2 is a very streamlined protocol CSI-2 cameras require less processing time (CPU) on the host system due to low overhead making CSI-2 cameras particularly suitable for embedded systems. Compared to a USB camera, the CPU load can be reduced by up to 70%. Now the internal stream layout of Alvium CSI-2 cameras using GenICam for CSI-2 has been optimized. With the new Vimba 6.1 a further significant reduction of the CPU

investigation process and Adds cloud capabilities

Qognify,

the leading provider of video and enterprise incident management solutions, has launched the second release of its video management software Qognify VMS. The latest software version – Qognify VMS 7.2 – comes with extended support for body worn video, additional functionalities to support investigations, and a new web client architecture.

Qognify VMS 7.2 addresses the increasing use of body worn video (BWV) across many sectors, ranging from police and security applications to customer service and quality control. As BWV has become an important component in the security ecosystems of many Qognify VMS customers, the need to integrate BWV footage into a fully featured VMS environment for investigation purposes has become increasingly apparent. In this context, it is crucial that the BWV integration framework is able to maintain the chain of custody of captured footage for law enforcement applications. Therefore, Qognify has worked closely with manufacturers of BWV systems to ensure that chain of custody protocols are adhered to – especially when devices are used in multiple shifts by different users. With Qognify VMS 7.2, these extended capabilities are now available for organizations using BWV from

Qognify vMs 7.2 supports the
Resolution (HxV) Frame Rate Pixel size Optical Format

Axis, with integrations of other manufacturers to follow in future releases.

In addition to supporting further video sources, Qognify VMS 7.2 offers new enterprise-class capabilities to simplify investigations and enhance privacy. Cameras, maps, and layouts can now be provided with logical labels and thus be grouped accordingly. For example, when operators need to see video feeds from all the cameras in a particular stairwell, they simply select the respective entity label, and all corresponding cameras are automatically presented – regardless of where these may sit in the physical structure of the installation. As a result, the operators can get a comprehensive understanding of the situation more quickly and realize efficiency gains. As the investigation process is often related to privacy considerations, Qognify VMS 7.2 now makes it also possible to restrict access to particular cameras to dedicated workstations. Furthermore, a new static scramble function enables the blurring of a designated area within the camera view using an adjustable privacy mask, opening up video masking for a whole new range of applications.

Qognify VMS 7.2 also continues the company’s strategic initiative to develop enterprise-class cloud capabilities. As part of the release, Qognify now provides cloud storage offerings designed for the specific requirements of video management. The use of traditional cloud storage solutions often comes with unpredictable costs, as typically the cloud storage provider charges for the retrieval of video footage from their servers. Many IT departments cannot reflect this in their budget structure, which often prevents them from using this technology. In contrast, Qognify only charges the volume of cloud storage used on a per-terabyte basis, no matter how often the customer needs to retrieve video – resulting in a consistent ‘pay as you go’ cost easy to budget for.

The new software version also provides the very first look

at Qognify’s new web client architecture, which is characterized by high-performance video display capabilities. Yaniv Toplian, VP R&D at Qognify, explained Qognify’s approach, “Many VMS web clients either require the installation of additional software components, which makes them inflexible and creates cybersecurity risks, or compromise on display performance and latency. In order to overcome this, we’ve developed a new, revolutionary streaming and playback technology that enables the display of video streams with very low latency in a standard browser environment without any additional software components. This is even more important as the web client is an essential part of Qognify’s comprehensive cloud strategy, which aims to offer organizations a maximum amount of flexibility for their deployments.”

The new Qognify Web Client creates a framework that will allow organizations to improve their investigation and response processes via adaptive workflows and enhanced communication and coordination capabilities. Limited functionality will be available for Qognify VMS 7.2, with enhancements being developed in each release moving forward.

Ontop, there is also a new, free plugin available that enables automatic data transfer between AutoCAD® software and Bosch Safety Systems Designer. This free Bosch SSD Plugin is the only tool of its type offered by any fire alarm system manufacturer. Architects, planners and system integrators now enjoy the benefit of easily importing fire alarm system devices from floor plans into the Safety Systems Designer software.

AutoCAD® software is the most frequently used platform for building- and fire alarm systems design covering all planning phases. The Bosch SSD Plugin changes a

Bosch has Released its new software version of safety systems designer
Seamless integration of Bosch planning software Safety Systems Designer with AutoCAD® software via new Bosch plugin

time-consuming process from the users’ daily work routine into a stream-lined experience. With the new SSD Plugin, the process is now fast, reliable and simple, enabling better project design and synchronization at any scale, so fire alarm systems can be imported no matter the size of the floor plan or building project.

Comprehensive CAD blocks library available

The Bosch SSD Plugin includes an extensive SSD CAD blocks library allowing designers to pick icons from more than 150 of EN 54 fire alarm system devices. These can then be placed comfortably onto floor plans through the AutoCAD® blocks palette. What’s more, the SSD Plugin can be used with any customer specific CAD block, so that these can be amended and then transferred to Safety System Designer.

One solution for a variety of tasks

Toimprove the efficiency even further, every fire alarm system device can be assigned to a panel as well as to a loop in the context menu of the AutoCAD® application. Safety Systems Designer automatically keeps these assignments to panel or loop after the import.

After import to Safety Systems Designer, users can continue further in-depth planning such as preparing a bill of material, a tender text, the battery calculation, or a system viability check.

The new version of Safety Systems Designer and the Bosch SSD Plugin for AutoCAD® software are available immediately free of charge and can be installed effortlessly with a simple setup assistant. Both the integrated SSD CAD blocks library and the user interfaces are available in 17 languages.

hanwha techwin europe launches t nv-7011Rc Anti-ligature camera with wide Fov

Techwin, a global company in video surveillance products and solutions, has launched the TNV7011RC, a compact and anti-ligature corner mount camera that offers a wide field-of-view (FOV) up to 3MP resolution and 30fps. The camera is the latest addition to the Wisenet T range, which is designed for challenging environments.

Hanwha

The TNV-7011RC offers a compact and aesthetically attractive design that fits neatly into room corners and lifts, and it is built to make it impossible for ligatures to be tied around it or for it to be easily ripped off a wall. The camera comes with Hallway View to enable operators to monitor tall and narrow spaces like corridors. It additionally features Dark IR 940nm of up to 10 metres, to help with monitoring very dark areas. Wide dynamic range (WDR) in the Wisenet T series cameras captures 4 frames at different exposure levels to create a combined, clear, and vivid image even in environments with strong backlight conditions.

A range of in-built Intelligent Video Analytics support operators to quickly detect different types of incidents including tampering, motion detection, loitering, sound detection, virtual line, and enter/ exit. The analytics also detects focus and defocus, ensuring clear images are relayed consistently to operators.

WiseStream II compression technology, when used with the H.265 codec, enables storage and bandwidth savings of up to 75% when compared to the use of H.264 video compression alone. It also dynamically controls encoding, balancing quality and compression according to movement in the image.

Invixium, a premier manufacturer of innovative touchless biometric solutions, recently announces the launch of IXM VERTU, a modern access control reader capable of reading RFID cards along with mobile credentials via BLE or NFC from up to 8 cm away. Installation takes mere minutes and configuration is easily completed for Wiegand or OSDP through a configuration app. For clients that already have an access control software solution, IXM VERTU can seamlessly be added to their existing access control system. Invixium’s suite of biometric products along with IXM VERTU will be on display during the ASIS Middle East exhibition at stand F7.

VERTU’s rich combination of features is built into a sleek, elegant two-tone enclosure that can be easily mullion mounted in small spaces and door frames, complementing any new or existing décor. Its IK08 impact and IP67 ingress ratings allow IXM VERTU to be installed indoors or out-

doors. The durability and appealing design of VERTU make it a great choice for businesses of all sizes and industries.

Shiraz Kapadia, CEO & President of Invixium, expressed his excitement at the new possibilities for Invixium customers with the launch of IXM VERTU, “While biometrics is the heart and soul of Invixium, we are humble enough to admit that not every door requires the extreme level of security that biometrics offers. VERTU strikes the perfect balance of sleek design and security.”

new Red explosionprotected cameras for hazardous Areas

Axis

Communications has launched new fixed box cameras with worldwide certification to ensure safe operation in explosion prone applications. These easy-to-install and integrate IP cameras are enclosed in red colored aluminum housing making them more visible to allow personnel to use them to signal to operators in emergency situations.

Images are optimized for forensic purposes irrespective of lighting conditions, thanks to Axis Lightfinder and Forensic WDR technologies. D101-A XF P3807 features four sensors to give seamless 180° panoramic overviews in one single video stream. Whereas, F101-A XF Q1785 features a 32x optical zoom for 2 MP/ HDTV 1080p up to 60fps and comes with AXIS Guard Suite pre-installed and Active Gatekeeper. The latter allows to monitor a gate and its surroundings, adding autotracking functionality to follow an object that moves away from the gate.

veRtu – An elegantly designed card
Mobile Access Reader
Unveils New Modern Access Control Reader at ASIS Middle East
invixium launches iXM
and
Invixium

Key features include:

● Certified for Class I/II/III, Division 1 and Zone 1.

● Seamless 180° panoramic overviews.*

● Cost-efficient installation with PoE.

● Forensic WDR and Lightfinder. These products offer flexible PoE installation and Axis Zipstream with support for H.264 which significantly lowers bandwidth and storage requirements.

*Applies for D101-A XF P3807 Explosion-Protected Network Camera.

The GXV3450 runs on Android 11 to offer full access to the millions of Android applications and supports custom app development. It can be seamlessly integrated with other Grandstream products, including Wi-Fi access points, routers, facility access solutions, IP PBXs, video conferencing devices and more.

The GXV3450 is the ideal desktop device for busy professionals, executives, sales teams and receptionists as it offers instant access to a variety of voice, video, multimedia and application communication solutions. It also offers a powerful yet cost-effective video device for any conference room. Notable features of the GXV3450 include:

● Runs Android 11 and offers access to the millions of Android apps.

● 5-inch (1280x720) capacitive touch screen.

Grandstream Announces

● Built-in 2-megapixel camera for video calling with privacy shutter.

● Integ rated dual-band Wi-Fi (802.11 a/b/g/n/ac).

● Built-in Bluetooth support for syncing with mobile devices, Bluetooth headsets etc.

The GXV3450 provides a 5” touch screen as well as traditional keys to deliver an all-in-one desktop collaboration and productivity solution

Grandstream, connecting the world since 2002 with award-winning unified communication and networking solutions, recently announced the latest addition to their award-winning GXV Series of IP Video Phones for Android ™. The new GXV3450 provides an all-in-one desktop productivity solution by combining a multi-platform video collaboration device with a 16-line IP phone and the functionality of an Android tablet. It utilizes a 5” touch screen plus traditional keys to provide the ideal collaboration platform for or busy professionals, executives, sales teams, receptionists and more.

The GXV3450 delivers a powerful experience thanks to its 5-inch 1280x720 touch screen, built-in 2-megapixel camera, support for 720p HD video, integrated dual-band Wi-Fi, built-in Bluetooth, HDMI input/ output and more.

● Dual-mic HD speaker phone with Noise Shield 2.0, advanced echo cancellation and excellent double-talk performance for any scenario.

● Dual Gigabit por ts with PoE/ PoE+.

● 16 lines with up to 16 SIP accounts.

● Built-in support for 10-way HD audio conferencing and 3-way 720p 30fps HD video conferencing.

● Quad-core 1.8GHz ARM Cortez A55 processor with 2GB RAM and 16GB eMMC Flash.

● Peripherals include USB 3.0, USB 2.0, and RJ9 headset jack

● Advanced SDK/ API available for custom application deployment.

a new Addition to the GXv series of high-end smart video ip phones
NatioNal RouNdup 90 SecurityLinkIndia | December 2022 | www.securitylinkindia.com Annual Subscription: 2000/- for 12 Issues * Please subscribe through admin@securitylinkindia.com WE ARE UPDATING OUR DATABASE editor@securitylinkindia.com * Send your detail to admin@securitylinkindia.com For For free listing in Database: “Security Link India” payable at New Delhi dated__________ st Security Link India, H-187/5 (1 Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com Advertisement Contact: (Courier/ Postage charges extra)
Reach us at: editor@securitylinkindia.com

Turn static files into dynamic content formats.

Create a flipbook

Articles inside

City, University of London Modernizes Wireless Campus Infrastructure with Extreme Networks

2min
page 64

Everbridge Selected to Power the Nationwide Public Alert System for Norway

2min
page 63

Old Spaghetti Factory Restaurants Choose Interface to Modernize Physical Security

1min
page 61

Hanwha Protects the Piazza Lucio Dalla

2min
page 62

Genetec Alerts Organizations to Risks of Legacy Access Control Systems

2min
page 50

Hikvision’s Classroom Hub Solution Offers Convergence of Real, Digital and Virtual Classrooms

2min
pages 58-59

Hikvision Introduces the Evolutionary eDVR Series with eSSD Technology

13min
pages 52-57

HID is the Smart Ticket Producer for FIFA World Cup 2022

2min
page 60

eInfochips and Ambarella Announce Strategic Partnership

2min
page 51

Right IoT Security Assessment Helps Keeping Endpoint Devices Safe

3min
page 49

FortiGuard Labs Predicts the Convergence of Advanced Persistent Threat Methods with Cybercrime

7min
pages 46-48

Synology Records 100% Growth in India YoY since 2019

5min
pages 40-42

Matrix Partner Connect, Lucknow

3min
pages 44-45

Hikvision Creates an Ultra-High Definition Experience with all- Encompassing 8K Solution

3min
pages 38-39

ASIS New Delhi Chapter #207 AGM

2min
page 43

Consistent Showcases its Extensive Security Portfolio at IFSEC India 2022

5min
pages 36-37

Roadmap for Indigenisation of UAVs

3min
pages 34-35

Samriddhi Signs MoU with Sahasra Electronics

2min
page 33

NETGEAR Exhibits its Solutions at IFSEC India 2022

2min
page 25

Professional Stealers: Opportunistic Scammers Targeting Users in 111 Countries

8min
pages 22-24

IISSM Annual Global Conclave 2022

6min
pages 30-32

Commvault Witnesses Significant Momentum in India

4min
pages 26-27

Prama Excellence Meet – Bengaluru

3min
pages 28-29

WESS NGO Paid Tribute to Nirbhaya

2min
page 21

CAPSI Security Leadership Summit 2022

4min
pages 18-20

Hikvision India’s Recent Participations in India’s Leading Exhibitions

6min
pages 14-17
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.