4 March 2022

Axis

Axis discusses 5G and video surveillance at Expo 2020

Axis Communications hosted a high-impact technology conference at Dubai’s Expo 2020. In a series of six insightful conferences, the fifth event highlighted the rapid development of 5G, the significant opportunities this transformative technology presents, and how Axis is leading the charge in the video surveillance industry by piloting 5G-powered solutions together with industry leaders, partners and end customers. A panel of experts from Axis and its partners, Singtel, Boldly (Softbank), Ericsson, and Nokia, unpacked the immense opportunities 5G adoption offers enterprises across sectors and governments. For one, this latest generation of wireless technologies empower business leaders and government officials to build safer and smarter organisations and cities through enhanced network capabilities, more robust security, and lower latency. “By 2025, 5G networks are likely to cover one-third of the world’s population. While 3G and 4G LTE have primarily served the private subscriber, 5G will enable decision-makers and leaders to connect IoT devices at greater scale and improve decision-making with real-time data aggregation and analysis,” explained Ettiene van der Watt, Regional Director – Middle East & Africa at Axis. As with Axis’s other technology conferences, van der Watt welcomed guests, with the company’s Director of Business Development (APAC), Marie Helene Mansard, introducing the day’s agenda. Mansard presented the power of 5G to enhance safety and security in smart buildings, smart cities, and urban mobility to manufacturing and the impact of 5G on personal and professional lives. During the conference, Axis’s partners were invited to share their unique use cases for 5G. These success stories included Ericsson and Singtel’s multi-edge computing network, and SoftBank’s self-driving bus. Vishnu Bhan, Senior Director at Singtel, touched on 5G’s one-of-a-kind advantages beyond unprecedented bandwidth speeds, and Ammar Sabbagh, Global Industry and Partnership Manager at Ericsson, spoke to 5G’s far-reaching impact on critical infrastructure, including the oil and gas industry. “By collaborating with ICT companies and having a dialogue with our partners and customers, we’re exploring many different areas to see how 5G can complement our network video solutions. Our open architecture approach to technology development is helping with this journey, enabling easier integration into new and existing systems as 5G adoption rises,” added van der Watt.   To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Axis discusses 5G and video surveillance at Expo 2020 Read More »

BeyondTrust

BeyondTrust password safe expands

BeyondTrust, the global in intelligent identity and access security, has announced the release of BeyondTrust Password Safe 22.1 and BeyondInsight 22.1. BeyondTrust Password Safe capabilities are expanded to support additional service account integrations, enabling security teams to identify and bring all accounts under centralised and automated onboarding and management. Security teams require solutions that secure managed account credentials for various service types and locations, beyond assets. If credentials are not updated in conjunction with managed accounts, services can fail and negatively impact business processes. BeyondTrust has improved the BeyondInsight user experience by enabling admins to install Web Policy Editor (WPE) and integrate AzureAD for endpoint management. Admins can directly edit policy in the BeyondInsight management console for a vastly improved user experience. BeyondTrust Password Safe 22.1 helps security teams cover more assets under management by expanding extensibility to improve their security posture. This includes tighter service account integrations that simplify management for COM+, DCOM, SCOM, Clustering and Win Auto Login. BeyondTrust Password Safe 22.1 and BeyondInsight 22.1 help admins manage the increased complexity of their service account systems by identifying more account types, bringing accounts under centralised management and automating the onboarding and management of new accounts. “Organisations need credential management solutions that flexibly adapt to their heterogeneous technology environments and dynamic business needs,” said Sam Elliott, Vice President of Product Management at BeyondTrust. “BeyondTrust Password Safe and BeyondInsight are now even more extensible, helping them more easily integrate privileged password management into more diverse business-critical systems. Admins are able to accomplish more, with less time and fewer resources.” Password Safe combines privileged password and session management to help admins achieve complete control and accountability over privileged accounts. Discovery capabilities in BeyondInsight leverage a distributed network discovery engine to scan, identify and profile all assets. This categorisation allows automated onboarding, and the ability for access policies to self-adjust, according to environmental changes. Smart Rules intelligently organise assets and accounts to significantly reduce manual effort and improve productivity. A full audit trail for incident response and compliance is included. Password Safe is easy to deploy, use and maintain, while providing robust automation for privileged password management. To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

BeyondTrust password safe expands Read More »

IFPO

SBLive partners with IFPO

Security Buyer Live is excited to announce our new media partnership with the International Foundation for Protection Officers (IFPO).  The International Foundation for Protection Officers is committed to the support and professional development of our members and all security officers, supervisors and managers. Through advocacy, promoting training standards, providing accessible training, education and certification opportunities, we seek to enhance their professional standing as well as increase the perception of the vital services they provide. Security Buyer Live will be the new dedicated online experience for the entire international security sector to source the latest equipment and systems, develop important business relationships and generate new business opportunities. SBLive is perfectly placed to establish itself as the leading and must-attend online event for the security sector, and our partnership with IFPO demonstrates our dedication to best practice and nurturing of mental health in the industry.  Mike Hurst, Main Board Director, The International Foundation for Protection Officers (IFPO) commented on the partnership, “IFPO is a global association with members in almost 70 countries. Security Buyer Live is a great opportunity to reach the wide and international audience that Security Buyer has; I am looking forward to it.” Speaking on the collaboration, Jon Pittock, Publisher, Hand Media International stated, “IFPO is a great addition to Security Buyer Live. IFPO standards for support and professional development, and that is what we want to bring to Security Buyer Live.” You can register for free here.  

SBLive partners with IFPO Read More »

success

Cloud security: A pillar for enterprise success

Majd Sinan, Country Manager, Trend Micro UAE underlines how Cloud security is a critical pillar for enterprise success in the region Organisations across industries are constantly trying to find new avenues of growth and success with the adoption of technological innovations and actionable insights. However, the digital transformation of the past couple of years has made achieving business goals a bit more challenging, as migration to the cloud has accelerated at the enterprise level. Companies had to trust and rely heavily on the capabilities of cloud technology. And, they have successfully adjusted to the evolved landscape of the cloud, where data is stored and transferred from one source to another faster than ever. Just like the capacity of storing and processing massive amounts of data, the possibilities in the cloud are abundant. One of the major advantages in the process of migrating to the cloud is that it has enabled companies to seamlessly transition into the hybrid work model. It has become the new norm of conducting business going forward, which means cloud services are essential and the investment in cloud-related tools and overall reliance is only going to increase in the years to come. It is predicted that global cloud services will go beyond $482 million this year, which is a 54% increase from 2020. While enterprises continue to invest and migrate workloads to the cloud, malicious actors are sure to follow. Threat actors are constantly evolving and are relentlessly looking for new ways to exploit vulnerabilities in every technological trend by creating advanced methods to disrupt cloud operations. As stated in Trend Micro’s Security Predictions for 2022, they will also double-down on modern threats, such as phishing emails and ransomware, which will continue to be a persistent problem throughout 2022. Organisations will have to stay alert of traditional techniques of attack as well as newly discovered methods in the time to come. Protecting sensitive data and resources against cybercriminals is a non-stop process and ensuring that servers and networks are safeguarded will have to be prioritised even higher in the realm of cloud security. When there is a widely adopted technological tool, the target becomes even larger for cybercriminals. For instance, enterprises will continue to use software-as-a-service (SaaS) applications and solutions to save costs and benefit from cloud flexibility and scalability. And the threat actors will leverage this trend to gain control and do damage. Therefore, enterprises need to adopt multi-layered solutions such as XDR, a one-stop shop that strengthens security analysts’ capabilities and streamlines workflows, optimising the SOC teams’ efforts by reducing manual steps. With an increased response time of up to 70%, XDR can detect across email, endpoints, servers, cloud workloads, and networks. Additionally, it identifies and correlates activities to produce high-confidence detection – with the power to search, investigate, analyse, and respond from a single console. The region’s enterprises can stay a step ahead of the emerging threats by proactively adopting the best practices and solutions in cybersecurity. This will help organisations safeguard operations against system breaches, improve workflows, ensure better disaster management & recovery, and help comply with data protection standards. Enterprises adopting industry-leading security solutions will be able to utilise cloud capabilities as a stepping stone to fulfilling their digital ambitions and aim towards a more prosperous future.   To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Cloud security: A pillar for enterprise success Read More »

Genetec

Product spotlight – Genetec

Security Center 5.10.3 is now available! The minor release of our unified security platform includes features to optimise operators’ situational awareness and enhance cybersecurity across your systems  Keep yourself situated with the new mini-map  Having a bird’s eye view of your facility improves coordination and situational awareness, but large-scale site maps quickly become unwieldy. Scanning across large campuses or entire cities makes it difficult for operators to see what’s going on locally without losing sight of the entire facility.  The new mini-map gives operators a quick way to navigate image-based maps and center themselves on areas of interest without lengthy scrolling. Image maps now show a mini-map in overlay with a highlighted section to indicate where the user is currently zoomed in.  Work seamlessly across time zones  Using a single system for sites located across the globe can be a headache to configure when trying to account for devices in different time zones. With Security Center 5.10.3, you can configure global schedules that take into consideration the local time of source entities for event-to-actions.  For example, a single workweek schedule – Monday to Friday, 9 am-5 pm – will be used on an event-to-action setup and will appropriately react for entities, such as doors, within their local time zones  This added option helps avoid human error and lets you easily configure rules across sites more intuitively, without having to consider time differences between each location.  Get the latest cybersecurity enhancements  Continuing with the improvements brought in with Security Center 5.10.2, we extend cybersecurity within your systems by encrypting custom fields at rest in the database to comply with General Data Protection Regulation (GDPR) requirements. As custom fields often include personally identifiable information, it is essential that unauthorized users, for example, database administrators, don’t get visibility and can’t access these details.  This new feature allows you to include mission-critical information without compromising your employees’ privacy by only retrieving the custom fields data in front of approved users, when necessary.  Integrate your BEST Wi-Q locks  This new release supports the widely deployed BEST Wi-Q Gateways and wireless locks through the Mercury LP4502 controllers. They will be available with the Softwire 11.3 release coming soon. You can keep your system unified by receiving “access granted” and “denied” events to one single user interface.  How to upgrade to Security Center 5.10.3  Security Center minor releases are frequent updates available to all users of a major version. If your system is already using version 5.10, you can upgrade to 5.10.3 and gain access to the new capabilities today! If your system is on a previous major version, like Security Center 5.9, you can upgrade to Security Center 5.10.3 with an active Genetec Advantage Plan.    To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Product spotlight – Genetec Read More »

Vectra AI

Vectra AI announces free cybersecurity services

Vectra AI, a provider in AI-driven threat detection and response for hybrid and multi-cloud enterprises, responded to the expanding Ukraine-Russia conflict by offering a slate of free cybersecurity tools and services to organisations who believe they may be targeted as a result of this conflict. Bank websites and ATMs, as well as military computer networks, have been disabled in recent days by cyberattacks, and disinformation campaigns meant to provoke panic have rippled across cellular networks. “Escalating cyber conflict will lead to unanticipated consequences,” said Hitesh Sheth, President and CEO, Vectra AI. “No public or private organisation is assured of remaining a mere spectator.” The company is actively tracking new attack indicators associated with the conflict in Ukraine and Russia, as well as other conflicts around the world. For immediate assistance in the current emergency, Vectra AI will offer the following services on a complimentary basis: Scan Microsoft Azure AD and M365 environments for signs of attack activities Monitor AWS infrastructure for signs of active attacks, in addition to the provision of detection and response tools for both the network and control plane of AWS accounts Surveil network infrastructure both in the cloud and on-premises for signs of attack, including deployment of Vectra sensors that are purpose-built to detect malicious behavior Support the retention of historical metadata to aid incident response investigations based on indicators of compromise (IOCs) for specific attack variants Attacks previously attributed to Russian actors are known to disrupt the Microsoft Enterprise Cloud and gain access to critical information. With the acquisition of Siriux, Vectra AI is uniquely equipped to immediately discover malicious Microsoft Azure Active Directory activity that could lead to the compromise of Exchange Online mailboxes. Vectra AI also will provide a free Siriux scan to organisations that believe they could be targeted. “As the conflict escalates and cyber risks mount, Vectra AI wants to be part of the solution,” said Sheth. “We believe that together we can significantly reduce the risks associated with nation-state cyber-attacks. By offering our products and services without charge during this crisis, we hope we can help more organisations protect themselves.” To read more exclusive features and latest news please see our February issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Vectra AI announces free cybersecurity services Read More »

Biometric

The rise of popularity in biometric security solutions

Taking a look at how biometrics in security has increased in popularity  Biometric solutions in the security industry have increased in popularity in recent years due to its proven effectiveness and reliability. Biometric technology is used as a way of identification and is incredibly effective as a form of access control. Many different industries rely on biometric technology to ensure a high-level of security. Technology is constantly evolving and improving, furthering the reliability of biometrics. Biometric authentication works by comparing data of a person’s characteristics to that person’s previously stored biometric ‘template’ to determine resemblance. Common methods of biometric authentication include facial recognition, iris recognition and the use of fingerprints.  Verifying a person’s identity has been a concern throughout history and could be seen as one of the core properties of security as a whole. A good example of this is how people have always relied on the recognition of a person’s features just from looking at them. The use of ID cards is a traditional way of verifying someone’s identity just by comparing them to the photo on the card and police have relied on sketches of suspects in hope to identify them Biometric technology deepens this verification by the use of technology, which is one of the key reasons so many companies are now implementing it into their security solutions.  Today we look at the different reasons biometric security solutions have grown in popularity.  Facial recognition  Facial recognition is one of the most common methods of identity verification, it uses biometric technology to recognise a human face. It uses a similar method of  authentication as other biometric solutions- matching the person’s characteristics to a previously saved template. Facial recognition systems map the person’s characteristics from a photo, video or a scan of their face.  Facial recognition softwares reads the geometry of a person’s face, like distance between their eyes and placement of other characteristics- this determines a facial signature. This facial signature is then compared to the previously stored data. The system then determines if this is a match to one of the faces in the database.  Facial recognition is used throughout many different industries. Modern phones now often use facial recognition instead of a passcode, because it is more secure. It does of course have its downfalls- depending on the setting the user is in the phone may not recognise the person’s face. Facial recognition in phones and other devices does rely on a clear view of the user’s face, this can be affected by lighting, or more recently the use of masks. Because of these consequences, some people may view facial recognition services as inconvenient as a security precaution when integrated into their personal devices. Many phone service providers do give users the option to just use the traditional method of a passcode. However, these do leave personal data more vulnerable to cyberattacks, biometric security ensures a higher protection level despite these reasons.   There is a worry of how accurate facial recognition softwares is amongst many experts and the public. Like previously mentioned when discussing the use of this technology on personal devices, the setting can affect its reliability. There are other factors like ageing and if someone drastically changes their appearance. However, facial recognition is still regarded as one of the most trusted forms of verification. Industries such as government bodies and banking establishments rely on facial recognition services to protect their data and documents, which proves the trust level that it has as a whole.    To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The rise of popularity in biometric security solutions Read More »

Airports

Border control in British airports

What are the security measures put in place to keep British airports secure?  Airports are vulnerable to various security threats like theft, terrorism, smuggling and much more- it is vital that they are kept as secure as possible. Over the years, airports have improved their approaches to ensuring security to keep their business, passengers and staff safe. After many incidents at airports, internationally and in the UK, airports have learnt from these and adapted their security solutions. Technology has drastically improved, allowing opportunity for new effective security methods to protect airports. Some of these methods include access control, video surveillance, biometrics and x-ray scanning. These are all important processes that can detect and prevent threats to border security.  Today, we take a look at some of these security measures that key British airports, like Heathrow and Gatwick, use to maintain a secure environment.  Biometrics  Biometrics in security solutions is increasing in popularity due to its accuracy and reliability. At airports it is used to scan fingerprints and map facial features to identify people. Heathrow Airport, one of the biggest airports in the UK, uses biometric technology to process passengers on flights to UK and Ireland destinations. It works by using a camera to capture an image of the passengers face when they present their identification or boarding card. A biometric template is then created which is unique to each person. Another image is then taken, which enables the biometric template to be compared to verify the passengers’ identity. This method was put in place to strengthen UK border security, those who decline the use of their data will not be allowed to board.  Of course it is expected that many people will be concerned about the privacy of their data.  Heathrow confirmed that facial images and biometric templates are only kept for a necessary period of time and are then terminated in a secure way. Personal information will only be used for the purpose of border security and it will only be passed to law enforcement agencies if legally required.  Gatwick Airport also uses biometric technology to increase their level of security. Gatwick uses this system to provide evidence that passengers boarding a domestic or CTA flight are the same individuals who entered the international departure lounge at the airport. Like Heathrow’s policy, this method of biometric technology is not optional for passengers-if passengers refuse to participate they will not be able to attend their flight.  Scanning  To prevent security breaches, airports will restrict what items passengers are allowed. This can include obvious items like firearms, narcotics and other harmful or illegal substances and objects. These items are commonly detected by the use of scanners, these can be used to scan luggage or a person to see if they are hiding any restricted items. This technology is key in ensuring airport security, it can specifically prevent terrorist attacks and smuggling.  In regards to body scanners, they use the latest technology which means that they can scan passengers in a quick and unobtrusive way. Some airports occasionally search passengers by hand, which is an effective method- but the use of modern scanners is far more reliable and accurate. The officer will call the passenger into the machine and give them instructions. Scanners use millimetre wave technology to produce an outline image of the passenger’s body, revealing any concealed objects. Millimetre wave technology uses a low-power form of electromagnetic technology and poses no known health risks.    To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Border control in British airports Read More »

home

Cyber consequences of remote working

Since working from home has become the norm, how can companies stay secure when different devices are being used?  The traditional office approach to work came to a halt due to the coronavirus pandemic which started in early 2020, eventually leading to the UK going into a full lockdown in March. Some people were put on furlough and others proceeded to work from home. Lockdown restrictions have now been lifted in the UK, and in the coming months it is predicted that restrictions will cease to exist at all. Many office-based work environments have continued the practice of remote working, usually through hybrid working. Hybrid working means a combination of working in an office and working from home. This is one of the few positive outcomes of lockdown, resulting in a more flexible working environment which has been praised by many people.   Despite this being a well-liked addition to the working world, it does leave many people open and vulnerable to cyber-risks. According to the Velocity Smart Technology Market Research Report 2021 ‘70% of remote workers said they had experienced IT problems during the pandemic’. This is mainly due to the fact that multiple devices are being used in different work environments. Not all companies supply work computers for their staff, so people have to resort to using their personal laptops and devices. So, how can businesses ensure top-notch cybersecurity for their staff?  Home network connection  Companies have the best security softwares implemented into their IT networks to keep data as secure as possible. The personal routers of employees rarely have the same level of security as businesses, because it is not as crucial to someone’s day to day use of the internet. For business use, a secure network connection is a key aspect of their cybersecurity. Companies will often have firewalls that block suspicious activity. A firewall is a network device that monitors packets going in and out of networks. It either allows them to pass through or blocks them. They can be set up to define what is permissible and what isn’t.  A common way that businesses ensure a secure IT network is through the use of a Virtual Private Network, or more commonly known as a VPN. VPNs keep network connections secure by funnelling the data and IP address through another secure connection between the user’s internet connection and the online service being used. The VPN keeps the data secure from potential hackers and general cyber-attacks. These can of course be used for home and personal use, making them a perfect investment for remote working. A common consequence of VPNs is that they can reduce internet speed as the users’ internet activity is being funnelled through another network. This is why it is important to select VPNs of the highest quality to ensure a steady internet speed that will keep home working disruptions to a minimum.  To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Cyber consequences of remote working Read More »

banking establishments

Keeping banking establishments secure

What are the best physical security measures used to protect assets in vaults in banking establishments   Banking establishments are a necessity for our society and something that we all rely on. Due to the valuable nature of the properties that they withhold, banks are extremely vulnerable to theft and other security breaches. However, as the world becomes more virtual, the risk of cybersecurity is a current main focus for many organisations, especially banking establishments. Due to the high cyber-risk, banks make large investments into protecting their IT networks from cyber attacks.   Because of this focus on cybersecurity, banks tend to overlook the physical risks in their establishments, like the risk of intruders, theft or the general threat to a bank’s vulnerable areas. One of the most vulnerable areas in banking establishments are bank vaults. Bank vaults are secure areas which store money, valuables and documents. They are intended to protect these items from theft, misuse and other threats. Due to the high quantity of valuable items inside of vaults, criminals are constantly coming up with new ideas on how to break into these safe spaces. Banks are especially vulnerable to theft and robbery. Banks always need to come up with different ways and methods to ensure that they maintain the highest levels of security.  Banks continue to demand security solutions to increase their customers’ trust and continue to fuel their reputations. Luckily, there are many effective security systems around that banks can utilise in their buildings such as video surveillance, biometrics, alarms and much more. Today, we look at some of the important physical measures that are used to protect vaults in banking establishments and banking facilities as a whole.  Bank vault materials  To ensure top-notch security, bank vaults rely on high-quality materials and mechanisms. There are various aspects that play a part in keeping a bank vault secure and stable, all are of high importance. These methods have changed and evolved throughout history. Arguably one of the most important factors of keeping a bank vault secure is the lock mechanism, this is key to keeping the vault contents safe.   Secure locking systems for vaults and safes have been something that’s been needed throughout all of history. For example, Ancient Romans used warded locks which had intricate notches and grooves that made picking them more difficult. Until the 19th century, banking establishments in America used to use small iron safes with a key lock. Key locks were still vulnerable through the keyhole and intruders would blast off the door by pouring explosives in this opening. Over time, manufacturers have adapted their solutions and ideas to make bank vaults more secure and effective, learning from their weaknesses and mistakes.  Modern bank vaults most commonly tend to use a dual control combination lock, this mechanism relies on two people to open it. These locks are usually connected to a timed lock. This mechanism was originally invented by James Sargent, an employee of Yale. Time locks prevent the combination lock from opening until a pre-set number of hours has passed, even if the combination code is correct. This innovative method adds a crucial layer of high-quality security to ensure that the bank vault is as secure as possible.    To read more exclusive features and latest news please see our Q4 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Keeping banking establishments secure Read More »

Scroll to Top