3 December 2015

Identify, model and plug gaps in your PSIM solution

What is situational awareness? Are there high-risk gaps in your management of physical security information? What is the latest technology that you can use to plug gaps in your PSIM solution? This white paper from VMS, the bespoke PSIM experts, presents a model for planning and implementing total situational awareness, an examination of the essential technologies involved in managing and minimising risk in your surveillance solution, and we also offer some quick wins that will enable you to massively reduce your organisation’s exposure to security threats. Click the image below to download the whitepaper.

Identify, model and plug gaps in your PSIM solution Read More »

Three critical steps to protecting patient data

Touchless enterprise application access control unveiled by Certes Networks

Touchless enterprise application access control unveiled by Certes Networks for securing any user on any endpoint CryptoFlow Solutions automate role-based access control to protect enterprise applications on any apple, windows or android device. Certes Networks, a leading innovator in software-defined security solutions to protect enterprise applications, today announced the company’s award-winning CryptoFlow product suite offers automatically enforced role-based access control for users on any Apple, Windows or Android device. Certes’ CryptoFlows are the industry’s first software-defined security solution for safeguarding enterprise applications over any network for any user on any device. They enable “frictionless enterprise” deployments of networked applications to be rolled out without increasing risk. CryptoFlows block the top attack vector used in hacking attacks worldwide, the compromise of low-privilege users that gives hackers unfettered access to move laterally through enterprise IT resources to reach the most sensitive applications. The product suite creates secure virtual overlays called CryptoFlows that protect enterprise applications end to end. CryptoFlow secure overlay can connect authorised users on any device to applications in a data centre, cloud, virtualised environment or distributed and hybrid deployment. The security manager can set access control policies based on previously-defined users’ roles in the enterprise, perfectly aligning security with business objectives. The CryptoFlows automatically enforce consistent policies and access control for authorised users on smartphone, tablets and laptops running iOS, Android, Mac and Windows.  Benefits include: The ability to seamlessly secure applications for users on any network inside or outside the enterprise, including the LAN, WAN, Internet, cloud, WiFi, mobile and other networks. Protection and policies automatically enforced across siloes and require no changes to the network or applications. All control is in the hands of the security manager. Applications safely extended to external parties, including contractors, supply chain members, professional services firms and partner companies. If one of these external users is compromised, hackers are blocked from accessing the most sensitive applications. Touchless endpoint support means users never have to activate a VPN or client or use complex log-ins that waste time and lead users to adopt unauthorised “Shadow IT” applications. Automatic crypto-segmentation that isolates and protects applications when hackers get past the firewall. Certes CryptoFlows are infrastructure agnostic, enforcing security with standalone policy enforcers or as virtualised enforcement points in the Cloud or in enterprise data centres. [su_button url=”http://certesnetworks.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on Certes Networks click here[/su_button]

Touchless enterprise application access control unveiled by Certes Networks Read More »

G4S provides better service with Milestone Open Platform technology

Security service provider, G4S Eesti is reforming the Estonian security market by introducing video as a service (VaaS) to meet the security needs of small and medium-size businesses. Their new service offerings come as a result of a partnership with Milestone Systems. The rapid growth of small and medium-size businesses in Estonia along with an expanding IT infrastructure, means that the business landscape is ripe for new initiatives, in an otherwise traditional security market. The small to medium-size businesses have different security needs and budgets than the large corporations, which prompted G4S to think outside the box. They grasped the opportunity and introduced three new VaaS offerings anchored in traditional alarm and guarding services. “Video as a service is growing far more than the traditional video security offerings, and here as the market leader, we are in the perfect position to fulfill the ever-rising market demands. We have a very high level of technological skills and thanks to the open platform technology from Milestone we are able to meet the needs of any customer,” says Head of Security Systems at G4S Eesti, Priit Orasson. There are three new VaaS initiatives by G4S Eesti which include: video alarm, video patrol and online video surveillance. Video alarm is a service where a traditional alarm system is augmented with G4S hosted video surveillance. As Estonia has large security installations and the population is mostly concentrated in urban areas, video is an important tool for optimizing alarm response, enabling increased situational awareness for the G4S patrolling staff. Video Patrol is a service offering where an operator uses the installed cameras to perform a virtual patrolling service. The patrol occurs at a fixed schedule and covers assets, premises and objects. One example of this service is G4S’ protection of the culturally significant Estonian War of Independence Victory Monument (Vabadussõja võidusammas). This is done discreetly using the video patrol service. Online Video Surveillance is a proactive operator-driven service. Trained operators use the video feeds from multiple cameras to detect suspicious behavior before anything happens or to catch evolving incidents in the very beginning. This not only leads to highly efficient response by G4S staff, but acts as a discouraging factor for individuals with negative intents, as G4S is ensuring that the security cameras are clearly visible and as the video service is loudly announced. A customer using this service is the furniture retail chain Jysk in Tallinn, where the losses have been cut by more than 75% due to this service. As VaaS gets more and more important in a market where every customer is different, the services has to be readily adaptable to the exact needs of the ever-growing flock of customers to the G4S offerings. “We are seeing an influx of SMB customers – 16 cameras or less. This means that it has to be simple and fast for us to deliver the services requested. We are focused on quality and a very high service level and here the Milestone quality, flexibility and ease of use are of utmost importance to us,” says Priit Orasson.

G4S provides better service with Milestone Open Platform technology Read More »

Scroll to Top