15 February 2022

remote work

The visibility challenges to supporting remote work

Emad Fahmy, Systems Engineering Manager, Middle East, at NETSCOUT discusses the visibility challenges to supporting remote work Today’s enterprises continue to adjust IT and security resources in response to changes brought by the pandemic. Enterprises are now faced with the reality that 65% of pandemic-era remote workers want to continue working from home – and 58% say they will look for a new job if their company requires returning to the office. As enterprise security and IT teams continue to grapple with changes in the network necessary to support remote access, they increasingly turn to the edge to do so. Edge computing provides a common abstraction across a range of local and remote IT assets in order to support next generation security and management technology. Moving resources to the edge enables data to be more quickly processed, analysed, filtered and stored, reducing both network latency and operational expense. However, for all of the benefits that edge computing creates for enterprises, it also opens them to new security risks. As enterprises have had to expand services and rely more heavily on the edge, attackers have expanded the threat landscape, as well as the size and scope of their attacks. In the first half of 2021, attackers launched 5.4 million distributed denial of service (DDoS) attacks, an 11% increase from the same period a year earlier. It’s no surprise, then, that security concerns are on the minds of enterprise IT and security teams that are relying upon the edge. The UAE is working hard to build a safe digital economy with highly secure and robust cloud infrastructure and also collaborating with several countries to shore up its digital ecosystem. The biggest concerns are the expanded attack surface and greater exposure to threats like DDoS campaigns, data theft and intrusions into the enterprise network. As more activity is moved to the edge, it’s important for CIOs and CISOs to ensure their teams understand the associated security challenges, while also ensuring that the end-user experience isn’t impacted by the policies and procedures put into place to do so. Impact of Edge on CIOs & CISOs The call for better collaboration, communication and consistency between security and IT teams is not a new one. But explosive growth in cyberattacks since the beginning of the pandemic have added additional pressure. Now more than ever, it’s vital for security and network operations teams to have consistent goals, unified processes and interoperable technologies that protect the network, while also maintaining network uptime and performance for business operations. Doing so reduces costs through shared instrumentation, training, and operational efficiencies. Challenges that must be addressed to protect the edge It’s difficult to get an accurate status of network security because networking and security teams maintain separate tools and reports. Security teams largely view network security through network traffic analysis (NTA) and network detection and response (NDR) tools, while networking teams use various tools to manage devices, traffic flows, and network performance.   To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The visibility challenges to supporting remote work Read More »

BeyondTrust

BeyondTrust remote access fortifies security

BeyondTrust, provider in Privileged Access Management, has announced the release of BeyondTrust Privileged Remote Access 22.1, which empowers IT/OT teams to control, manage and audit remote privileged access by authorised employees, contractors, and vendors — without compromising security. Organisations can enforce least privilege, exert granular control and visibility, and layer on advanced credential security over remote access for employees and third parties. Allowing third-party remote access comes with many potential security risks. Vendors authorised to access the network and applications might not adhere to the organisation’s same level of security protocols. They might use weak or default passwords, or share a single set of credentials among multiple individuals. VPN is another risky practice for extending access to third parties, as they are a target for hackers to compromise the supply chain. To reduce these attack surfaces, BeyondTrust Privileged Remote Access provides greater control over remote vendor access by eliminating “all or nothing” access. All connections are brokered through a single access pathway, with granular, role-based access to specific systems and defined session parameters. “Third-party vendor remote access is often the weakest link in network and information security,” said Daniel DeRosa, Chief Product Officer at BeyondTrust. “We enable organisations to better monitor and manage third-party access for privileged users, without inhibiting business agility.” BeyondTrust Privileged Remote Access 22.1 introduces Dark Mode and other new features to its Credential Vault, including discovery and import of Windows service accounts for management, scheduled discovery, account policies and more. BeyondTrust Privileged Remote Access allows organisations to automate vendor provisioning/de-provisioning, while adding a layer of advanced credential security and fine-grained access management when combined with BeyondTrust’s Privileged Access Management suite. BeyondTrust Privileged Remote Access 22.1 includes the following new features and enhancements: External Endpoint Search – Password Safe Integration — Users can search and remotely access Password Safe Managed RDP and shell systems accessible with a Jumpoint server. Password Safe and Privileged Remote Access — Work together to mitigate credential theft, misuse and unmanaged access from third-party and internal users with unmatched visibility and control over sensitive assets, without hindering productivity. Dark Mode Desktop Access Console — Users who prefer to avoid bright screens and reduce eye strain can select Dark Mode in the desktop console, which uses a darker color palette for screens, views, menus, and controls. Vault Service Account Management — Vault discovers and imports Windows service accounts, enabling administrators with visibility into service accounts in domains managed by Vault, the descriptions and associated account services. Jump Item Association — Administrators can limit the credentials available for injection within a Jump session by associating Vault accounts and account groups with Jump items. Vault Scheduled Discovery — Vault administrators can define a preset day/time to automatically run Vault domain discovery jobs, and have continuous visibility over domain accounts, endpoints, and local accounts. Vault Account Policies — Vault account policies can be assigned to Vault accounts or account groups for additional granularity regarding Vault account settings. Windows 11 Support — Supports Windows 11 systems through a free upgrade for eligible Windows 10 PCs and newer PCs. MacOS Monterey Support — BeyondTrust offers largely the same functionality for Mac as it does for Windows, and fully supports MacOS Monterey systems. Nutanix Support — Base Software 6.1.1+ supports Nutanix hypervisors for virtual appliance deployment. See deployment information for more details on requirements and sizing. BeyondTrust Privileged Remote Access 22.1 is now available.   To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

BeyondTrust remote access fortifies security Read More »

AI

Smart Education Solutions Powered By AI

AI is empowering a new generation of advanced, efficient security systems. In the field of education, AI is also facilitating the digital and intelligent upgrading of schools and institutions from K12 to universities. AI applications such as smart identification, deep learning and intelligent analysis greatly reduce manpower costs, while improving the security level and management efficiency at the same time. AI-enabled innovative teaching methods can help enhance engagement in both remote and in-person classes, and promote a conducive learning environment for students. To give you a better understanding of how can schools benefit from utilising advanced technologies like AI, here’s a list of some of its campus applications: Prevent unauthorised entry into campus Campus entrances and exits are areas vulnerable to external threats. A robust entrance and exit access control system is imperative in building the school’s first major line of defense. For example, installing an AI-enabled access control system can effectively prevent unauthorised entry into the campus, library, teaching buildings, dormitories and other school premises. Aside from that, the latest data management technology can be used to meet the daily needs of schools and students (like attendance, visitors, vehicles). Likewise, perimeter protection, the technology behind tripwire and line crossing function, plays a vital role in preventing invasions in surrounding areas or unauthorised access to regulated places. When unauthorised personnel and vehicles are detected, the system will send a real-time alarm to notify the control room, which can help reduce security risks in the campus. Machine learning helps reduce false alarms by filtering out irrelevant objects like leaves, branches and even animals. Detect violent actions in real time Globally, school violence and bullying remain a serious problem. A report by UNESCO and the Institute of School Violence Prevention at Ewha Womans University (Seoul, South Korea) indicated that an estimated 246 million (20%) children and adolescents were subjected to some form of school violence each year. One of the recommended priority actions is to establish reporting systems and improve the collection of data and evidence. For campus safety, today’s comprehensive security systems have already integrated emergency management features. With the help of an AI sensor, 3D cameras with stereo analysis capabilities can identify fights, falls and other possible violent behaviors through deep learning. With real-time alarm in place, the school’s security personnel can be informed in time about possible emergencies such as violence and falls, allowing them to intervene or respond accordingly. A one-button alarm system is also suggested in the campus premises to provide students with the fastest way to ask for help in case of emergencies. Improve teaching performance and learning outcomes Normalcy and resource imbalance during the pandemic have prompted developing countries to accelerate the digital transformation of education. With the unprecedented offline-to-online transition of many classrooms, modern electronic whiteboards and blackboards have emerged. The Dahua DeepHub Smart Interactive Whiteboard, for instance, provides an array of features including multifunctional writing, wireless projection, conference content sharing, etc., making it an ideal choice for classrooms and meeting rooms where demonstration, information sharing and document management are needed. Alternatively, an all-in-one smart blackboard with highly integrated design is also a good option. It combines traditional blackboard writing with touchscreen technology, promoting collaborative human-computer interaction in the classroom.   To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Smart Education Solutions Powered By AI Read More »

SICUR

SICUR CYBER at SICUR: Cybersecurity challenges

SICUR, an international event for the integrated security industry, is organised by IFEMA, takes place from 22-25 February at Feria de Madrid. Like previous editions, it will be a reference point for trade visitors in all security fields. Its varied content will focus on the accelerating digitalisation process in both professional and social. The SICUR CYBER space at SICUR 2022 will focus on cybersecurity, the threats companies and individuals face, and the solutions and protection systems to address them. SICUR CYBER has organised a busy programme of panel discussions and presentations in collaboration with the specialised publications, Seguritecnia and Red Seguridad. Experts will participate over the four days of SICUR to address various topics related to cybersecurity in the field of corporate security or electronic security technologies, among others. The programme is sponsored by AXIS Communications, Dorlet, and RKL Integral. It will kick off on Wednesday, 22nd February, under the general heading Cybersecure Security. This block will begin with a presentation entitled It’s Time We Addressed Cybersecurity By and For Security Professionals by the Borredá Foundation. This will be followed by a Cybersecure Access Control system by the company DORLET, to continue with the panel dedicated to “Cybersecurity in the digitalisation of private security”, which will include presentations by the Central Private Security Unit of the National Police, the Spanish Association of Security Engineers, AEINSE, Spanish Association of Security Companies (AES), the Catalan Association of Security Companies(ACAES), and Spanish Security & Crisis Alliance (AESYC). There will be a session by INCIBE on Business Protection. Seguritecnia and Red Seguridad will chair the Spanish Cybersecurity Ecosystem session. The National Police will explain What To Do When You’ve Been Cyber-attacked, and Civil Guard will talk about Investigating Cybercrime on the Net. The morning of Thursday, 23 February will focus on Good Cybersecurity Practices with the presentation of the Guide of Good Practices in Physical Security Projects by members of AEINSE’s working group. It will cover issues such as The Importance of Cyber-secure Surveillance in the presentation by AXIS Communications. Agents Involved In Cybersecurity of Physical Security Systems with representatives of AEINSE, the Spanish Association of Integral Security Managers, ADSI, AES, AENA, ESYS Foundation, and Industrial Cybersecurity Center, CCI. And a presentation on Cybercrime by the Analysis Section of the Cybersecurity Service of the Ministry of the Interior’s OCC. Thursday afternoon will be devoted to European Funding for Security with a presentation on the European 2022 programme, Cluster 3: Civil Security for Society. Another topic addressed will be Cybersecurity: Surveillance & Access Control by the Spanish Data Protection Agency. And there will be a presentation on Cybersecurity & Mobile Phones. The block on the 24th, in the morning session, will revolve around the Process Automation. An expert lawyer will give a presentation about the Regulatory Itinerary in Cybersecurity. RKL Integral will talk about the Automation of Comprehensive Security Processes In Critical Infrastructure. The session on Corporate Security & Cybersecurity will be with the participation of AESYC, the Observatory of Comprehensive Security in Hospitals, OSICH, and the Business Confederation of Users of Security & Services, CEUSS. SICUR CYBER will close on Friday, with a session on Training and Cyber Talent to discuss Cybersecurity Culture For Businesses (DSN) in a presentation by the National Security Department. And there will be a talk on Training Initiatives and Talent In Cybersecurity with the participation of WOMEN4CYBER, CIBERWALL and CIBERLEAGUE.   To read more exclusive features and latest news please see our February issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

SICUR CYBER at SICUR: Cybersecurity challenges Read More »

AI

Smart education solutions powered by AI

AI is empowering a new generation of advanced, efficient security systems. In the field of education, AI is also facilitating the digital and intelligent upgrading of schools and institutions from K12 to universities. AI applications such as smart identification, deep learning and intelligent analysis greatly reduce manpower costs, while improving the security level and management efficiency at the same time. AI-enabled innovative teaching methods can help enhance engagement in both remote and in-person classes, and promote a conducive learning environment for students. To give you a better understanding of how can schools benefit from utilising advanced technologies like AI, here’s a list of some of its campus applications: Prevent unauthorised entry into campus Campus entrances and exits are areas vulnerable to external threats. A robust entrance and exit access control system is imperative in building the school’s first major line of defense. For example, installing an AI-enabled access control system can effectively prevent unauthorised entry into the campus, library, teaching buildings, dormitories and other school premises. Aside from that, the latest data management technology can be used to meet the daily needs of schools and students (like attendance, visitors, vehicles). Likewise, perimeter protection, the technology behind tripwire and line crossing function, plays a vital role in preventing invasions in surrounding areas or unauthorised access to regulated places. When unauthorised personnel and vehicles are detected, the system will send a real-time alarm to notify the control room, which can help reduce security risks in the campus. Machine learning helps reduce false alarms by filtering out irrelevant objects like leaves, branches and even animals. Detect violent actions in real time Globally, school violence and bullying remain a serious problem. A report by UNESCO and the Institute of School Violence Prevention at Ewha Womans University (Seoul, South Korea) indicated that an estimated 246 million (20%) children and adolescents were subjected to some form of school violence each year. One of the recommended priority actions is to establish reporting systems and improve the collection of data and evidence. For campus safety, today’s comprehensive security systems have already integrated emergency management features. With the help of an AI sensor, 3D cameras with stereo analysis capabilities can identify fights, falls and other possible violent behaviors through deep learning. With real-time alarm in place, the school’s security personnel can be informed in time about possible emergencies such as violence and falls, allowing them to intervene or respond accordingly. A one-button alarm system is also suggested in the campus premises to provide students with the fastest way to ask for help in case of emergencies. Improve teaching performance and learning outcomes Normalcy and resource imbalance during the pandemic have prompted developing countries to accelerate the digital transformation of education. With the unprecedented offline-to-online transition of many classrooms, modern electronic whiteboards and blackboards have emerged. The Dahua DeepHub Smart Interactive Whiteboard, for instance, provides an array of features including multifunctional writing, wireless projection, conference content sharing, etc., making it an ideal choice for classrooms and meeting rooms where demonstration, information sharing and document management are needed. Alternatively, an all-in-one smart blackboard with highly integrated design is also a good option. It combines traditional blackboard writing with touchscreen technology, promoting collaborative human-computer interaction in the classroom.   To read more exclusive features and latest news please see our February issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Smart education solutions powered by AI Read More »

Scroll to Top