20 January 2016

ASSA ABLOY security doors delivered in prime condition

ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, the global leader in door opening solutions, go the extra mile to ensure that their deliveries arrive in prime condition, just as they left the factory. Pallet caps are included on the top of all ASSA ABLOY Security Doors’ deliveries to safeguard the steel doors, so that they do not become damaged during transportation.

ASSA ABLOY security doors delivered in prime condition Read More »

GJD is exhibiting at Security Twenty 16, Midlands

GJD is exhibiting at Security Twenty 16, Midlands GJD, a leading British manufacturer of professional external detector equipment and LED illuminators, will again be proudly exhibiting at the Security Twenty 16 (ST16) conference and exhibition. Taking place at the East Midlands Conference Centre in Nottingham on Thursday 4th February 2016, GJD at stand 29 will be showcasing its full range of innovative security solutions. Security Twenty 16 is positioned to help professionals who specify security products, end users and purchasers. Visitors will learn about the latest developments in the security sector and see interactive product demonstrations. GJD will display its newly released Clarius Plus range of Infra-Red and White-Light LED illuminators, which allows users to quickly and easily alter the angle of illumination to deliver angles of 10, 30, 60, 80 and 120 degrees. The flexible design of Clarius Plus allows the user to accurately match the angle of illumination with the camera’s field of view, making it suitable for both wide and narrow applications. Ana Maria Sagra-Smith, GJD’s Sales and Marketing Director commented: “ST16 expos are always well attended and we are looking forward to presenting our latest innovations”. As well as the Clarius Plus, visitors to the GJD stand will also see the company’s D-TECT IP range of motion detectors. A major benefit of the D-TECT IP is that it provides real-time remote access, to enable monitoring and programming from anywhere in the world and at any time. The D-TECT IP works in conjunction with a bespoke web based interface affording intuitive and quick online access, giving users the ability to alter detector settings remotely via the interface. Some of the adjustable settings include the ability to alter the LUX level trigger, sensitivity and detection range as well as setting activation for specific times. Live product demonstrations will allow visitors to see for themselves the fantastic benefits of GJD’s complete security range. For more information about GJD and its products, please email info@gjd.co.uk or call +44 (0) 1706 363 998. [su_button url=”http://www.gjd.co.uk/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more on GJD click here[/su_button]

GJD is exhibiting at Security Twenty 16, Midlands Read More »

F5 releases 2016 ‘State of Application Delivery’ results

F5 releases 2016 State of Application Delivery results Second annual report outlines how the world’s top companies manage application delivery. F5 Networks (NASDAQ: FFIV), released the results of its second annual State of Application Delivery customer survey. Expanded to include feedback from more than 3,000 customers worldwide, including 980 in EMEA, this year’s report details how they are delivering applications successfully, how they keep data and users secure, and how hybrid cloud, software-defined networking (SDN), and DevOps are changing IT. In addition, F5 executives will host a series of live panel sessions and a webinar that will offer attendees deeper insights into the data. The first live panel session is on January 28, 2016, and will be hosted by F5’s CTO and EVP of product development, Karl Triebes. Sign up for the panels and webinar, and download the full report at: www.F5.com. Survey highlights This year’s report goes bigger and broader with input from F5 customers in the Americas (AMER); Europe, the Middle East, and Africa (EMEA); and Asia-Pacific (APAC) regions. A variety of industries are represented, with the widest participation from customers in finance, technology, telecom companies, and government entities. Key takeaways include: Application services are essential and pervasive: 44 percent of EMEA businesses use over 200 application services across the company every day. The figure is surely set to grow as 42 percent of respondents listed mobile applications as a focus for IT spend in 2016. It is becoming clear that slow, unresponsive, and unsecured applications can have a substantial negative impact on revenue and operations. Hybrid cloud is becoming the new normal: The report found that 30 percent of EMEA organisations have a ‘cloud-first’ strategy – where cloud-based IT solutions are evaluated before making any new IT investments. Additionally, 67 percent of businesses estimate up to 50 percent of applications will be hosted in the cloud by the end of 2016. A hybrid cloud environment allows organisations, particularly small and mid-sized, to leverage flexibility and potential cost savings. Security focus is on protecting users, data, and applications: Security professionals who have the highest level of confidence in their ability to ward off attacks are protecting clients, requests, and responses—the critical points at which data can be easily compromised. Network firewalls (84 percent) and anti-virus technology (85 percent) are the two most deployed security application services for EMEA firms. But more challenges lie ahead: 22 percent said the lack of employee understanding provides the biggest security challenge in the next 12 months DevOps and SDN are key to improving operational efficiency: Because DevOps and SDN enable automation and orchestration, they are both seen as key factors for reducing operating costs and improving time to market. “Applications are vital to business success. Used by every employee, applications contribute to greater efficiency, lower costs, and increased margins,” said Karl Triebes, CTO and EVP of product development at F5. “Without the correct services to support applications, they won’t be available, secure, or fast enough to meet companies’ needs. The results of this year’s State of Application Delivery survey offer valuable insights into how customers are managing and implementing their application services within dynamic and complex IT environments.” [su_button url=”https://f5.com” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on F5 click here[/su_button]

F5 releases 2016 ‘State of Application Delivery’ results Read More »

The next generation of cyber security threats

The next generation of cyber security threats Luke Brown, GM and VP, EMEA, India and LATAM at Digital Guardian I am sure most of us in the cyber security community were happy to flip the calendar to 2016 for obvious reasons! Given what we witnessed in 2015, while cloud, mobile and IoT will continue to dominate the discussion in many boardrooms, it is actually security that should be close to the top of the priority list for any CIO. To that end, it is worth understanding some of the factors that will shape the cyber security threat landscape. 1. An increase in wiper attacks Wiper attacks, which erase files from the victim’s computer drives in order to cripple essential apps, have been growing steadily for years. A wiper attack will not only damage the users IT systems, but can leave sensitive data exposed. Sony have been the most prolific organisation to suffer this kind of attack to date, however as these kinds of hacks become easier, businesses of all sizes must be prepared to protect against them. Investing in security is essential for any modern business, however it will only be effective if they invest in the right areas. Focusing on endpoint protection, disaster recovery and backup applications that can be easily scaled will significantly reduce the chance of wiper attacks causing lasting harm. 2. Hacktivism will be the motive behind many more incidents High profile data breaches such as the TalkTalk, Ashley Madison and Experian hacks have been extremely damaging for the companies involved and brought cyber security to the forefront of every business-owner’s mind. Many of these attacks have been blamed on a rise in ‘hacktivism’. Self-proclaimed ‘hacktivists’ will attack companies for a variety of reasons, the most common of these being: Ethics: To place the spotlight on and expose a company engaging in morally questionable practices Opposing values: As a result of fundamental differences in the values held by the attacking group and the organisation being hacked Monetary gain: To extort victims for monetary gain in an effort to cripple the target organisation and fund the hacktivist’s causes Part of the reason these attacks are becoming more widespread is the fact that they are far easier to carry out than they were just a couple of years ago. With hacking tools readily available to those who know where to look, the resources required to stage a high-profile attack are dangerously easy to find and implement. The rise of nationalism in countries like Russia, Iraq and Syria is also likely to have an effect. Nationalist and terrorist groups will use these publicly available tools to make public statements and intimidate corporations with conflicting values – attacking freedom of speech, the film industry and the literary community. As information becomes more valuable with every passing year, there is a lot at stake not just for the information security industry, but for the world as a whole. This is why companies must do everything they can to research and implement a data protection solution that is designed to combat these new attacks. 3. Social engineering attacks will rise in the wake of 2015 breaches Hundreds of thousands of customer details were leaked as a result of the 2015 data breaches. This data is most valuable to hackers before the leak is discovered and made public, when it becomes much harder to sell off or act without attracting attention. However, even after the breach is discovered, this information is still out there, still accessible, and is often used in a second wave of attacks to target the victims themselves many months later. Hackers will often bombard breached email addresses with phishing attacks in an attempt to gain access to more of their personal details. By impersonating banks, retail companies and government agencies, the attacker will try to trick users into sending them money or personal information. These imitations are becoming more convincing, with hackers explaining to users that they are vulnerable to an attack and must change their details immediately by handing them over in some way. If enough information is still available, hackers could also attempt to access the email accounts themselves using other details that have been leaked such as dates of birth. In some cases, malicious users could even try to access the victim’s bank accounts directly using leaked account details. There is a new wave of organised crime happening online worth billions of dirhams, and it’s growing exponentially. 4. Additional cyber threats will continue to be discovered in the Internet of Things The Internet of Things (IoT) is developing at an unprecedented pace. With an incredibly broad spectrum of uses across a plethora of sectors, a ‘smart world’ is not simply the stuff of science fiction. These IoT devices are populating every aspect of our lives and it’s important to understand that this leaves people vulnerable in ways that haven’t been a problem before. Smart homes, for example, offer convenient solutions for busy residents looking to save time and money, but smart tech companies must ensure it is not to the detriment of the user’s security. Devices such as smart electricity meters or thermostats could moderate power consumption and room temperatures based on when the residents are out. However if criminals were to access the network that these devices communicate through, this data could be used to plan a break-in. There are three main entry points when it comes to IoT devices. Firstly, attackers can hack the service provider, gaining database information that gives them access to data such as smart meter readings. Secondly, it is possible to break in through the wireless protocols between the devices, which are inherently insecure due to the low quality routers often supplied with home Wi-Fi packages. The vulnerable ISP boxes are reverse engineered for security, and give easy access to the consumer’s network. Finally, hackers could directly infiltrate the infrastructure. This however is far more difficult that the other two methods and so is unlikely to occur as frequently.

The next generation of cyber security threats Read More »

Scroll to Top