9 March 2022

Bosch Building Technologies

Bosch upgrades Telford Shopping Centre

Bosch Building Technologies has installed a digital public address and voice alarm system at Telford Shopping Centre in the United Kingdom. On 25 acres of commercial space, the IP-based Praesensa system from Bosch now provides music, announcements and emergency alerts for retail stores, restaurants, as well as hotels and a cinema. The shopping mall operator was looking to upgrade the existing public address system with a future-proof and IP-networked solution for retail environments with two key requirements: Heightening the centre’s sustainability and energy efficiency while keeping costs for the upgrade low. Working with these requirements, Bosch partner North AVS refurbished all existing loudspeakers installed at Telford Centre across 16 zones via minor modifications on the end lines. As a result, system integrators merely needed to replace the obsolete control equipment – including a cumbersome call station with analog buttons – and amplifiers. Since the cost-effective upgrade, security staff at Telford Shopping Centre now control the public address system via an intuitive touch screen interface. Managed via OMNEO media networking technology, the software-based system combines live broadcasts and recordings from various media sources. The library includes background music in MP3 format, commercials from a message database, plus end-of-day mall closing messages on automated schedules. Automation also kicks in during an emergency, for instance in case of a fire: Targeted to specific zones on the property, the public address system integrates with the fire alarm system to play pre-recorded alerts and evacuation messages. Leaving full control to security, personnel can send live voice messages and manually trigger the evacuation protocol as needed at any time.     Sustainability and energy savings The second main project parameter consisted of energy efficiency. As the latest in a long line of public address systems, Praesensa achieves a low energy footprint via smart power partitioning across amplifier channels. The software adapts intelligently to loudspeaker loads and divides the available output power across all channels to a maximum of 600 Watts. This built-in function significantly lowers overall power usage over the system’s lifetime, especially in the idle state where most systems spend most of their time. Requiring less battery standby, the system can run on only two batteries that need changing every four years according to British standards. Also contributing to the system’s low energy footprint is the minimized form factor: While the legacy system occupied two rack spaces in the server room, the new solution cuts the size in half. This is achieved by integrated standby amplifiers that reduce the cost – especially for cooling – and space of the rack housing. This also provides an effective redundancy measure. Praesensa also delivers automated fault notification to the control desk within 100 seconds, thereby meeting EN54-16 standards for public address systems. Speaking of standards, the system meets the latest data protection guidelines as a fully secure IP solution: All control equipment is connected via Secure IP out of the box. Safeguards include encryption and authentication for complete protection against eavesdropping and hacking. With immediate cost savings in a future-proof, user-friendly, flexible and scalable package, the system is generating interest and positive user feedback from shopping mall operators. To read more exclusive features and latest news please see our February issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Bosch upgrades Telford Shopping Centre Read More »

Axis Communications

Axis Communications at World Police Summit 2022

Axis Communications is participating in the 2022 edition of the World Police Summit (WPS) and will demonstrate how its network video and audio products can be leveraged by policing and law enforcement entities and enterprises to serve as the bedrock of a comprehensive surveillance and security ecosystem. The summit, which will take place from 14-17 March at the Dubai Exhibition Centre, Expo 2020, in the UAE, brings together policing officials and experts from around the world to discuss current trends and technologies, and to debate topics relevant to the future of the sector. “We have a strong relationship with the law enforcement authorities in the Middle East and are proud to be showcasing our solutions for smart cities and traffic management at the World Police Summit. Additionally, we are also collaborating with video analytics firm Irisity, to demonstrate the true power of analytics,” said Ettiene van der Watt, Regional Director for Middle East and Africa at Axis. Axis will be demonstrating the following solutions: Multisensor and Multidirectional cameras for city surveillance Multisensor and multidirectional cameras provide seamless 180° coverage with great detail and minimal distortion. With their seamlessly stitched images, multisensor cameras also eliminate blind spots. They are well suited for railway stations, metro stations and airports and for squares, stadiums, campuses and parking lots. They’re also ideal for perimeter surveillance around critical infrastructure, public or government buildings, banks and healthcare centres. A smarter approach to traffic incidents & offences Combining high quality images with automated edge-based video analytics allows the detection, verification, and response to incidents quickly and efficiently. When combined with intelligent automatic incident detection software, the traffic cameras reliably spot actionable incidents with significantly fewer false alarms. Audio for security Axis network audio systems ensure that important communication takes place at the right time, in the right place and with the sound quality needed to keep citizens safe and secure. Emerging audio technologies can also help smart cities flexibly tackle issues which are having a direct and detrimental effect on citizen wellbeing.   To read more exclusive features and latest news please see our Q1 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Axis Communications at World Police Summit 2022 Read More »

Qognify

Qognify video management solutions at ISC West 2022

With physical events making a comeback, Qognify is excited to be present at ISC West 2022 in Las Vegas. A special focus will be on the introduction of new enterprise-class video management solutions for retail, banking, transportation and higher education. In addition, visitors will have the opportunity to get an overview of the capabilities of Qognify’s Enterprise Incident Management offerings, including pre-packaged solutions for airports for a quick time-to-value. Jeremy Howard, VP of Sales Physical Security – Americas, is happy about the opportunity to meet partners and end customers in Las Vegas: “Over the last two years we’ve all become experts in video conferences and webinars. However, it is often easier to discuss the specific requirements of a project face to face with a group of stakeholders and decision makers while having a look at the software solution itself.” Qognify will be in the meeting room Galileo 903 at the Venetian, next to the entrance to the ISC West exhibition hall, on March 23 and 24.   To read more exclusive features and latest news please see our Q1 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Qognify video management solutions at ISC West 2022 Read More »

Ukraine

The Ukraine – Russia cyberwar

Russia may have moved troops into Ukraine on February 24, 2022, but its cyberwar against Ukraine began eight years earlier. Long before Putin’s full-scale invasion, Russian hackers began targeting Ukrainian infrastructure and government institutions. Because the cyberwar is an important but hidden element of this campaign, we’ve gathered as much data as we can to update you on this side of the conflict. We’ll cover significant cyberattacks, cyber’s role in the current conflict, and steps you can take to stay safe. We’ll also update this article as the situation in Ukraine develops so those affected know what’s happening with their data. The buildup to the cyberwar in Ukraine Since Putin first came to power in 2000, Russian diplomatic relations with former Soviet republics have been marked by Russian aggression and disinformation. He has described the dissolution of the Soviet Union as “the greatest geopolitical catastrophe of the century,” and talks openly about rebuilding the Soviet Union. This began in 1999 with the Second Chechen War, before Putin was even formally elected President of Russia. In that campaign, in a way that foreshadows what’s happening in Ukraine, Putin declared the Chechen President’s authority illegitimate and, in a series of increasingly aggressive moves that belied his stated intentions, took control of the country, which is now part of Russia. Putin used similar tactics of disinformation and cyber warfare in Russia’s 2014 campaign against the Crimea, a formerly Ukrainian territory located along the northern coast of the Black Sea. In the Russian annexation of Crimea, Putin dissolved Crimean press, used state sponsored media as well as social media to spread lies about fascism in Ukraine, and used troops disguised as separatists to overtake the Crimean parliament. When Russia formally moved troops into Crimea, its stated intention was to protect Russians and “normalise” the situation. Following the 2014 annexation of Crimea, brutal and bloody conflict has raged in eastern Ukraine between Russian-backed separatist forces and the Ukrainian military. At the same time, Russian cyberattacks against Ukraine have escalated, focusing on Ukrainian hospitals, energy systems, government institutions, and websites. This is all in an apparent effort to destabilise Ukrainian politics, aid the spread of disinformation, and affect the Ukrainian military. Ukraine has responded with cyberattacks of its own, targeting Russian military forces, disinformation campaigns, and intelligence agencies. However, the economic disparity between the two nations puts Ukraine at a disadvantage. Cyberwarfare between the two nations further escalated in late February, 2022, following Russia’s full-scale invasion of Ukraine. Following the same playbook Russia used in Chechnya and Crimea, Russian hackers and news outlets are spreading disinformation to build a pro-Russian justification for the invasion. Putin has falsely claimed that Ukraine is a fascist government committing genocide on its own people. And his disinformation campaign is extremely effective in Russia. Reports have even emerged of Russian citizens refusing to believe images that show Russian aggression in Ukraine. Russian cyber tactics are also designed to disrupt Ukrainian defensive efforts, communication channels, and civilian infrastructure. The full report can be read here. To read more exclusive features and latest news please see our February issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The Ukraine – Russia cyberwar Read More »

Ukraine

The Ukraine – Russia cyberwar

Russia may have moved troops into Ukraine on February 24, 2022, but its cyberwar against Ukraine began eight years earlier. Long before Putin’s full-scale invasion, Russian hackers began targeting Ukrainian infrastructure and government institutions. Because the cyberwar is an important but hidden element of this campaign, we’ve gathered as much data as we can to update you on this side of the conflict. We’ll cover significant cyberattacks, cyber’s role in the current conflict, and steps you can take to stay safe. We’ll also update this article as the situation in Ukraine develops so those affected know what’s happening with their data. The buildup to the cyberwar in Ukraine Since Putin first came to power in 2000, Russian diplomatic relations with former Soviet republics have been marked by Russian aggression and disinformation. He has described the dissolution of the Soviet Union as “the greatest geopolitical catastrophe of the century,” and talks openly about rebuilding the Soviet Union. This began in 1999 with the Second Chechen War, before Putin was even formally elected President of Russia. In that campaign, in a way that foreshadows what’s happening in Ukraine, Putin declared the Chechen President’s authority illegitimate and, in a series of increasingly aggressive moves that belied his stated intentions, took control of the country, which is now part of Russia. Putin used similar tactics of disinformation and cyber warfare in Russia’s 2014 campaign against the Crimea, a formerly Ukrainian territory located along the northern coast of the Black Sea. In the Russian annexation of Crimea, Putin dissolved Crimean press, used state sponsored media as well as social media to spread lies about fascism in Ukraine, and used troops disguised as separatists to overtake the Crimean parliament. When Russia formally moved troops into Crimea, its stated intention was to protect Russians and “normalise” the situation. Following the 2014 annexation of Crimea, brutal and bloody conflict has raged in eastern Ukraine between Russian-backed separatist forces and the Ukrainian military. At the same time, Russian cyberattacks against Ukraine have escalated, focusing on Ukrainian hospitals, energy systems, government institutions, and websites. This is all in an apparent effort to destabilise Ukrainian politics, aid the spread of disinformation, and affect the Ukrainian military. Ukraine has responded with cyberattacks of its own, targeting Russian military forces, disinformation campaigns, and intelligence agencies. However, the economic disparity between the two nations puts Ukraine at a disadvantage. Cyberwarfare between the two nations further escalated in late February, 2022, following Russia’s full-scale invasion of Ukraine. Following the same playbook Russia used in Chechnya and Crimea, Russian hackers and news outlets are spreading disinformation to build a pro-Russian justification for the invasion. Putin has falsely claimed that Ukraine is a fascist government committing genocide on its own people. And his disinformation campaign is extremely effective in Russia. Reports have even emerged of Russian citizens refusing to believe images that show Russian aggression in Ukraine. Russian cyber tactics are also designed to disrupt Ukrainian defensive efforts, communication channels, and civilian infrastructure. The full report can be read here. To read more exclusive features and latest news please see our Q1 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The Ukraine – Russia cyberwar Read More »

Tanium

Tanium comments on Samsung attack

Chris Vaughan, Area Vice President of Technical Account Management, EMEA at Tanium comments on Samsung attack The attackers have teased stolen source code taken from various parts of the Samsung network, I believe that this breach is genuine and it could cause significant damage to the company. Some specific parts of the code that have been leaked are key security components for Samsung devices, this could make cracking and breaking into phones easier. I expect attackers to test if biometric security controls such as fingerprint and face ID can be bypassed. This could even be leveraged by law enforcement and could be a privacy concern for Samsung users. We have seen several issues in the past with breaking into phones being challenged, most notably the FBI Apple Encryption Dispute. In theory, this breach could make it easier for malware to be written to exploit phones remotely, and since Samsung is widely used the attack surface could be large and lucrative for cybercriminals. The potential consequences of this breach again highlights the importance of cybersecurity for all organisations. Protecting any organisation from the impact of a cyber- attack comes down to ensuring that there is visibility across the IT estate to identify any problems and to have the control in place so that any issues can be fixed at speed. In the aftermath of an attack, it is important to immediately start the process of damage control, to mitigate the impact as much as possible – and having appropriate back-up and disaster recovery solutions in place is crucial to doing so.   To read more exclusive features and latest news please see our Q1 issue here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Tanium comments on Samsung attack Read More »

Scroll to Top