preloader
Paperless Technology Solution
Gurd shola Addis Ababa,
info@paperlessts.com
Ph: +251936515136
Work Inquiries
work@paperlessts.com
Ph: +251936515136

XONA and Nozomi partner to accelerate digital transformation | Security News – SourceSecurity.com

Dahua DHI-LPH65/75/86-MT440-C 65/75/86'' UHD Smart Interactive Whiteboard
Hikvision unveils the industry's first "True 8K" NVRs
Climax launches products that adopt SF1 Technology
Programmable electronic keys can lighten the workload for facility managers
Chukchansi Gold Casino and Resort meets regulations and secures guests and staff
Optex shares the benefits of implementing LiDAR security for the entertainment industry
South African golf and residential community protects residents and visitors 24×7 with Hikvision
Dahua takes the lead in bringing advanced security technology to Antarctica
Anatomy of a False Alarm
Making physical security a critical pillar of your cybersecurity strategy
Preventing Fan Violence: 7 Tips for Moving from Reactive to Proactive Security
Improving real-time visualisation and collaboration in SCADA Operations
Public-Private Partnerships On Campus: What You Need To Know
A More Secure Alternative to 125 kHz Proximity Cards
5 ways to strengthen physical security with an integrated system
The critical role of access control in K-12 school security
21 Sep 2022
XONA, the frictionless user access platform purpose-built for critical infrastructure, and Nozomi Networks, the pioneer in OT & IoT security, announces a partnership to help operators of critical infrastructure accelerate digital transformation with enhanced security and Zero Trust principles.
By integrating their technologies, XONA and Nozomi Networks give organisations advanced tools to remotely manage the security of operational technology and industrial control systems from anywhere, and on any device.
Critical infrastructure across the world is under increasing threat and must be modernised to realise the benefits of digital transformation. Like many other industries, there are a myriad of reasons forcing industrial facilities to adopt new technology – from the cost and business efficiencies they bring, to meeting the needs of a highly-skilled workforce that’s often stretched too thin,” said Bill Moore, Founder and CEO at XONA.
Critical infrastructure across the world is under increasing threat and must be modernised”
Bill Moore adds, “Nozomi Networks has been leading the way in OT and IoT security for years, and bringing our technologies together will provide new dimensions of security and accessibility that our customers need to stay ahead in a quickly evolving environment.”
Nozomi Networks solutions support more than 74 million devices in thousands of installations across energy, manufacturing, mining, transportation, utilities, building automation, smart cities and critical infrastructure.
Its best-in-class hardware, software and cloud-based OT, ICS and IoT security and visibility products automate the complex work of inventorying, visualising and monitoring industrial control networks through the innovative use of artificial intelligence.
With pre-integrated and tested solutions that reduce time to market and increase value, combining Nozomi Networks and XONA technology addresses the complex challenge of securing remote access in critical infrastructures. Comprehensive network visibility is automated, therefore enabling network administrators to balance priorities in a more efficient manner while ensuring the utmost protection with granular security.
A big part of helping organisations modernise their critical infrastructure is enabling user access”
A big part of helping organisations modernise their critical infrastructure is enabling user access from anywhere, on any device. It’s essential for any business in the twenty-first century, and industrial facilities are no different,” said Chet Namboodri, Senior Vice President of Partner Alliances at Nozomi Networks.
Adding user access to critical infrastructure is not easy – it’s usually too costly and complex, or vulnerable to attack. But XONA has figured out how to make user access frictionless and secure. Integrating our technologies together provides immense value to our joint customers.”
Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and Zero Trust architecture immediately eliminates common attack vectors, while giving authorised users seamless and secure control of operational technology from any location or device.
With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust.
For more information and to attend a live webinar on Wednesday, September 21, 2022, to learn how the combined XONA and Nozomi Networks solution can benefit users’ organisations.
e-con Systems introduces RouteCAM_CU20
Fibra Technology: How to install a wired security system in 6 hours
DKS: 1620 Lane Barrier Animation
Nestled into the base of the Sierra Foothills and on the way to California’s Yosemite National Park, the Chukchansi Gold Casino and Resort offers visitors and locals alike a scenic gaming and entertainment destination. It is owned and operated by the Picayune Rancheria of Chukchansi Indians and features 56,000 square feet of gaming space with 1,750 slot machines and 36 table games as well as a nightclub, players club, and dining and entertainment services.  Challenge  The Casino originally opened in 2003 with a Pelco video security system, including Pelco cameras and the Endura Video Management System (VMS), designed and built by system integrator – SSI. And while casino security was happy with the Endura VMS, it was looking for increased efficiencies, more functional monitoring, and a video security system that also would allow for growth. Improving monitoring and video security  In addition, the casino needed to establish security for a recently- added service station and convenience store The Casino also needed a method to improve its ability to monitor gaming table and slot machine activities, cash rooms, and other areas of the property while establishing the groundwork for future scalability. In addition, it needed to establish security for a recently- added service station and convenience store. Adding complexity to the challenge, the Chukchansi Gold Casino and Resort must comply with strict tribal, state, and federal gaming regulations that include specific video security requirements. Per the California Nations Indian Gaming Association (CNIGA), tribal government gaming is subject to more stringent regulation and security controls than any other type of gaming in the USA.  Solution  The Casino gave the go-ahead for SSI to replace the existing Endura VMS with Pelco’s newest VMS, VideoXpert. “We have worked for hand in hand with Chukchansi for the past 14 years and knew they would benefit greatly from the efficiencies and expansion Pelco’s VideoXpert VMS offers,” said Todd Flowers, President of SSI. Todd Flowers adds, “The upgrade from Endura to VideoXpert was seamless and the changeover was accomplished with little to no disturbance of their operations.” VideoXpert VMS solution The VideoXpert VMS solution tackles the Casino’s need for more functional monitoring and control of the video security system.  The software’s extensive capabilities allow the Casino to plan for growth and added functionality through onboard features, as well as third-party integrations. An intuitive user interface, easy-to-use solution Tagging allows cameras to be tagged with multiple names, providing the means for very specific search operations With an intuitive browser-like interface that utilises tab views for a single source experience, views can be called up via sequencing, alarm tabs, and via event, viewer features such as the bookmark feature. This allows operators to quickly review incidents by capturing scenes from multiple angles and then synchronising the video, utilising VideoXpert’s powerful investigative engine that quickly locates and collates video. Another important feature for improving efficiency is tagging, which allows cameras to be tagged with multiple names, providing the means for very specific and dedicated search operations. Camera control and management  Another new function for the Casino’s VMS is the control and management of cameras deployed in the newly-built service station and convenience store on the property. Video from these cameras is monitored from the same control room as video from the casino, enabling the system to continue to scale and grow in a manageable way. Infrastructure upgrades are often finished before implementing a new video security and control system; in Chukchansi Gold’s case, the infrastructure upgrade was concurrent with the VideoXpert VMS and new control room install. These capabilities allowed for a smooth crossover because SSI could install the new VMS in parallel with the Casino’s existing Endura system. Seamless transition  As an example, the integrator could map Endura components nearly one-to-one with VideoXpert. Pelco’s simple migration application also enabled Chukchansi to migrate their entire Endura database, ensuring a relatively seamless transition between the VMS solutions. The migration process transfers user names, roles, permissions, and associations for all three items, allowing authorised Endura users to maintain their same roles and permissions when using VideoXpert. The migration process also transfers all camera names, numbers, groups, and locations. Pelco IP cameras Plans for the changeover also included the Casino repurposing its existing Endura-based storage Plans for the changeover also included the Casino repurposing its existing Endura-based storage. All that was involved was to upgrade the NSM licences and then deploy the cameras and migrate them over to VideoXpert. This saved the Casino considerable budgeted funds that were subsequently applied to adding new Pelco IP cameras and a more efficient control room. According to Flowers, this made economic sense in several ways for Chukchansi Gold.  Faster video data access Another system advantage can be seen in the control room. The decluttered workstations contain only an enhanced keyboard and a 3D mouse. Operators are trained on VideoXpert is usually less than a day, allowing them to quickly take advantage of the new VMS’s faster access to video data for better and more informed decision making. Result  Chukchansi Gold is confident that their newly upgraded Pelco video security and control system puts them at the forefront of tribal gaming trends in California. “We have been able to meet regulatory demands and ensure a safe and secure experience for our staff and guests by leveraging new technology,” said Tommy McDonald, Surveillance Manager, Chukchansi Gold Casino, and Resort, adding “We couldn’t be more pleased with the results.” Scalable design “Our latest release of VideoXpert provides Chukchansi Gold with the user intuitive operation, scalability, performance, and versatility they required to implement all of the system upgrade objectives they set out to accomplish,” said Miki Manjal, Global Vertical Market Manager – Casinos & Gaming at Pelco. Miki Manjal adds, “Additionally, the open platform will allow them to further enhance business operations by implementing any technology integrations in our growing portfolio of solutions to deliver functionality beyond surveillance and security applications.”
Robots have been used in security patrol applications for decades, although developments in artificial intelligence (AI), video analytics, sensors and communications are expanding robot capabilities to new heights. Suddenly, robots are the latest thing in security. In addition, drones have become ubiquitous for numerous applications, including security. We wondered how well the security industry is embracing these newer technologies. We asked this week’s Expert Panel Roundtable: What impact are robots and/or drones having on the security industry?
The recent theft of luxury wines from Spanish restaurant, Atrio, highlighted one of the greatest difficulties when it comes to security in the entertainment sector. From museums and art galleries to wineries, hotels, and restaurants, protecting against theft, vandalism and unauthorised handling of goods is a continuous challenge in the tourism industry. Despite the wide variety of issues, there is a key differentiating element, which is that these are places open to the public, where security must coexist with daily business operation and must not deteriorate the visitor experience. Perfect security solution This is a key aspect to consider when designing an effective security strategy, with 2D LiDAR sensors positioned as the perfect security solution. Laser detectors based on LiDAR technology (Laser Imaging, Detection and Ranging) allow users to protect goods very discreetly on display by detecting hands or objects that come too close to them. Laser detectors based on LiDAR technology allow users to protect goods very discreetly The sensor creates an invisible virtual wall or curtain that protects the cabinets or shelves where the items are on display, precisely excluding other areas, thus avoiding the effect on the user experience. Because of their smart and versatile detection, LiDAR sensors are successfully used in a wide variety of applications. Security in warehouses, bars, and restaurants Bars and restaurants often offer diners a selection of fine wines and spirits. Wineries and cellars have also become a tourist attraction, and an important part of the experience is usually to visit areas where high-value products are stored. In these confined spaces, the precise detection of LiDAR technology can alert if a bottle or item is removed from the shelf. For example, in the case of The Londoner luxury hotel in the UK, its six bars and restaurant areas have REDSCAN LiDARs installed to protect their expensive beverages on display. The laser sensor creates an invisible wall and continually scans the detection area; the size of the detection zone can be configured for objects as small as 2.5 cm, so that if any hand or object were to enter the detection area, the alarm would trigger, alerting staff by activating cameras or sound alerts. The precise detection of LiDAR technology can alert if a bottle or item is removed from the shelf Protection in art spaces At the same time, LiDAR allows users to create separate zones within the detection area and link them to arming and disarming alarm systems, or access control credentials to not obstruct day-to-day work. Similarly, in museums, galleries, and art exhibitions, 2D LiDARs are used to create a virtual ‘shield’ that allows customers and visitors to enjoy works of art while protecting them, activating alerts with extreme precision only when someone or something approaches the protected art. Whether intentionally or not, paintings, sculptures, and other pieces of art face a series of threats—it could be a curious hand, a child playing or a real theft attempt. This can occur during opening hours or while the business is closed, but in all cases losses due to stolen or damaged art can be very significant; therefore, adequate protection is required. Complete wall protection LiDARs allow different settings to protect the same space to adapt to security needs Some artistic goods can be protected in a display cabinet, but, in most cases, art is exhibited without any physical protection. So that visitors may connect with the art, it’s important that security should not get in the way nevertheless threats must be identified quickly and accurately and security personnel must be alerted. LiDARs allow different settings to protect the same space to adapt to security needs depending on opening and closing times. For example, only valuables can be protected during opening hours, and complete wall protection can be set up when the exhibition is closed. It’s important that security should not get in the way nevertheless threats must be identified quickly Security at festivals and seasonal events The organisation of festivals requires mobilising large electronic and AV equipment, instruments, costumes, props, and more. The short-term nature of these events can be a significant vulnerability when it comes to protecting all these high-value goods and, to some extent, limits security options. The solution must be quick to implement and not require an existing structure or fixed wiring. The LiDAR sensor can create a virtual wall that alerts if someone enters the warehouse area A LiDAR with a built-in camera, such as the new REDSCAN Pro model, allows the creation of a security system in these environments, offering extremely precise and ultra-fast detection to initiate security events, together with a camera for video verification of alarms and event recording. Mounted on a retractable pole and easy to install and transport, the LiDAR sensor can create a virtual wall that alerts if someone enters the warehouse area or parking areas, where equipment is usually stored. Accurate detection technology In addition, the LiDAR wall can alert if someone or something enters hazardous areas, such as fuel tanks or electrical generators, immediately alerting someone to their approach to these areas and setting off a sound warning or informing the security team. With the use of smart, versatile, and accurate detection technology, security goes from being a reactive process to a proactive, much more agile, and effective security system. LiDARs offer the precision and reliability that high-value goods need, in addition to being aesthetically discreet, both because of the type of protection they offer (a very thin invisible laser curtain) and because the cover can be customised to adapt them to the environment where they are going to be installed.
ADI Global Distribution, a global distributor of security, AV and low-voltage products, announced the release of a new mobile app to provide UK customers with a fast and easy way to shop ADI from a mobile device. Installers and trade professionals can use the app to search for products, build job lists, check pricing and availability, place orders, track deliveries and manage their ADI account on the go. The ADI app The ADI app offers a modern design and advanced features providing easy access to more than 24,500 products from over 260 brands. With facial and fingerprint recognition, users can log in to the app in seconds and navigate quickly and easily. The app makes managing an ADI account even easier and includes time-saving features like checking order status, reordering, delivery tracking and creating product lists by project or customer. Customers’ digital experience The release of the ADI app in the UK is the next step in ADI’s strategy to transform customers’ digital experience “The release of the ADI app in the UK is the next step in our strategy to transform our customers’ digital experience, ” said Laura Phelan, Global Vice President of digital experience at ADI. Laura Phelan adds, “We gathered customer input at each phase of design and development to ensure that we’re giving customers a way to quickly and conveniently access the products, services and information they need from ADI.” Authority comment “We’re always looking for ways to enhance our customer experience and the app provides another channel customers can access our products and services. Using their smartphone, customers can easily search our extensive online catalogue, access account information and manage orders quickly and conveniently, while on the go,” said Anthony Carter, the Regional General Manager for Northern Europe at ADI. Anthony Carter adds, “The app complements our offering, which includes our branch network, sales team, Digital Branch and value-added services, to help us deliver an omini channel shopping experience.” Access to ongoing promotions In addition to ADI’s complete product portfolio, the mobile app provides access to all ongoing promotions, ADI’s monthly sales flyers and real-time stock availability. ADI plans to continue to add new features and functionality to the app, making it even easier to shop ADI. ADI also launched the new app in the Netherlands and in the U.S. The company has plans to release a version of the app for additional countries across EMEA in the coming months.
Security Essen, the trade fair for civil security is expanding its range of products and services. It was announced at Messe Essen that the topics of civil protection and civil defence will be added as a new focus from 2024. The background to this is the current situation in politics, the environment and society and the resulting necessities. “At Security Essen, we not only depict the latest developments, but also integrate upcoming significant concerns of society with foresight,” explains Oliver P. Kuhrt, CEO of Messe Essen. He adds, “The topics of civil protection and civil defence are becoming increasingly important and it is no longer possible to imagine a security fair without them. Therefore, with the next Security Essen 2024, we will offer all players their own platform as well as a network for exchange, information and procurement.” The Alliance for Security in Business, ASW The Alliance for Security in Business, ASW is particularly active in the field of this prevention The Alliance for Security in Business, ASW (Allianz für Sicherheit in der Wirtschaft), is particularly active in the field of this prevention. ASW West Managing Director, Dr. Christian Endreß has analysed a wide variety of scenarios over the years, which have now become reality. He said, “A flood of the century, a pandemic, a war in Europe, impending energy shortages and cyber attacks on critical infrastructures – what was unthinkable until recently has now come to pass. Here, it is important to protect the population with foresight.” Possibilities for this are already available on the market. One example, according to Endreß, is SMS warnings to people in disaster areas. Civil Protection and Defence Security Essen will bring together this know-how of technological innovations and organisational solutions at Messe Essen. Companies, political players and those responsible for civil defence can exchange ideas in the newly created theme area ‘Civil Protection and Civil Defence’. The strategic planning for the implementation, which will now be realised for the first time from 17 to 20 September 2024 at Security Essen with its own exhibition hall, has already been underway for some time. Support comes not only from associations such as ASW but also from politics. NRW’s Minister of the Interior, Herbert Reul said: “We welcome the initiative of Messe Essen to show the topic of ‘Civil Protection and Civil Defence’ as a separate focal point at Security Essen in future.”
42Crunch, the Developer First API Security platform company, announced at ASC the availability of the platform’s API Scan service inside the leading IDEs for developers. With over 500,000 developers already using 42Crunch, this addition to the platform means enterprises can further strengthen their shifting of API security as far left as possible into development workflows. DevSecOps approach The 42Crunch API Scan is designed to help enterprises develop secure APIs faster The 42Crunch API Scan is designed to help enterprises develop secure APIs faster, often as part of a DevSecOps approach. Developers can now use the service in their IDE of choice, to scan their API contract code for vulnerabilities and also get seamless fix/remediation advice. This helps save the security teams valuable time during reviews later down the line and avoid costly fixes. API testing and security Dale Gardner, Senior Director Analyst, stated in a Hype Cycle™ report that “API attacks have resulted in an endless stream of data breaches and other security incidents, yielding significant damage to organisations and individuals.” He adds, “As a consequence, DevSecOps teams — along with the business leaders whose applications are supported by APIs — are increasingly interested in API testing and security.” Authority comment Isabelle Mauny, the Field CTO and Co-Founder of 42Crunch speaking at the ASC 2022 said, “If enterprises aren’t addressing API security problems during the development workflow and only waiting to deal with them in QA, then it will take longer and cost more to fix these problems. The API Scan from 42Crunch helps security and dev teams reduce the time taken to implement security and accelerate the delivery of new services.”
GlobalPlatform, the standard for secure digital devices and services, will host a Security Evaluation Standard for IoT Platforms (SESIP) methodology seminar in Barcelona on October 19. The full-day seminar explores how the methodology is positioned in the context of European regulations and offers an optimised approach for evaluating the security of connected products that meet the specific compliance, security, privacy, and scalability challenges of the evolving IoT ecosystem. IoT reduces complexity and cost  “SESIP reduces complexity and cost from security certification processes for stakeholders throughout IoT, by mapping different schemes from industry-leading organisations such as ENISA, ETSI, IEC, and NIST,” comments Gil Bernabeu, GlobalPlatform Technical Director. Gil Bernabeu adds, “In Barcelona, GlobalPlatform brings key players from these organisations, as well as individual companies that have benefitted from the methodology, to explore real-life implementations and showcase the business case of SESIP to the entire ecosystem.” SESIP methodology The SESIP methodology also allows for the ‘composition and reuse’ of certified components, so that they can be used to meet the requirements of multiple markets. The seminar will be presented by keynote speakers from CEN/CENELEC, STMicroelectronics, and Winbond and involve live panel discussions and use cases, presented by speakers from Amazon, Arm/PSA Certified, ETSI, ECSO, Eurosmart, Microsoft, and many more. Sponsored by Winbond, STMicroelectronics, and SGS Brightsight, the seminar takes place at the Gran Hotel Havana. It will also be available virtually for those unable to travel. Register for the seminar.
New global research commissioned by Cohesity, a pioneer in next-gen data management, reveals that half of the respondents in the United Kingdom say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. In some cases, this technology is more than 20 years old and was designed long before the current multi-cloud era and an onslaught of sophisticated cyberattacks plaguing enterprises globally.  Cyber attack efficiency  Challenges to outdated infrastructure could easily be compounded by the fact that many IT and security teams don’t seem to have a plan in place to mobilise if and when a cyber attack occurs. More than 6 in 10 (62%) respondents in the UK expressed some level of concern that their IT and security teams would be able to mobilise efficiently to respond to the attack. Lack of data management  Cybercriminals are actively preying on outdated infrastructure as it was not built for multi-cloud environments” “IT and security teams should raise the alarm bell if their organisation continues to use antiquated technology to manage and secure their most critical digital asset – their data,” said Brian Spanswick, the Chief Information Security Officer at Cohesity. Brian Spanswick adds, “Cyber criminals are actively preying on this outdated infrastructure as they know it was not built for today’s dispersed, multi-cloud environments, nor was it built to help companies protect and rapidly recover from sophisticated cyberattacks.” Backup and recovery infrastructure that could be archaic  Fifty percent (49.4%) of respondents in the UK said that their organisation relies on primary backup and recovery infrastructure that was designed in, or before, 2010. Among that group, 27 percent claim to utilise technology that was either designed between 2000-2005, or in fact, before the new millennium in the 1990s. Legacy technology Enterprises are utilising this legacy technology even though managing and securing data environments has become much more complex, not just because of the exponential growth in structured and unstructured data, but because of the vast array of locations where that data is stored. In the UK, 38% percent of respondents stated that they store data on-premises, 39% rely on public cloud storage, 50% utilise a private cloud, and 41% have adopted a hybrid model (some respondents are using more than one option). Outdated data infrastructure In 2022, the fact that any organisation is using outdated technology can create massive compliance issues” “In 2022, the fact that any organisation is using technology to manage their data that was designed in the 1990s is frightening given that data can be compromised, exfiltrated, held hostage, and it can create massive compliance issues for organisations,” said Spanswick. “In this survey, we easily found respondents who said their organisations are relying on very outdated data infrastructure, and this raises the question, how many other businesses are in the same situation around the world?”  What keeps IT and SecOps up at night   Respondents in the UK highlighted what they believe would be their biggest barriers to getting their organisation back up and running after a successful ransomware attack. The findings are as follows (respondents were asked to check all that apply):  Integration between IT and security systems (41%); Lack of coordination between IT and Security (37%);   Lack of an automated disaster recovery system (34%);  Lack of and timely detailed alerts (31%) Antiquated backup and recovery systems (29%);  Lack of a recent, clean, immutable copy of data (24%); Improving data visibility Next-gen data management platforms help stay one step ahead of cybercriminals in exfiltrating data” “Both IT decision-makers and SecOps should co-own the cyber resilience outcomes, and this includes an evaluation of all infrastructure used by the NIST framework for data identification, protection, detection, response, and recovery. Also, both teams need to have a comprehensive understanding of the potential attack surface,” said Spanswick. “Next-gen data management platforms can close the technology gap, improve data visibility, help IT and SecOps teams sleep better at night, and stay one step ahead of bad actors who take great delight in exfiltrating data from legacy systems that can’t be recovered.”   About the research April 2022 survey, conducted by Censuswide, of more than 2,000 IT and SecOps professionals (split nearly 50/50 between the two groups) in the United States, the United Kingdom, Australia, and New Zealand. 504 respondents were based in the UK. All respondents play a role in the decision-making process for IT or security within their organisations. 
Enveil, the pioneering Privacy Enhancing Technology company protecting Data in Use, announces the continuation and advancement of its contract to support the Hybrid Space Architecture (HSA) programme. Led by the Defense Innovation Unit (DIU), the programme is tasked with designing and building a network that integrates commercial and government space assets in order to provide global, secure internet connectivity across multiple domains for commercial, civil, and military users, including international partners. Government space assets This contract award will further validate Enveil’s ability to enable critical data to be securely leveraged across network and security boundaries at scale, a foundational component of the programme’s successful advancement and expansion. This contract award will further validate Enveil’s ability to enable critical data Leveraging the power of Privacy Enhancing Technologies (PETs), Enveil’s ZeroReveal® software enables organisations to extract insights, cross-match, search, and analyse data assets at scale without exposing the content of the search itself or compromising the interests and intent of the data users. These capabilities are being woven into the fabric of the HSA to help leverage both commercial and government space assets across diverse orbits to provide secure, assured, and low-latency data communications anywhere on and off Earth. The DIU-led initiative is being executed in collaboration with Air Force Research Laboratory (AFRL) and U.S. Space Force. Machine Learning solutions “We are proud to continue our work alongside DIU and other customer stakeholders to expand mission partner integration and scalability efforts in the space domain,” said Scott Ostrowski, Chief Customer Officer at Enveil, adding “The innovation taking place as part of this project has the potential to shape space communications, the mission landscape of the future, and we believe the interoperability, security, and access enabled through our ZeroReveal capabilities will play a critical role in advancing that effort.” Changing the paradigm of how and where organisations can leverage data to unlock value, Enveil’s decentralised approach allows data to be securely used across organisational, jurisdictional, and security boundaries in ways that were not previously possible. The company’s mission- and business-enabling ZeroReveal Search and ZeroReveal Machine Learning solutions protect data while it’s being used or processed.
ASSA ABLOY, the pioneer in-access solutions unveils a newly redesigned and easier-to-use Learning Experience Platform (LXP) for ASSA ABLOY Academy, the company’s e-learning and in-person training system.  ASSA ABLOY Academy LXP The ASSA ABLOY Academy LXP is designed to educate door and hardware professionals about proper installation techniques, how to identify common issues, maintaining code compliance, and the latest product innovations to help enhance building safety, security, convenience, and performance. The site features a full spectrum of training, from fundamentals through intermediate courses to advanced level learning. The all-new Academy LXP offers several new unique features to enhance the learning experience. Smart learning AI In addition, content searching by profession, subject, or brand makes browsing courses easy The LXP is hub-like, where the vast selection of e-learning, in-person and virtual instructor-led training, continuing education courses, and webinars are housed in a centralised environment. In addition, content searching by profession, subject, or brand makes browsing courses easy. The LXP also incorporates “smart learning” AI to inform users of related courses or suggested learning paths targeted at specific job functions. This makes it easier than ever to ensure their companies and employees are taking full advantage of the LXP’s rich learning opportunities.  Customised training modules  “The beauty of this learning system is that customers can use the tool as if it was their own,” says Mark Brewer, AHC, PSP, Director, Learning Experience Platform Administration, ASSA ABLOY Opening Solutions Americas. Mark Brewer adds, “Customers, whether they are locksmiths, architects/design professionals, system integrators, or in the contract hardware/wholesale business, can create customised training modules for their employees to continue their development and improve their skill level as part of a company’s career path management.”  Monitoring progress and completion  Once an employee registers for an account in the LXP, their email address will be automatically matched to the employer’s account. The employee’s manager can then assign training courses for their specific track and level as well as monitor progress and completion. Employees can monitor their own progress using a custom dashboard for career path management. It displays timelines of activities and achievements at-a-glance. Simple and easy  “As the door security industry continually advances, with new solutions and innovative products coming online all the time, it is critical for industry professionals to invest in training for their employees,” said Mark Brewer, adding “ASSA ABLOY Academy is a simple and easy way to accomplish that.” 
Camden Door Controls is supporting the launch of its innovative CX-EPD1289L preload strike with a new ‘5 Things You Need To Know’ promotional video. This latest video in the successful “5 Things You Need To Know” series succinctly explains preload and demonstrates how the 1289L strike works with preload in contrast to how other competitive RIM strikes fail. Highlights and benefits  The objective of Camden’s “5 Things” videos is to give viewers an inside perspective of its products. The five topics covered in this newest video highlight the features and benefits of the 1289L Grade 1 surface mount RIM strike with latch monitoring. It also offers a ‘Universal’ strike design that delivers unparalleled application flexibility, with UL security and fire listings. 5 Things You Need To Know The 1st Surface Mount Preload RIM Strike in the Market Pressure on the keepers of the strike, known as preload, is the number one reason that RIM strikes fail to operate Pressure on the keepers of the strike, known as preload, is the number one reason that RIM strikes fail to operate. Preload can be caused by differences in air pressure on each side of the door, a misaligned door, or simply someone pushing on the door before the strike is unlocked. Regardless of the cause, Camden’s 1289L RIM strike will operate where other strikes fail. A Patented New RIM Strike Design Camden CX-EPD1289L RIM strikes have a patented design that enables them to operate with up to 15lbs of preload pressure. The video puts that capability to the test! One Universal Model There’s no need to stock a range of RIM strike models – Camden offers one universal RIM strike that includes security and fire ratings, field configured latch monitoring, selectable fail-safe, fail-secure operation, and dual voltage.  Metal Template Included Installing this RIM strike is quick and easy and a metal marking template is included in the package. Backed by Camden’s No-Hassle 5-Year Warranty Like all Camden strikes, the new 1289L RIM strike is backed by Camden’s exclusive five-year no-hassle product warranty.
XONA, the frictionless user access platform purpose-built for critical infrastructure, and Nozomi Networks, the pioneer in OT & IoT security, announces a partnership to help operators of critical infrastructure accelerate digital transformation with enhanced security and Zero Trust principles. By integrating their technologies, XONA and Nozomi Networks give organisations advanced tools to remotely manage the security of operational technology and industrial control systems from anywhere, and on any device. Quickly evolving environment “Critical infrastructure across the world is under increasing threat and must be modernised to realise the benefits of digital transformation. Like many other industries, there are a myriad of reasons forcing industrial facilities to adopt new technology – from the cost and business efficiencies they bring, to meeting the needs of a highly-skilled workforce that’s often stretched too thin,” said Bill Moore, Founder and CEO at XONA. Critical infrastructure across the world is under increasing threat and must be modernised” Bill Moore adds, “Nozomi Networks has been leading the way in OT and IoT security for years, and bringing our technologies together will provide new dimensions of security and accessibility that our customers need to stay ahead in a quickly evolving environment.” Securing remote access Nozomi Networks solutions support more than 74 million devices in thousands of installations across energy, manufacturing, mining, transportation, utilities, building automation, smart cities and critical infrastructure. Its best-in-class hardware, software and cloud-based OT, ICS and IoT security and visibility products automate the complex work of inventorying, visualising and monitoring industrial control networks through the innovative use of artificial intelligence. With pre-integrated and tested solutions that reduce time to market and increase value, combining Nozomi Networks and XONA technology addresses the complex challenge of securing remote access in critical infrastructures. Comprehensive network visibility is automated, therefore enabling network administrators to balance priorities in a more efficient manner while ensuring the utmost protection with granular security. Accessing critical infrastructure A big part of helping organisations modernise their critical infrastructure is enabling user access” “A big part of helping organisations modernise their critical infrastructure is enabling user access from anywhere, on any device. It’s essential for any business in the twenty-first century, and industrial facilities are no different,” said Chet Namboodri, Senior Vice President of Partner Alliances at Nozomi Networks. “Adding user access to critical infrastructure is not easy – it’s usually too costly and complex, or vulnerable to attack. But XONA has figured out how to make user access frictionless and secure. Integrating our technologies together provides immense value to our joint customers.” Multi-factor authentication Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and Zero Trust architecture immediately eliminates common attack vectors, while giving authorised users seamless and secure control of operational technology from any location or device. With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust. For more information and to attend a live webinar on Wednesday, September 21, 2022, to learn how the combined XONA and Nozomi Networks solution can benefit users’ organisations.
Invicti Security, an application security pioneer for over 15 years, releases a new white paper: ‘Automated Application Security Testing for Faster Development,’ from independent industry analyst firm Enterprise Strategy Group (ESG). The report covers how Invicti customers are cost-effectively incorporating security into their development processes to secure their applications. Organisations have been challenged in adapting their application security strategies and solutions as they undergo digital transformation for faster development cycles. As organisations migrate workloads to the Cloud, they speed up development but also increase the risk of security vulnerabilities as application development and security teams clash on priorities. Application security strategies With the move to the cloud, organisations need a seamless solution that gives them protection In fact, an earlier ESG study found that 48% of developers push vulnerable code in order to meet deadlines. Traditional application security solutions haven’t worked well to scale with modern development because they are costly to deploy and manage, they raise too many alerts and false positives, and they don’t work in modern development workflows. The report describes how: With the move to the Cloud, organisations need a seamless solution that gives them protection and coverage for all of their applications, not just certain business-critical applications. Otherwise, simple coding mistakes can leave them vulnerable to attacks that could compromise company or customer data. A television service network serving 26 million viewers has deployed Invicti to help them deliver secure applications on time, enabling them to innovate while protecting information collected online, particularly the personally identifiable information (PII) of viewers and staff, as well as its own company data and intellectual property. A global travel and vacations company uses Invicti to cost-effectively automate security testing for applications across its portfolio of companies, enabling developers to fix security issues within their workflows. Invicti customers also reported time and cost savings with fewer security incidents and teams working more efficiently with security integrated with developer workflows. Seamless security solutions Adding security as an afterthought to this process is proven to create points of exposure for organisations” “With the increasing speed of development, companies need fast, seamless security solutions that integrate extremely well with developer workflows and tools, so they can bridge the gap between developer and security team priorities and needs,” said Sonali Shah, Chief Product Officer at Invicti. She adds, “Dynamic application security testing (DAST) is the best-positioned tool to reduce the risk of pushing out vulnerable web applications without burdening developer teams or slowing them down.” “The development lifecycle is an intricate process that requires many pieces and technologies to be successful. Adding security as an afterthought to this process is proven to create points of exposure for organisations,” said Melinda Marks, Senior Analyst at ESG, adding “With Invicti’s approach to application security, security experts can help developers infuse secure practices into their development processes so that security enables innovation instead of slowing things down or blocking it.”
Armour Comms is launching its new Configuration Management System at the International Cyber Expo, being held at London Olympia, on 27 and 28 September, 2022. The new solution is part of Armour’s award-winning secure communications flagship platform, Armour Mobile, and will enable organisations to securely manage risk associated with communications data transmitted over Armour Mobile, even on an unmanaged Bring-Your-Own-Device (BYOD) or locally purchased devices. Controlling data on devices David Holman, the Director at Armour Comms, stated: “The use of BYOD devices has long been an issue for many organisations, and is particularly pertinent in sectors that require data protection, such as defence, government, finance, legal and healthcare. However, people do not like their personal devices to be subjected to corporate Mobile Device Management (MDM) solutions and organisations are concerned about the legal issues of controlling data on devices not owned by them. The Armour Mobile Configuration Management System successfully addresses this conundrum.” The Armour Mobile Configuration Management System successfully addresses this conundrum” Armour Mobile Configuration Management (CMS) provides authorised administrators with complete control over data held within the Armour ecosystem on the device. This means that the end user can continue to use their phone as they would normally, while all sensitive communications are safely stored within the application’s ‘container’, without the need for a Mobile Device Management (MDM) system. Providing additional security Data held in the Armour container can only be accessed by the end user via the Armour Mobile app (i.e. it is not accessible to other applications, such as the device’s photo gallery). Advanced features of Armour Mobile CMS include message retention limits where messages and any attachments are deleted automatically when the retention limit is reached– which minimises risk of loss of organisational data and aids internal audit and compliance. This integrates fully with Armour Mobile’s existing ‘Message Burn’ feature, providing additional security and flexibility. CMS also provides remote wipe, whereby Armour data is wiped from a user’s device without the need to physically access the device – critical for when people leave the organisation or lose their device.
Security Essen is also an important platform for start-ups. Here, they present their new products and services to an international audience and have the opportunity to make promising business contacts and networks. The German Federal Ministry of Economics and Climate Protection (BMWK) promotes the participation of young innovative companies in selected leading international trade fairs in Germany. For example, the BMWK also supports a joint stand at the leading trade fair for civil security. Young innovative companies exhibit At Security Essen, eleven young companies from Germany will present themselves in Hall 5 (booth number 5C29.1 to 5C29.22) from September 20 to 23, 2022. Represented are 7systems GmbH, Balzwerk UG, Connecting Media, Corevas, Hart Armour, Minova Technology, Nubicon, PP Bau, Safe2Home, Security Robotics as well as smartloxx. Below are some exhibitors in more detail: Minova Technology GmbH Small devices offer a smart option for tracking and live tracking for bins, machines, or smaller shipments  Minova Technology GmbH from Rottweil has smart tracking and tracing systems in its portfolio. Whether bins, containers, equipment, machines, vehicles, or smaller shipments, the small devices offer a smart option for tracking and live tracking. Even factors critical to the goods, such as temperature or humidity, can be monitored and tracked with them. KW Sicherheitstechnik With BMAcloud, KW Sicherheitstechnik makes it possible to maintain hazard detection systems in compliance with standards with just one technician. Usually, this requires two technicians, but digital processes allow this lean way of manufacturer-independent maintenance of all VdS-certified fire alarm systems. Nubicon A future-proof software for time recording and access control systems was the reason for founding nubicon. The cloud-based solution can be operated flexibly via any browser on any Internet-capable device, is simple and intuitive in its user guidance, and is reliable and secure. Hart Armour The new Safe4Live carrying system from Hart Armour protects against ammunition such as AK47 and SS109 as well as against knife wounds. At the same time, it is particularly quick to don and easy to carry. Corevas EmergencyEye is already being used not only as an emergency call device, but also in the energy, gas, and water For emergency communications, Corevas has developed its EmergencyEye software. The solution can be easily installed on a smartphone and, in addition to video recordings of what is happening on site, also enables photo documentation, chat, location, and reporting. EmergencyEye is already being used not only as an emergency call device but also in the energy, gas, and water industries, chemical groups, and logistics and service companies. ConnectingMedia With its Security Audit, ConnectingMedia enables its customers to make informed decisions for the company and thus actively protect it. The Security Audit provides an objective view of the current state of IT security. Using the Pentest Engine, real hackers perform standardised and semi-automated tests in the customer’s network.
Award-winning risk management company DeterTech, formerly known as The SmartWater Group, is pleased to reveal its new identity, publicly shown for the first time at Security Essen 2022 on Stand 5C31. The new brand, and its associated purpose, value, and behaviours, reflects the full breadth of the company’s offering, as it embarks upon a geographic expansion of the business. “I’m proud to lead an organisation whose purpose is to bring greater peace of mind to people and communities, every day,” explains Baba Devani, CEO, DeterTech, adding “Our values of commitment, inclusivity, and ambition will guide us in developing new services and solutions, attracting top talent, and entering new markets.” Most appropriate solutions With operations in the UK and mainland Europe, DeterTech works with hundreds of clients spanning critical infrastructure, construction, retail, leisure and hospitality, transportation, and industry. Its close working relationships with local law enforcement, and full portfolio of expert, innovative and intelligence-led solutions, ensure it can help clients to better understand their risks and select the most appropriate solutions to mitigate them. DeterTech works with hundreds of clients spanning critical infrastructure The company’s comprehensive risk management portfolio comprises crime intelligence, site security, site sensors, access control, and forensic marking. Notable examples include enhancing the security of world leaders, protecting critical infrastructure, and tackling domestic violence against women and girls. Temporary site security solutions DeterTech is also pleased to announce the acquisition of SmartGuard, the number one provider of temporary site security solutions in Denmark. It follows the previous acquisition of Tag Security Holdings, providing a platform from which DeterTech can immediately emulate its success in the UK, offering its solutions at scale into the Nordics, Benelux, and Germany. “The next chapter in this great company’s story is just being written,” concludes Baba Devani, adding “With the backing of our investors Freshstream we have the expertise, resources, and drive to be a trusted partner to customers across Europe.”
Door access via mobile phone continues growing in popularity. It is no surprise since phones provide an ideal container for digital credentials: secure, convenient, and carried by everyone. Phones easily transact credentials with door readers over an encrypted Bluetooth connection. Mobile access also allows using a phone’s own security lock, such as fingerprint, pattern, etc., to strengthen verification. Such stronger verification can’t be applied to standard cards or tags without also integrating a separate, often expensive biometric reader. Mobile access solutions Idesco ID makes both mobile access and especially credential management much easier. How so? Until recently, mobile access solutions required cloud-based services to manage and send mobile credentials. This forced integrators and installers to use a cloud system separate from and in parallel with their own access control system. By contrast, Idesco ID lets integrators create, send and manage users’ mobile credentials within the site’s existing access control system managing users’ cards and tags. Idesco ID even lets them send mobile credentials to users’ phones directly from that system, without needing to log into a parallel cloud-based system. This also makes Idesco ID mobile access a uniquely economical and environmentally-friendly solution for temporary access rights. No more assigning physical cards or tags to users that only need a couple days of access. Separate enrolment station Users simply send the credential to their phones, saving both time and resources Users simply send the credential to their phones, saving both time and resources. Even better, Idesco ID gives you different ways to use it. Organisations that assign new mobile credentials frequently will find Idesco ID’s continuous Enterprise service an ideal choice. Alternatively, credentials can be sent to phones in a single batch, limiting use of Idesco ID service to a single transfer. Smaller organisations with less users greatly benefit from Idesco ID Entry level. Once users install Idesco ID app on their phones it automatically creates and stores a credential in their phone, that can be read and enrolled into the system later via separate enrolment station device assigned to reception or a building manager, for example. Sending mobile credential Regardless of the scale of the need, Idesco ID keeps credential management within the system – Idesco ID will not become a ‘part’ of their own system. Further, users won’t need to create accounts and share their personal data in the cloud, let alone manage more passwords. They only provide their site with their phone number, and additionally an email address if preferred, for sending their mobile credential. After credentials are sent and registered, phone numbers and email addresses are deleted from Idesco ID service.
Suprema, a pioneer in access control and biometrics, has launched ‘BioStation 3’, a contactless access control terminal specialised for facial recognition in the post-COVID era. BioStation 3 BioStation 3 is a next-generation access control solution created by integrating Suprema’s 20 years of expertise in access control and authentication-related technologies. In addition to facial recognition, the representative contactless authentication method of the post-COVID era, various other contactless credential options are offered to enhance user convenience, including QR codes, barcodes, mobile access cards, and RFID cards. BioStation 3 features increased usability and a compact, slim body that is reduced in size by 47% compared to Suprema’s predecessor, FaceStation F2, allowing for easy installation on any door, from small offices to enterprise environments. Facial authentication Accurate authentication is possible for faces with various types and colours of masks, hairstyles, hats, glasses In addition, Suprema has continued to maintain its position as an industry leader by adopting the most advanced AI processor, a Neural Processing Unit (NPU) to provide the best facial authentication performance available on the market. BioStation 3 is an advanced edge device that can run AI algorithms locally with an embedded NPU to maximise the performance of the AI ​​engine. Accurate authentication is possible even for faces with various types and colours of masks, hairstyles, hats, and glasses. Biometric and personal information protection Moreover, as the importance of biometric and personal information protection is increasing, BioStation 3 is certified with ISO/IEC 27001, an international standard that helps organisations manage the security of their information, and is designed to comply with GDPR, one of the world’s strictest privacy regulations. One of the initiatives in protecting personal data is ‘Face Template on Mobile’, a first in the industry, which is an authentication method independently developed by Suprema that allows users to store and manage their facial authentication template on their mobile phone without having to store it in the company’s database. Access control standard  “BioStation 3 is a product that integrates all of Suprema’s innovative technologies so that everyone around the world can conveniently and safely control and manage all kinds of doors in the post-pandemic world,” said Suprema Inc.’s Chief Executive Officer (CEO) Hanchul Kim, adding “With BioStation 3, Suprema will set a new standard in access control and provide a unique customer experience.”
Public-Private Partnerships On Campus: What You Need To Know
A More Secure Alternative to 125 kHz Proximity Cards
5 ways to strengthen physical security with an integrated system
Anatomy of a False Alarm
Gunshot detection
Camect announces a strategic integration with Netwatch North America to add proactive video monitoring services
Irisity recruits João Paulo Souza as Sales Director CALA
Telaeris’ XPressEntry software now available on IDEMIA Biometric Tablets
Dahua DHI-LPH65/75/86-MT440-C 65/75/86'' UHD Smart Interactive Whiteboard
Hikvision unveils the industry's first "True 8K" NVRs
Climax launches products that adopt SF1 Technology
Follow us
DMA
SourceSecurity.com – Making the world a safer place
Copyright © Notting Hill Media Limited 2000 – 2022, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com
Watch this webinar from Oosto to find out what causes facial recognition false alarms, the impact on your business and how they can be prevented.

source

Post a comment

Your email address will not be published. Required fields are marked *

We use cookies to give you the best experience.