12 June 2015

Seagate at IFSEC 2015

Seagate is one of the exhibitors at IFSEC 2015 International taking place at London ExCeL between 16-18 June. IFSEC brings together the latest products and exclusive demonstrations of cutting-edge technology in the security space. Seagate will feature the Surveillance HDD – a high quality and reliable surveillance drive that enhances data integrity, reduces the cost of servicing, and improves overall lifetime in the field. Unlike other drives, surveillance drives like this one are built to record or write data the majority of the time (90%), playing it back or reading the data only as needed (10%). Working closely with our key strategic partners Hikvision and Dahua, Seagate is finding this is the ideal balance that can dramatically improve a system’s overall ROI by optimising video content recording and playback to quickly process data and provide faster performance. Seagate would love it if you could join us at the show to meet with executives and product experts and hear more about: • How the video surveillance landscape is evolving and why half of the world’s data is generated through video surveillance • Key insights from a survey of 1,100 systems integrators and IT executives on video surveillance trends and forecasts for the future • The importance of storage and using the right drive for optimal workload efficiency • How Surveillance HDD with Seagate Rescue enable Channel Partners to offer disaster recovery solutions helping them to increase service revenue, and deliver peace of mind to their Clients By visiting the Seagate stand, you could also be entered in a prize draw to win an Apple iWatch. The winning ticket will be drawn on Thursday, 18th June. And, later this year, Seagate is offering the amazing opportunity to win a Citroen Berlingo van (or cash equivalent) – for further details visit: www.SeagateSurveillance.com When: Tuesday 16th Where: London ExCeL F1210 – Hall S6 Seagate executives available: Seagate will have a number of senior executives on hand to discuss any questions Larry Lummis, Product Managements, Adam Ciernicki, Senior Marketing Analyst at Seagate Technology

Seagate at IFSEC 2015 Read More »

MxAnalytics – Now Available In All MOBOTIX Single Lens Models

Free of Charge Software Update for integrated Object Counting and Heat Map Analysis The new MOBOTIX Analytics is now available for all single lens cameras. It allows counting of people moving through corridors in different directions and additionally can generate heat maps to indicate the area of highest activities of movements. This statistical data can be automatically sent by the camera itself via daily or weekly email and is an excellent tool to measure the behavior of people, for example in a retail shop. This software (MX-V4.3.2.68) is free of charge and available for all single lens models, especially for the price attractive indoor camera models (i25, c25, p25). For the total system cost of 398 Euro the user gets a complete hemispheric 5MP camera system, including analysis software, the recording software to manage terabytes of NAS storage and all other MOBOTIX camera features like activity sensor and automatic event messaging and recording. MOBOTIX is also providing tips how to achieve optimal results with MxAnalytics. This can be found in the document “Compact Guide: MxAnalytics“ on the MOBOTIX website under Support/Mx-Media-Library/Compact Guides. All MOBOTIX cameras are based on the decentralized concept. All recordings are stored on an internal micro SD card, or externally on a USB device or via the IP network on NAS hard drives. MOBOTIX camera networks support up to 10 times more cameras per server when compared to the central VMS-based recording used by competitors. Also, no additional computers or software are required for recording.

MxAnalytics – Now Available In All MOBOTIX Single Lens Models Read More »

Swisscom select Touchless Biometric Systems

Swisscom’s newest data centre is the crown jewel among the 24 centres operated across Switzerland and provides the highest standards in terms of performance, availability and security for their customers. Completed at the end of 2014, it is the largest data center of Swisscom and one of the few data centers in Europe certified for maximum availability and top ratings for energy efficiency. Requiring the highest security systems available in today’s market Swisscom chose TBS’ 3D-Touchless Terminals integrating with a full Access Control System from Securiton. All systems, including IP Video Surveillance, are monitored from the building’s Control Room. The main entry to the building consists of RFID badge scanners followed by full metal detection units as used at customs control. TBS 3D-Terminals are the final step to access the most secure areas within the Swisscom building. TBS 3D-Touchless Fingerscan provides Swisscom with a unique Swiss made technology proven in countless installations worldwide. The 3D-Touchless reader is the only touchless biometric technology using 3 cameras for the finger scanning process. This ensures No Failure-To-Enroll, avoids sensor damage and is most hygienic. TBS’ BioAdmin Management Software was integrated into Securiton’s Access Control system ‘SecuriGate’ enabling integration as a biometric subsystem via web services. With this innovative approach, responsibilities between biometrics and the overall security system remain cleary separated. Acording to Swisscom’s project leader Rudolph Anken, Swisscom is highly satisfied with the new solution. Switzerland is famous for its unmatched stability and security making it a paragon worldwide. It is TBS’ mission to bring Swiss security standards to the world. TBS offers biometric devices made in Switzerland and complete solutions for a large variety of biometric applications in access control and time & attendance. TBS 3D-Touchless finger scanning technology is worldwide unique. The three-dimensional and contact-free sensor technology captures the highest possible quantity of fingerprint details, guaranteeing significantly higher security than any other biometric system. Contact-free solutions qualify in particular for higher risk, large user groups or hygienically sensitive applications. Touchless Biometric Systems has built a strong presence and reference base worldwide.

Swisscom select Touchless Biometric Systems Read More »

SanDisk corporation expands into the external storage market with world’s highest- performing portable SSD

SanDisk Corporation (NASDAQ: SNDK) has entered the portable SSD market with a family of high-performance drives, including the SanDisk Extreme® 900 Portable SSDs, the world’s fastest line of Type C-based portable SSDs; and the SanDisk Extreme 500 Portable SSDs, the company’s new pocket-sized, rugged drives. The SanDisk Extreme 900 drives feature speeds of up to nine times faster than a portable hard drive1, while the SanDisk Extreme 500 drives offer speeds up to four times faster1. These powerful solutions are ideal for photographers, videographers, creative professionals and tech enthusiasts looking to move massive files at phenomenal speeds, helping them save time and simplify work processes at the office or out in the field. “As a recognized leader in developing solutions for professional photographers and videographers, we designed this game-changing family of offerings to provide our customers with even greater speeds and capacities to keep up with rapidly increasing demands for high-quality content,” said Dinesh Bahal, vice president, product marketing, SanDisk. “Whether a professional or amateur, this level of portability, speed and capacity is exceptional, and we believe it will transform the way people create and produce high quality video content—ultimately saving them time and money.” World’s highest-performing, next-generation portable SSDs The SanDisk Extreme 900 Portable SSDs are all about performance and capacity. Available in up to 1.92TB*, the new drives features transfer speeds nine times faster than a portable hard drive1, giving users a significant advantage when they are working with 4K video, taking detailed high-res photos or creating large graphics files. With its compact, durable aluminum case, professionals can take the SanDisk Extreme 900 Portable SSD with them wherever they go, allowing them to carry a massive digital portfolio they can access and share in just seconds. With superfast speeds of up to 850MB/s**, the SanDisk Extreme 900 Portable SSD dramatically reduces wait times, instantly accelerating user work flow regardless of file size. These new drives come with both USB Type-C and Type-A cables to provide the ultimate flexibility when working between systems. Pocket-sized, yet powerful The SanDisk Extreme 500 Portable SSD is less than half the size of your smartphone and delivers more than four times the speed of a portable hard drive1. The new pocket-sized drive allows users to transfer big videos and photo libraries at up to 415MB/s**. Available in up to 480GB* capacity, this light-weight yet durable drive is a high-performance solution suitable for anyone looking for a fast, reliable storage on the go. Designed for ultimate portability and durability, the SanDisk Extreme 500 Portable SSDs feature a sleek black finish with unique rubber bumpers, and a metal ring that easily clips into a bag. “We are now shooting with as many as twelve 4K cameras at once, so on set I need the most reliable and cutting-edge technology available to access, share and transfer enormous files. Every minute counts when we are on location, so with these new, extraordinarily fast, portable SSDs from SanDisk, I can spend less time waiting on file transfer, and more time on creativity,” said Sam Nicholson, CEO of Stargate Studios and member of the American Society of Cinematographers. Professional photographers and videographers around the world turn to SanDisk to provide state-of-the art products. These new portable SSDs are built to sustain the most rugged environments, featuring both temperature and impact-resistant materials2, ideal for many work environments. The new family of SanDisk Extreme Portable SSDs also feature SanDisk SecureAccess™ software with 128-bit encryption to secure files3. Links www.sandisk.com

SanDisk corporation expands into the external storage market with world’s highest- performing portable SSD Read More »

Attackers are bypassing perimeter detection methods

More organisations are operating under the assumption that their network has already been compromised, or will be, according to a survey conducted by the SANS Institute on the behalf of Guidance Software. Fifty-six percent of those surveyed assume that they have been breached or will be soon compared with 47 percent last year. However, organisations are not taking a proactive approach to detecting threats or achieving greater visibility into their networks. SANS surveyed 1,827 IT professionals in the United States for the 2nd annual SANS Endpoint Security Survey, to explore how IT professionals monitor, assess, protect and investigate their endpoints, including servers. A majority of respondents were security analysts (33 percent), followed by security managers or chief information security officers (16 percent), and IT managers or CIOs (13 percent). The survey results underscore that despite the increased assumption of compromise, visibility into endpoints remains an issue. Highlighting the need for detection at the endpoint, this year, 55 percent of respondents say that up to 30 percent of their incidents should have been detected by perimeter security measures but weren’t. Furthermore, organizations admit that stealthy attacks are not the ones bypassing their defenses—39 percent reported that less than 10 percent of their adversaries were advanced or used stealth advanced exploit and hiding techniques. “Relying solely on perimeter detection is insufficient to detect and root out threats. In fact, it appears that the lack of visibility into threats is increasing as organizations become overly dependent on perimeter defenses,” said Jake Williams, Instructor and Course Author at the SANS Institute. “Furthermore, many organizations are not proactively hunting for threats on their networks, which is a risky approach since they are not working under the assumption of compromise. Instead, many are simply waiting for alerts from defenses attackers have long since bypassed.” Other key findings from the survey include: • Prevention—Thirty-four percent did not know what percentage of threats are detected through proactive discovery. This a double-fold increase from last year’s survey. Additionally, 25 percent indicated that they do not know what threats should have been blocked by firewalls, routers and other edge detection solutions. • Detection—Fifty-five percent of respondents say 30 percent of incidents should have been detected by perimeter security measures but weren’t, and almost a quarter of respondents were notified of a compromise by a third party. • Automation—For a majority of participants, false positive rates are unacceptably high, with 52 percent of organizations suffering false positive rates in excess of 20 percent. Automation levels continue to lag behind what respondents want. Respondents’ projections of achieving automation in 24 months remained relatively stable compared to last year. • Response—A majority (83 percent) need results from endpoint queries in an hour or less and 28 percent want that data in five minutes or less. The ability to quickly conduct investigations is a top priority. • Remediation—Wipe and reimage remains the most popular technique for remediating compromised endpoints according to 79 percent of respondents. Top Challenges to Incident Recovery: In addition to learning about respondents’ opinions about outsourcing or insourcing security response actions, the survey also measured the top five challenges to incident recovery. They were: Assessing the impact Determining the scope of a threat across multiple endpoints Determining when the incident is fully remediated Hunting for compromised endpoints Determining what company confidential and/or regulated data was at risk because of compromised endpoints “Cybercriminals are constantly looking for new ways to bypass security measures and no organization is immune from attack,” said Ken Basore, CIO for Guidance Software. “Organisations must embrace an aggressive approach – constantly searching for threats inside their network. In order to be vigilant, organisations must gain visibility into endpoints to determine what sensitive data is stored on them and be able to create a sustainable model of protection.”

Attackers are bypassing perimeter detection methods Read More »

A third of us admit to ‘password rage’ according to Centrify poll

A third (33 per cent) of us admit to suffering from ‘password rage’ with many of us driven to crying, screaming and swearing. This is according to a snapshot poll taken by Centrify, a leader in unifying identity management, at Infosec Europe 2015 in London this week attended by IT security professionals. The findings reveal that users are becoming increasingly frustrated with trying to remember different passwords to access online accounts with a quarter (25 per cent) saying they forget their password at least once a day – and 5 per cent admitting they forget all the time! Only 22 per cent of those who took part in the poll claim they never forget their passwords. The rest of the office is also likely to suffer from our password frustrations, with one in six admitting they scream or shout in the office if they cannot remember their password, and one in seven moaning at work colleagues. People also admit to crying, running off and slamming the door, swearing and even banging their head on the desk. Despite all of this, just 2 per cent say they disappear off to the pub! “We’ve all heard of road rage and air rage, but now there’s a new one on the block – password rage,” explains Barry Scott, CTO EMEA at Centrify. “As if we don’t have enough frustrations in our lives, passwords are an added irritant, but also an essential part of what we need in order to access online accounts and applications both at work and in our personal lives. “Our frustrations are clear, but the real problems arise when we start to adopt poor password practices because we cannot remember them, like using the same ones again and again, or using easy-to-remember ones like ‘password’!” In a survey conducted by Centrify last year among UK consumers, a quarter claimed they have more than 21 active online profiles, and nearly half (42 per cent) create at least one new online account profile every week – more than 50 a year. In fact, 14 per cent believe they will have 100+ passwords to deal with in the next five years. Respondents in last year’s survey also revealed that forgetting a password is more annoying than misplacing their keys (39 per cent), a mobile phone battery dying (37 per cent) or getting spam email (31 per cent). Only a computer programme crashing, or a computer freezing while sending emails were more annoying. Links www.centrify.com

A third of us admit to ‘password rage’ according to Centrify poll Read More »

ICM XRAY launch their new website.

The wait is finally over! ICM XRAY launch their new website. After days, weeks…. months of hard work, ICM 2.0 is at last here! In a will to always provide you, the people involved with ICM, with the most up to date and interesting content, tools and support, the team has designed and implemented a website that will become your go-to destination for all things x-ray! This shiny new and ergonomic portal allows you to navigate through ICM’s Security expertise and become an expert yourself in no time. By browsing through the platform, you have now access to all the details on the entire portfolio, including generators, scanners, and accessories, as well as updates on the Security field. To better present the star products, the FLATSCAN technology, they have implemented an animated presentation that introduces you to all the advantages of these products in a quick scroll. Finally, thanks to ICM’s support page, you will have access to After-Sales information and marketing materials you need in one place. Just request a login by following this link http://icmxray.com/support/ and they will grant you access to all the support materials you need. In an effort to be available to you anywhere, at anytime, the ICM website is also optimised for mobile and tablet so that you can benefit form its features at all times. Have a look at the new ICM flagship, www.icmxray.com, and tell the team what you think using the contact section or their LinkedIn and Twitter pages.

ICM XRAY launch their new website. Read More »

360 Vision Technology appoints new Business Development Manager

360 Vision Technology welcomes Tony Holloway to the role CCTV design and manufacturing company, 360 Vision Technology, is delighted to welcome Tony Holloway to the role of Business Development Manager. Bringing over 25 years security industry experience to his new role, Tony will be supporting customers across the UK, highlighting the benefits 360 Vision camera technology offers for any size or complexity of installation. “An innovative and robust UK developed and manufactured product range was a key driver in attracting me to the role at 360 Vision,” says Tony. “360 Vision’s approach to installer customer support, long-term parts availability and aftersales care is a strategy other camera manufacturers simply do not match. In particular, I’m looking forward to introducing the high-performance Predator PTZ camera to new applications, and assisting customers to take advantage of its unique feature set, long-term reliability and low cost of ownership.” “We are delighted that Tony has joined 360 Vision,” says Adrian Kirk, 360 Vision’s National Sales Manager. “He will play an important role in continuing to drive innovation, helping us to develop new solutions for key vertical markets. And together with other key appointments, 360 Vision’s broad expertise and commitment to customer service provides a solid platform for the company’s continued growth.”

360 Vision Technology appoints new Business Development Manager Read More »

No encryption backdoors for security agencies, says David Anderson report

Today a new report*, commissioned by Home Secretary Theresa May and carried out by David Anderson QC, ruled that surveillance activities by the police and security services should be maintained and agencies should have the right to gather bulk communications data. The analysis, brought about by the actions of NSA whistleblower Edward Snowden in 2013 and given added impetus by May’s so-called ‘snoopers’ charter’, will provide a basis for the formation of a draft bill due this Autumn. Elements of the report discuss the use of encryption** and Sol Cates, CSO of data security expert Vormetric, has made the following comments: “I’m heartened by today’s news that the independent review of surveillance powers found that the UK’s security agencies should not have backdoors built into encrypted online communications. The report validates the contention that backdoors to encryption can’t be effectively limited to government’s use, but will inevitably be compromised by those with the right skills or connections. That said, it does concede that intelligence agencies’ requests for encryption keys – which enable messages to be read – should be regulated by law. “One essential point to raise here – one that is being little addressed in this debate – is that serious malicious parties will be able to stay safe even if backdoors are added to every commercial solution on the market. The argument about encryption backdoors is nothing new – and has been trundling on since the 1990s. The fact is that encryption algorithms and open source libraries are freely available today throughout the web. It only takes moderate development talent to use these tools to create one-off secure data storage and communications capabilities. “Like it or not, the encryption genie is out of the bottle! From a business perspective, in today’s incredibly risky cybersecurity environment, encryption remains one of the smartest moves a company can make. As we know by now, breaches and theft of data can cause major legal, financial and reputational harm – or even ruin.   * https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2015/06/IPR-Report-Web-Accessible1.pdf ** http://www.computerworlduk.com/news/security/no-encryption-back-doors-for-security-agencies-says-anderson-report-3615398/

No encryption backdoors for security agencies, says David Anderson report Read More »

Synergy 3 achieves ONVIF compliance for IP interoperability

Synergy 3, the latest evolution of Synectics’ field-proven command and control technology, is now conformant with the ONVIF Profile S. This allows compatibility with third party ONVIF Profile S conformant IP devices, such as cameras and encoders, and reflects Synectics’ ongoing commitment to open architecture. ONVIF is committed to the adoption of IP in the security market. The ONVIF specification will ensure interoperability between products regardless of manufacturer. Profile S looks specifically at the common functionalities of IP video systems. Launched in 2014, Synergy 3 is a flexible, open command and control platform that enables alarms and events, security and process control sub-systems, video, and data to be monitored, managed, and recorded from a single unified interface. Achieving compliance allows Synergy 3 to configure, request and control the streaming of data over an IP network from ONVIF devices compatible with Profile S. Synectics customers therefore have greater flexibility to select the right IP devices for their specific requirements. David Aindow, Product and Technology Director at Synectics, said: “Supporting open architecture solutions and common industry standards has always been at the heart of our product development – ONVIF Profile S conformity is therefore very important to us. “This is particularly true of Synergy 3. Its open architecture means that the scope, type and make of video, alarm and data systems monitored are not fixed, which ultimately gives the end user the opportunity and flexibility to specify a wider range of solutions. It’s how the industry should be.” Visitors to IFSEC 2015, taking place on 16th-18th June at ExCel London, will be able to see Synergy 3’s compliance in action by visiting Synectics at the ONVIF booth (D530). Synectics will be demonstrating Synergy 3’s full integration capabilities alongside key product features such as built-in incident collaboration tools, interactive mapping, intuitive workflows and enhanced reporting functionality – all this exploring how Synergy 3 enables end users to achieve heightened levels of situational awareness. Links www.synecticsglobal.com

Synergy 3 achieves ONVIF compliance for IP interoperability Read More »

Scroll to Top