A Smarter Way to Monitor Video - Security Buyer

76
June 2019 www.securitybuyer.com Volume 24 Edition 5 Month 2019 A Smarter Way to Monitor Video Our new ACC™ 7 software introduces Focus of Attention — a cutting-edge user interface for live video monitoring that leverages AI and video analytics technologies to determine what information is important and should be presented to security operators. Product features and functionalities may not yet be available and, if and when available, may not be as depicted. Image and user interface have been simulated for illustrative purposes. © 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER and ACC are trademarks of Avigilon Corporation. See the product demo at IFSEC 2019 – Stand IF1810 | avigilon.com/acc7 | [email protected] Avigilon Control Center (ACC) 7 Software THE GLOBAL SECURITY INDUSTRY'S LEADING SOURCE OF COMMENT, ANALYSIS AND OPINION WOMEN IN TRAINING THE MIDDLE EAST’S NEW BREED OF EXPERTS NATO SUMMIT TOP COUNTER-TERROR OFFICIALS MEET SMART CITIES UPGRADING ISTANBUL AIRPORT’S DEFENCES CYBER SPECIAL THE WHATSAPP HACK, NEW ATTACKS & MORE SECURITY BUYER JUNE 2019 IFSEC SPECIAL WWW.SECURITYBUYER.COM

Transcript of A Smarter Way to Monitor Video - Security Buyer

June 2019

www.security

buyer.c

om

Volume 24 Edition 5 M

onth 2019

A Smarter Way to Monitor Video

Our new ACC™ 7 software introduces Focus of Attention — a cutting-edge user interface for live video monitoring that leverages AI and video analytics technologies to determine what information is important and should be presented to security operators.

Product features and functionalities may not yet be available and, if and when available, may not be as depicted. Image and user interface have been simulated for illustrative purposes.© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER and ACC are trademarks of Avigilon Corporation.

See the product demo at IFSEC 2019 – Stand IF1810 | avigilon.com/acc7 | [email protected]

Avigilon Control Center (ACC) 7 Software

THE GLOBAL SECURITY INDUSTRY'S LEADING SOURCE OF COMMENT, ANALYSIS AND OPINION

WOMEN IN TRAINING THE MIDDLE EAST’S NEW BREED OF EXPERTS

NATO SUMMITTOP COUNTER-TERROR OFFICIALS MEET

SMART CITIES UPGRADING ISTANBUL AIRPORT’S DEFENCES

CYBER SPECIALTHE WHATSAPP HACK, NEW ATTACKS & MORE

SECURITY

BUYER

JUNE 2019 IFSEC SPECIALWWW.SECURITYBUYER.COM

Seagate provides reliable storage solutions for all surveillance environments from edge to cloud with SkyHawk, SkyHawk AI, Exos, and Nytro.

This robust portfolio allows every surveillance application to take advantage of superior software and services, including ImagePerfect, SkyHawk Health Management, Seagate SecureTM, and Rescue Data Recovery Services.

Harness 40 years of data storage innovation for optimal surveillance. Learn more atSeagate.com/Surveillance

SURVEILLANCE

IN FOCUSUnlock data insights with edge to cloud solutions.

SkyHawkTM and SkyHawk AITake your surveillance video and AI stream analytics above and beyond.

ExosTM

Leverage �exibility to scale and secure back-end surveillance storage.

Nytro®

Quickly accelerate surveillance data analytics and deep learning.

VISIT US AT

STAND: IF1240

seagate.com/gb/en/internal-hard-drives/surveillance

TM

01 ISB www.securitybuyer.com

EDITOR’S LETTER

MANAGING DIRECTOR David Rossiter • + 44 (0) 1622 823 937

E-mail: [email protected]

MANAGING EDITOR Chris Maillard • +44 (0) 1622 823 922

E-mail: [email protected]

EDITOR Nigel Walker • +44 (0) 1622 823 922

E-mail: [email protected]

REPORTER Zoe Deighton-Smythe • +44 (0) 1622 823 922

E-mail: [email protected]

DESIGNER Rochelle Mills • +44 (0) 1622 823 922

E-mail: [email protected]

GROUP SALES MANAGER Duncan Armstrong • +44 (0) 1622 823 930

E-mail: [email protected]

ADVERTISEMENT MANAGER Ryan Graves • +44 (0) 1622 823 929

E-mail: [email protected]

OFFICE MANAGER Lauren Mitten • + 44 (0) 1622 823 921

[email protected]

HAND MEDIA U.S.A OFFICE 20F Street NW, Suite 700,

Washington D.C. 20001 U.S.A. Tel : +(1) 202 507 6378

HAND MEDIA HONG KONG OFFICE 2/F, Shui On Centre, 6-8 Harbour Road

Wanchai, HONG KONG Tel : +852 2824 8605

ANNUAL SUBSCRIPTION RATES: UK and Europe £99 Rest of World: £149

SECURITY BUYER is published by: Hand Media International

Goldings, Elphicks Farm, Water Lane, Hunton,

Kent, ME15 0SG, United Kingdom. Tel: +44 (0) 1622 823 924 Fax: +44 (0) 1622 823 933

Email: [email protected] Website: www.securitybuyer.com

REPRINTS: For reprints of specific pages within this magazine please telephone

Lauren Mitten on 01622 823 929 or e-mail [email protected]

465/ISB/ 06/2019The text paper in this publication is printed on PEFC paper

1.5bn WhatsApp users have had a big surprise this month after they discovered that what they thought was a secure communications tool had been hacked by software from an Israeli security company.

NSO, the supplier of Pegasus software used in the attack, have strongly denied that they are responsible for this breach and deny any involvement with the Israeli security services.

This is of little comfort to those users that have now discovered that what they thought was a secure communications app has now been shown it is not what it seems, and they may no longer be able to entrust their utmost secrets to WhatsApp again.

Despite the strong denials from the owners of NSO, Novalpina Capital, they cannot stop who uses its software once it has been sold nor for what ends they wish to use it.

This is not the first high-profile company that this has happened to as companies are always being hacked by cyber criminals, however, this is a highly embarrassing one as the Facebook owned company claims that this is not possible due to its security encryption.

This causes something of a dilemma for both the industry and the general public. Do they wish companies to design and supply software that can be used to spy on them, or to do which it was actually intended for which was to track down terrorists and criminal gangs by the appropriate authorities?

Secondly, what if those same authorities also use the software for track and silence people that they disagree with, or feel that they are an enemy of the state or belong to an organisation critical of that same state or some of its most senior actors.

That is why Novalpina Capital are being taken to court in Israel by an NGO, Amnesty International, which claims it has also been hacked using the very same Pegasus software used in the WhatsApp attack. In court papers submitted in Tel Aviv, they state that 30 members of its organisation in Israel have been the target of attacks using the software.

Meanwhile, in Canada two members of a university also claim that they have also been subjected to an attack using the Pegasus software by unknown actors.

Billions of WhatsApp’s users have been left wondering if they can ever trust the previously secure communication app again after this hack using Pegasus software. Is seems no one is unhackable…

In this edition of Security Buyer we have a special focus on cyber security starting on page 28.

Welcome to the latest issue of Security Buyer

If you’d like to submit relevant news stories for the next issue of Security Buyer please email [email protected]

Twitter: @SecurityBuyerLinkedIn: securitybuyeruae

FOR TODAY’S SECURITY PROFESSIONALSECURITY

BUYER

Nigel Walker, Editor

CONTENTS

Ashraf SheetInfoblox

Tom McAndrew International cyberse

THIS ISSUE’S CONTRIBUTORS

02 ISB www.securitybuyer.com

CONTENTS006 Industry News

All the latest company, Corporate and Defence news from all areas of the global security industry

020 Product Spotlights An in depth look at some of the market’s new and most innovative products.

026 Cover Story What’s App – What happens when a secure communications app is hacked

030 Cyber GCHQ report warns of more than 1, 160 cyber attacks since 2016

038 Smart Cities Dubai Arena – ESF win prestigious project with help from government in UK and Northern Ireland

043 Data Storage SIA Biometrics – SIA honor female biometrics and security leaders at summit

006NEWS

024

Mike Reddington BSIA

Sagit ManoNyotron

CONTENTS

ISB 03

054 Factories Vision Box help to provide border control at Bahrain International Airport

059 Access Control Tools that are equipped to deal with roday’s wide range of threats, from physical to data security

062 People Sagit Manor – Female technology leader joins former President Obama at luncheon

072 What’s On A look at the leading security industry events and

exhibitions held throughout the world

036064

EDITORIAL MISSION STATEMENT:WWInternational Security Buyer Magazine is written for buyers and purchasers within the security industry. It also informs the security industry overall with the latest news, trends and innovative product releases. Readers are also given access to detailed features, interviews and case studies from some of the leading professionals within the global security industry.

www.securitybuyer.com

www.securitybuyer.com

www.security

buyer.c

om

Volume 24 Edition 4 M

ay 2019

THE GLOBAL SECURITY INDUSTRY'S LEADING SOURCE OF COMMENT, ANALYSIS AND OPINION

GOVERNMENT THE BATTLE TO BUILD TRUMP WALL

COUNTER TERROR COSTLY CYBER ATTACKS ON INDUSTRY

SMART CITIES PRAGUE CAMERAS PROTECTING CITY STREETS

TECHNOLOGY AIRCRAFT TECHNOLOGY SPENDING INCREASES

SECURITY

BUYER

The battlefield of the future is in our cities

IGA ISTANBUL AIRPORTA unique travel experience awaits you at #IstanbulAirport. ✈ You can take a meal break among options catering to every taste and enjoy shopping with more than 1,000 domestic and international brands!

DOHA METRO Doha Metro: 13 stations on the Red Line will be open, from Al Wakra in the south to Al Qassar in the north, the Ministry of Transport and Communications had announced on Monday.

@SECURITYBUYERSECURITY BUYER SECURITY BUYER

@BLOOMBERGWhatsApp’s hack shows end-to-end encryption is largely pointless https://bloom.bg/2VAkGV9 via @bopinion

@INFOSECSubscribe to InfoSec News, a free mailing list catering to the distribution of information security news articles - https://www.infosecnews.org/subscribe-to-infosec-news/ … #InfoSec #Security #Privacy #RegTech #FinTech #CyberSecurity #InfoSecJobs #InfoSecNews

@HIKVISIONWatch this video to learn how our Turbo HD X can help to change perimeter protection from passive monitoring to active deterrence, and ensures security staff focus on actual targets for greater efficiency. http://bit.ly/2LzPhNE #RethinkSecurity

ON THE COVER THIS ISSUE

GET IN TOUCH WITH SECURITY BUYER

Connect with us on Linked in, Twitter or Facebook, we look forward to hearing your thoughts and opinions on the latest topic in the industry.

ON THE COVER OF THE JUNE

2019 ISSUE

AVIGILON

SOCIAL

FOR TODAY’S SECURITY PROFESSIONAL

SECURITY

BUYER

04 ISB www.securitybuyer.com

Industry News

Abloy UK has unveiled an innovative new global vision, ‘Abloy - For Trust’ and has

announced a collaboration with Finnish racing icon Valtteri Bottas, to strengthen its renewed brand.

This new vision has seen Abloy revitalise its core brand values and position itself for continued growth in the future. The Abloy branding has also reportedly been refreshed to better represent its modern digital offering.

Valtteri Bottas was identified as the ideal match to embrace and reflect Abloy’s brand values, and a very natural fit for the most valued brand in Finland. Abloy will use the collaboration to promote and reinforce its new vision and values.

Aaron Yule, Managing Director at Abloy UK, said: “Valtteri fits perfectly with the message that we want to convey across global Abloy markets. He and the Abloy brand have many common values and qualities: trustworthy, technological pioneering, innovative, first-class performance and teamwork.”

Valtteri Bottas said: “Success requires attitude, passion and willpower. You must be able to trust people, the power of collaboration, your team, your partners and the world around you. Above all, you must be able to trust yourself. Your ability to make things better.”

Aaron Yule concluded: “A brand must be actively nurtured to continually develop and grow in a positive way. The world around us is changing rapidly - and Abloy are investing and developing new products and technology to meet the current and future needs of the market.

“We are increasingly combining digital and mechanical expertise as we develop comprehensive solutions for our customers, and now is the right time to review and communicate our new brand values and identity.”

Abloy unveils new global vision and elite racer collaboration

Major security issues found in Cisco routers

Google opens Safety Engineering Centre amid ongoing tech security debate

Researchers from the security firm Red Balloon have discovered a remote attack method that could allow hackers

to take over Cisco’s 1001-X series router and compromise all of the data and commands sent through the device.

To compromise the company’s routers, the researchers exploited two vulnerabilities. The first is a bug in Cisco’s IOS operating system which would allow an attacker to gain root access to the devices, though this vulnerability can be fixed through a software patch.

The second vulnerability required the researchers to first gain root access to a Cisco router and from there, they were able to bypass the device’s security protection known as Trust Anchor. The network hardware maker has implemented this security feature in almost all of its enterprise devices since 2013.

Since Red Balloon was able to bypass Trust Anchor on Cisco’s 1001-X series router by using device-specific modifications, it means that similar tactics could potentially be used on hundreds of millions of the company’s

devices around the world including everything from enterprise routers to network switches and even firewalls.

The tactics employed by Red Balloon could even possibly be used to fully compromise networks running on Cisco’s routers which are used by businesses and governments all over the world.

The security firm’s founder and CEO, Ang Cui provided further insight on the remote attack method its researchers discovered, saying:

“We’ve shown that we can quietly and persistently disable the Trust Anchor. That means we can make arbitrary changes to a Cisco router and the Trust Anchor will still report that the device is trustworthy – this is scary because this is in every important Cisco product.”

Cisco responded to the news by announcing a patch for the IOS remote control vulnerability and the company says it will provide fixes for all product families that are potentially vulnerable to secure enclave attacks.

Google CEO, Sundar Pichai has said keeping people safe online is a priority for the tech giant as it opened a safety

engineering centre in Germany. The company has launched its first Google Safety Engineering Centre (GSEC) in Munich, which will work on new tools to improve privacy and security across the firm’s internet services.

In a video message at the centre’s opening, Mr Pichai said: “Last week at I/O, our annual developer conference in California, I shared how we’re working to build a more helpful Google for everyone. Keeping people safe online, and their information private and secure, is a big part of how we do this.

“We believe that privacy and safety must be equally available to everyone in the world, and we bring that to life with products that empower everyone with clear and meaningful choices around their data.”

The centre has been launched alongside a new 10 million euro (£8.7 million) grant for safety organisations in Europe working on ways to keep people safe online.

The launch comes amid on-going criticism of technology companies and their approach to keeping internet users safe. On May 13, a lawyer representing three victims of online sexual abuse told an inquiry that internet firms

including Google were failing to tackle the issue of online abuse.

In April, a Government White Paper on online harms proposed the introduction of a mandatory duty of care for technology and social media companies, which must pledge to protect their users or face punishment from a new independent regulator.

Google’s Vice President of trust and safety, Kristie Canegallo, said the new grant scheme would be open to a range of groups that did not just operate online.

“These organisations might be focused on tackling hate and extremism in their communities, or helping young people stay safe online,” she said. “They’re working on topics that don’t necessarily start when you open a laptop or end when you close one, but where technology can still play a role.”

June

2019

06 ISB www.securitybuyer.com

Hands-on! Code Handle®, the convenient way to keep the public out of:

Archives Important or irreplaceable

documents deserve extra security

Store rooms You can’t always keep your eyes on everyone

in your premises, especially when it’s busy

Toilets If the toilet is for

customer use only, Code Handle keeps

it locked without the hassle of a key

Offices Because not everyone in the office should be

reading what you left on your desk

Drug storage Controlled drugs and other medicines are safely protected by a

secure PIN and handle

Learn more about sharing spaces, not belongings at: campaigns.assaabloyopeningsolutions.eu/codehandle

Hands-off! How do you protect sensitive belongings in public spaces?

AA_CodeHandle_Advert_A4.indd 1 11.04.19 11:52

Industry News

Abloy UK has unveiled an innovative new global vision, ‘Abloy - For Trust’ and has

announced a collaboration with Finnish racing icon Valtteri Bottas, to strengthen its renewed brand.

This new vision has seen Abloy revitalise its core brand values and position itself for continued growth in the future. The Abloy branding has also reportedly been refreshed to better represent its modern digital offering.

Valtteri Bottas was identified as the ideal match to embrace and reflect Abloy’s brand values, and a very natural fit for the most valued brand in Finland. Abloy will use the collaboration to promote and reinforce its new vision and values.

Aaron Yule, Managing Director at Abloy UK, said: “Valtteri fits perfectly with the message that we want to convey across global Abloy markets. He and the Abloy brand have many common values and qualities: trustworthy, technological pioneering, innovative, first-class performance and teamwork.”

Valtteri Bottas said: “Success requires attitude, passion and willpower. You must be able to trust people, the power of collaboration, your team, your partners and the world around you. Above all, you must be able to trust yourself. Your ability to make things better.”

Aaron Yule concluded: “A brand must be actively nurtured to continually develop and grow in a positive way. The world around us is changing rapidly - and Abloy are investing and developing new products and technology to meet the current and future needs of the market.

“We are increasingly combining digital and mechanical expertise as we develop comprehensive solutions for our customers, and now is the right time to review and communicate our new brand values and identity.”

Abloy unveils new global vision and elite racer collaboration

Major security issues found in Cisco routers

Google opens Safety Engineering Centre amid ongoing tech security debate

Researchers from the security firm Red Balloon have discovered a remote attack method that could allow hackers

to take over Cisco’s 1001-X series router and compromise all of the data and commands sent through the device.

To compromise the company’s routers, the researchers exploited two vulnerabilities. The first is a bug in Cisco’s IOS operating system which would allow an attacker to gain root access to the devices, though this vulnerability can be fixed through a software patch.

The second vulnerability required the researchers to first gain root access to a Cisco router and from there, they were able to bypass the device’s security protection known as Trust Anchor. The network hardware maker has implemented this security feature in almost all of its enterprise devices since 2013.

Since Red Balloon was able to bypass Trust Anchor on Cisco’s 1001-X series router by using device-specific modifications, it means that similar tactics could potentially be used on hundreds of millions of the company’s

devices around the world including everything from enterprise routers to network switches and even firewalls.

The tactics employed by Red Balloon could even possibly be used to fully compromise networks running on Cisco’s routers which are used by businesses and governments all over the world.

The security firm’s founder and CEO, Ang Cui provided further insight on the remote attack method its researchers discovered, saying:

“We’ve shown that we can quietly and persistently disable the Trust Anchor. That means we can make arbitrary changes to a Cisco router and the Trust Anchor will still report that the device is trustworthy – this is scary because this is in every important Cisco product.”

Cisco responded to the news by announcing a patch for the IOS remote control vulnerability and the company says it will provide fixes for all product families that are potentially vulnerable to secure enclave attacks.

Google CEO, Sundar Pichai has said keeping people safe online is a priority for the tech giant as it opened a safety

engineering centre in Germany. The company has launched its first Google Safety Engineering Centre (GSEC) in Munich, which will work on new tools to improve privacy and security across the firm’s internet services.

In a video message at the centre’s opening, Mr Pichai said: “Last week at I/O, our annual developer conference in California, I shared how we’re working to build a more helpful Google for everyone. Keeping people safe online, and their information private and secure, is a big part of how we do this.

“We believe that privacy and safety must be equally available to everyone in the world, and we bring that to life with products that empower everyone with clear and meaningful choices around their data.”

The centre has been launched alongside a new 10 million euro (£8.7 million) grant for safety organisations in Europe working on ways to keep people safe online.

The launch comes amid on-going criticism of technology companies and their approach to keeping internet users safe. On May 13, a lawyer representing three victims of online sexual abuse told an inquiry that internet firms

including Google were failing to tackle the issue of online abuse.

In April, a Government White Paper on online harms proposed the introduction of a mandatory duty of care for technology and social media companies, which must pledge to protect their users or face punishment from a new independent regulator.

Google’s Vice President of trust and safety, Kristie Canegallo, said the new grant scheme would be open to a range of groups that did not just operate online.

“These organisations might be focused on tackling hate and extremism in their communities, or helping young people stay safe online,” she said. “They’re working on topics that don’t necessarily start when you open a laptop or end when you close one, but where technology can still play a role.”

June

2019

06 ISB www.securitybuyer.com

Hands-on! Code Handle®, the convenient way to keep the public out of:

Archives Important or irreplaceable

documents deserve extra security

Store rooms You can’t always keep your eyes on everyone

in your premises, especially when it’s busy

Toilets If the toilet is for

customer use only, Code Handle keeps

it locked without the hassle of a key

Offices Because not everyone in the office should be

reading what you left on your desk

Drug storage Controlled drugs and other medicines are safely protected by a

secure PIN and handle

Learn more about sharing spaces, not belongings at: campaigns.assaabloyopeningsolutions.eu/codehandle

Hands-off! How do you protect sensitive belongings in public spaces?

AA_CodeHandle_Advert_A4.indd 1 11.04.19 11:52

Hands-on! Code Handle®, the convenient way to keep the public out of:

Archives Important or irreplaceable

documents deserve extra security

Store rooms You can’t always keep your eyes on everyone

in your premises, especially when it’s busy

Toilets If the toilet is for

customer use only, Code Handle keeps

it locked without the hassle of a key

Offices Because not everyone in the office should be

reading what you left on your desk

Drug storage Controlled drugs and other medicines are safely protected by a

secure PIN and handle

Learn more about sharing spaces, not belongings at: campaigns.assaabloyopeningsolutions.eu/codehandle

Hands-off! How do you protect sensitive belongings in public spaces?

AA_CodeHandle_Advert_A4.indd 1 11.04.19 11:52

Industry News

According to the latest ESET IoT research, D-Link cloud camera DCS-2132L suffers

from multiple security vulnerabilities, which can open the door to unauthorized actors. Based on disclosed information, the manufacturer mitigated some of the reported vulnerabilities, yet others still loom.

“The most serious issue with the D-Link DCS-2132L cloud camera is the unencrypted transmission of the video stream. It runs unencrypted over both connections – between the camera and the cloud and between the cloud and the client-side viewer app – providing fertile ground for ‘man-in-the-middle’ attacks and allowing intruders to spy on victims’ video streams,” described ESET Researcher Milan Fránik, based at the ESET Research Lab in Bratislava.

Another serious issue found with the camera was hidden in the “myDlink services” web browser plug-in. This is one of the forms of the viewer app available to the user; others include mobile apps, which were not part of our research.

The web browser plug-in manages the creation of the TCP tunnel and the live video playback in the client’s browser but is also responsible for forwarding requests for both the video and audio data streams through a tunnel, which listens on a dynamically generated port on localhost.

“The plug-in vulnerability could have had dire consequences for the security of the camera, as it made it possible for the attackers to replace the legitimate firmware with their own rigged or back-doored version,” said Fránik.

ESET has reported all the vulnerabilities found to the manufacturer. Some of the vulnerabilities – primarily in the myDlink plug-in – have since been mitigated and patched via update, yet issues with the unencrypted transmission persist.

ESET research reveals vulnerabilities in door cameras

Synology unveils DiskStation Manager 6.2.2

New security flaw in Intel chips could affect millions

Synology recently released the latest update of DiskStation Manager (DSM) 6.2.2, featuring a series of new

functionalities that not only optimize user navigation but also enhance system performance.

“DSM 6.2 has demonstrated field-proven reliability with over 3.4 million Synology NAS running it. Tailor-made for your IT infrastructure and ready to fit into any environment, DSM 6.2.2 now comes with more granular options that help IT administrators gain better control over the whole system,” said Hewitt Lee, Director of Product Management Group at Synology. “This facilitates business data management with services that more accurately suits your needs.”

Key features include: System optimization: Granular

configurations ensuring consistent performance in production environments are now available in Snapshot Replication, iSCSI Manager, and Synology High Availability. Visit the Release Note to learn more.

Smart Update: Designed to minimize system interruptions, Smart Update detects whether the system would benefit from an

update and decide to install or skip the update based on the system’s running services to achieve the highest system uptime.

Contextual guidance to provide quick resolutions: More information and troubleshooting tips are added to Storage Manager to reduce confusion and human errors as well as guiding users to resolve potential issues, supporting them across different aspects of storage management with a better user experience.

Migration Assistant Beta: The new package allows you to complete whole-system migration including volumes, LUNs, and configurations with ease, minimizing disruptions to existing services and users during a hardware upgrade.

DSM 6.2 and a list of packages for backup, file management and syncing, high availability, video surveillance, central management, and more will receive security updates and important fixes until June 2023. The long-term support ensures that businesses can maintain a stable production environment over a long period of time and be able to plan for the deployment of the next major version in a suitable time frame.

Intel has revealed another hardware security flaw that could affects millions of machines around the world. The bug

is embedded in the architecture of computer hardware, and it can’t be fully fixed.

“With a large enough data sample, time or control of the target system’s behaviour,” the flaw could enable attackers to see data thought to be off-limits, Bryan Jorgensen, Intel’s senior director of product assurance and security, said in a video statement.

But Intel said, on May 14, there’s no evidence of anyone exploiting it outside of a research laboratory. “Doing so successfully in the real world is a complex undertaking,” Jorgensen said.

It’s the latest revelation of a hard-to-fix vulnerability affecting processors that undergird smartphones and personal computers. Two bugs nicknamed Spectre and Meltdown set a panic in the tech industry last year.

Intel said it’s already addressed the problem in its newest chips after working for months with business partners and independent researchers. It’s also released code updates to mitigate the risk in older chips, though it can’t be eliminated entirely without switching to newer chips.

Major tech companies Google, Apple, Amazon and Microsoft all released advisories on May 14 to instruct users of their devices and software, many of which rely on Intel hardware, on how to mitigate the vulnerabilities.

As companies and individual citizens increasingly sign their digital lives over to ‘the cloud’ — an industry term for banks of servers in remote data centres — the digital gates and drawbridges keeping millions of people’s data safe have come under increasing scrutiny.

In many cases, those barriers are located at the level of central processing unit, or CPU — hardware that has traditionally seen little attention from hackers. But last year the processor industry was shaken by news that Spectre and Meltdown could theoretically enable hackers to leapfrog those hardware barriers and steal some of the most securely held data on the computers involved.

Although security experts have debated the seriousness of the flaws, they are onerous and expensive to patch, and new vulnerabilities are discovered regularly.

June

2019

08 ISB

Newsin Brief

360 Vision Technology support Help for Heroes charity

UK CCTV manufacturer, 360 Vision Technology, has recently donated £6,000 to the Help for Heroes charity.

360 Vision Technology handed over an initial cheque to Help for Heroes Area Fundraising Manager for the North West, Trevor Fudger, at the company’s Cheshire based manufacturing facility and headquarters.

Commenting on the donation, Adrian Kirk, Strategic Account Director at 360 Vision Technology said: “When we launched the Invictus Ultra-Low-Light HD PTZ camera, the company decided to make a contribution to the charity based on camera sales, to help support military service people, who in turn, over the years have been a major user of 360 Vision’s video surveillance products.

“Handing over the first cheque was a tremendously proud moment for us all at 360 Vision, and the proudest moment of my career. Some of our staff have family members currently in service, and our Chairman’s father flew Spitfires in World War II, so it felt like a natural fit for us to support serving personnel, veterans and their family members.”

Since Help for Heroes was founded in 2007, it has supported over 21,000 individuals. From welfare advice and psychological support; new career and

fellowship opportunities (for both the wounded and their loved ones), to courses and activities designed to benefit their physical and mental wellbeing. Much of this support is available at the Charity’s four Recovery Centres.

Trevor Fudger, Area Fundraising Manager for the North West said: “When signing up to the Armed Forces, Service personnel make a promise to protect our country. In return, Help for Heroes makes a commitment to support the wounded and their families, whenever they need us.

“To enable us to do that, we need the help of the public and of organisations like 360 Vision Technology, who we can’t thank enough for their generous donation.”

www.securitybuyer.com ISB 03

Industry News

Tatatis doles dolupient estorem. Itam enihiliam laborem qui qui sim fugit fugiatur? Optur?

Ed que reris a porempores rem con consequam eos nat omnias expedis voluptio qui odi illores placess eribus restiam as am num et di am nossuntium, tempos ne culpa vidit, vellandae dicaboreped minvelis dolo el maxim vellaut re expelendione assinci isinvent lamet pore et in re rempe nit earum ipsam vollab in niendanis dolorempores si odistemporia id qui od ex etum none volo quo vendem. Pa velest explatiist facietur? Alis debitatatur, nihil ipictis ciisci commolu ptist, ut impores eum fugia volorro et erumento oditis eos ut resedit haria diae odiant a delesed quo occabo. Nem reperum de dolorporem aut omnis pelessi velecer ibusantio volorem ex eum non cus anis etusam cus eaquam expero doluptatiam eius acestio estem enimin cuptae doluptiur, volor sunt mosa doluptae. Ciet ditati rerestia dere peliam, opta que dolut volorem deliqui arciam, alita vit ium as dolor aliqui beat mos dolo quidis ra necae ni con net dolum aut officium expla et odi dolorescime et aliqui susae excepro temperum facea conseca borehenisi necabor rem. Ur?

Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae

June

July

Heading line 1Heading line 2

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Newsin Breif

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat

liberibus dolo quias dolum aceate velis con n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con

n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex e r s p e r i o n e niasit accae n o n s e n d a m f a c e a r u m eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto alicimi, quide ipicillacit mo minum recto alicimi, quide

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor

aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit

mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum rectouas ex ersperione niasit accae nonsendam facearum eturiatio eumquia

“We tend to focus on the attacks that have

actually happened, rather than those that

haven’t, so it is sometimes easy to

overlook the importance of passenger

surveillance and covert security operations.”

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex

www.securitybuyer.com

News Powered by:

02 ISB ISB 09www.securitybuyer.com

Platinum Tools showcases new Copper Foil Strips during InfoComm

2019

Avigilon expands subscription cloud service platform into Australia and New

Zealand

Platinum Tools have announced that it will feature the recently launched Copper Foil Strips during InfoComm 2019, held in Orlando, from June 12-14 at the Orange County Convention Centre.

The new EMI/RFI shielding strips are available now and are supplied on a removable paper sheet for easy handling – typically used for applications in the electronics industry such as static charge draining, seaming shielded rooms, cable wrapping and surface contact to non-solderable materials.

“Platinum Tools Copper Foil Strips consist of a copper foil backing and conductive adhesive,” explained Lee Sachs, Platinum Tools, LLC president and General Manager. “These copper foil strips work perfectly with all the Platinum Tools Shielded RJ45 Connectors and Shielded Keystone Jacks.”

Avigilon Corporation has announced that Avigilon Blue, its video security as a service platform, is now available in Australia and New Zealand.

Powered by Microsoft Azure, Avigilon Blue is a subscription-managed video security platform featuring self-learning video analytics technology that detects the presence and movement of people and vehicles. The Avigilon Blue platform enables video monitoring providers and integrators to remotely manage and service more customer sites with fewer resources.

“The Avigilon Blue platform is designed to bring Avigilon analytics to virtually any security camera and help our customers simplify monitoring and event verification,” said James Henderson, Avigilon’s president. “We are excited to expand our cloud platform in Australia and New Zealand, bringing added value to our Partners and their customers in the region.”

DE-CIX expands capacities in Frankfurt with maincubes

DE-CIX is expanding its presence in its Frankfurt location and has entered – with immediate effect – into a

cooperation with the data centre operator maincubes. In the heart of the German metropolis and the largest Internet Exchange in the world, a new “DE-CIX Enabled Site” has been created.

This means that maincubes makes its data centre infrastructure available to DE-CIX, which operates its own network infrastructure there, as well as undertaking the management and the marketing. In total, DE-CIX has 32 different locations in the Frankfurt metropolitan area. The long-term goal of the expansion is to serve the strong demand for interconnection services in many German regions, and in this way to get closer to the customers.

“Through the cooperation with maincubes, we are able to strengthen our position as the largest Internet Exchange in the world and offer our customers even greater redundancy. Our aim is not only to expand within Frankfurt,

but to spread out nationwide in Germany, and in this way to be as close as possible to our users,” Dr Thomas King, Chief Technology Officer at DE-CIX, commented on the expansion. “We are pleased about the successful cooperation with maincubes, because we greatly value this German SME as a professional data centre operator.”

“Our partnership with DE-CIX is a significant and important step towards expanding the connectivity of our data centres. In this way, maincubes enables customers to take advantage of colocation services in conjunction with connectivity and cloud services to ensure their successful digital future,” said Albrecht Kraas, CTO at maincubes.

Industry News

Everbridge has received the ISO 27001 certification, the international standard outlining

best practices for information security management systems. Compliance with this standard demonstrates Everbridge’s global commitment to a repeatable, continuously improving, risk-based security program.

The company’s information security management system was inspected by Coalfire ISO, a certification body for management systems accredited through the ANSI-ASQ National Accreditation Board (ANAB).

The Everbridge suite of products that are ISO-certified include Mass Notification, Safety Connection, Crisis Management, Visual Command Centre, IT Alerting, SMARTweather and ThreatView, and Everbridge’s mobile apps, both in the United States and Europe.

Established by the International Organization for Standardization (ISO), the standard requires the certification of an organization’s information security management controls for areas such as data security and business continuity. The certification extends to every level of an organization’s IT infrastructure stack, including asset management, access control, human resource security, and application security.

“The primary job of Everbridge’s security team is to create products and services that are resilient and assured. In doing so, we can be sure that our business operations are equally secure,” said Scott Burnett, Senior Vice President of Operations, Everbridge. “We’ve invested in the rigorous ISO 27001 certification process to provide additional transparency to our customers and to demonstrate the highest standards for safeguarding data.”

“Leveraging the ISO framework for our security implementation has provided Everbridge with a common language as we continue to deploy controls and procedures throughout our organization,” added Burnett. “With our ISO 27001 certification, we’re demonstrating to our customers that we have applied appropriate controls throughout both

Everbridge achieves ISO 27001 certification

Milestone Systems appoints new Vice President for Research & Development

67% of breached UK organisations lack support from executive leadership for cloud security initiatives

Milestone Systems has announced Tom Bjerre as its new Vice President for Research & Development. He will

oversee planning, development, testing and release of Milestone Systems’ video management software, and supervise employees located in Copenhagen, Barcelona and Sofia.

One of Tom Bjerre’s primary tasks will be to ensure the return on investment by Milestone Systems to increase its development capacity by 45%, that will reinforce the company’s ability to create unique innovations to meet market demand for smart solutions.

The investment encompasses development capacity in deep-driver device integration, advanced video rendering, IoT and metadata sources, online services, advanced data management and the platform Software Development Kit (SDK).

Tom Bjerre is well experienced from working in platform-based and market-disrupting companies, bringing the perfect mindset to Milestone Systems.

“I believe that the power of platform economy and platform business model is a game-changer,” said Bjerre. “Milestone Systems’ open platform enables partners to reach customers, with Milestone Systems as the orchestrator of the platform.

“This makes innovations available to buyers through enabling the industry to build intelligent solutions together and expand their reach. I’m excited to take this open platform approach to the next level.”

“Tom Bjerre is a great match for Milestone Systems’ values and culture and has the required skills that the job requires in terms of agile management and ability to collaborate across teams and within the wider leadership group,” says Chief Technology Officer Bjørn Skou Eilertsen, Milestone Systems.

Tom Bjerre will be playing a significant role in executing on Milestone Systems’ cloud strategy, which will offer hybrid solutions combining on-premise and cloud solutions to fit customers’ needs and levels of market maturity.

Netwrix, a vendor of information security and governance software, has announced the release of its global

2019 Cloud Data Security Report. It offers an in-depth analysis of the challenges faced by organisations that store data in the cloud.

The report is based on the feedback of 749 organisations of various sizes located around the world. Respondents shared their experience in storing data in the cloud, their top concerns about securing that data and their plans for storing sensitive data in the cloud in the future.

The report reveals the following key findings for the UK:

While nearly half (49%) of organisations store personally identifiable information (PII) in the cloud, 43% of organisations would never store payment or financial data there. The most common drivers for moving PII to the cloud were to cut costs (50%) and to make the data available for remote workers (41%).

25% of organisations that store customer data in the cloud had at least one security incident during the preceding 12 months. However, among organisations that store customer PII in the cloud but did not classify all their data, 68% experienced a security incident.

75% of organisations were not able to determine the threat actor behind a security incident.

85% of breached organisations said that their cloud security budget did not increase in 2019, and 67% of them stated that their executive leadership teams don’t support their cloud security initiatives.

55% of the organisations are not going to do anything to strengthen their data security in the cloud, and half of those that are taking action will limit themselves to improving employee training.

“Organisations still have very little visibility into what customer data they have and who has access to it. Lack of executive support hampers implementation of a security strategy, leaving organisations vulnerable to security threats.

“Data discovery and classification will help organisations focus their security efforts on truly important data and choose appropriate controls within their limited IT budgets,” said Matt Middleton-Leal, EMEA and APAC General Manager at Netwrix.

June

2019

010 ISB www.securitybuyer.com

Industry News

Everbridge has received the ISO 27001 certification, the international standard outlining

best practices for information security management systems. Compliance with this standard demonstrates Everbridge’s global commitment to a repeatable, continuously improving, risk-based security program.

The company’s information security management system was inspected by Coalfire ISO, a certification body for management systems accredited through the ANSI-ASQ National Accreditation Board (ANAB).

The Everbridge suite of products that are ISO-certified include Mass Notification, Safety Connection, Crisis Management, Visual Command Centre, IT Alerting, SMARTweather and ThreatView, and Everbridge’s mobile apps, both in the United States and Europe.

Established by the International Organization for Standardization (ISO), the standard requires the certification of an organization’s information security management controls for areas such as data security and business continuity. The certification extends to every level of an organization’s IT infrastructure stack, including asset management, access control, human resource security, and application security.

“The primary job of Everbridge’s security team is to create products and services that are resilient and assured. In doing so, we can be sure that our business operations are equally secure,” said Scott Burnett, Senior Vice President of Operations, Everbridge. “We’ve invested in the rigorous ISO 27001 certification process to provide additional transparency to our customers and to demonstrate the highest standards for safeguarding data.”

“Leveraging the ISO framework for our security implementation has provided Everbridge with a common language as we continue to deploy controls and procedures throughout our organization,” added Burnett. “With our ISO 27001 certification, we’re demonstrating to our customers that we have applied appropriate controls throughout both

Everbridge achieves ISO 27001 certification

Milestone Systems appoints new Vice President for Research & Development

67% of breached UK organisations lack support from executive leadership for cloud security initiatives

Milestone Systems has announced Tom Bjerre as its new Vice President for Research & Development. He will

oversee planning, development, testing and release of Milestone Systems’ video management software, and supervise employees located in Copenhagen, Barcelona and Sofia.

One of Tom Bjerre’s primary tasks will be to ensure the return on investment by Milestone Systems to increase its development capacity by 45%, that will reinforce the company’s ability to create unique innovations to meet market demand for smart solutions.

The investment encompasses development capacity in deep-driver device integration, advanced video rendering, IoT and metadata sources, online services, advanced data management and the platform Software Development Kit (SDK).

Tom Bjerre is well experienced from working in platform-based and market-disrupting companies, bringing the perfect mindset to Milestone Systems.

“I believe that the power of platform economy and platform business model is a game-changer,” said Bjerre. “Milestone Systems’ open platform enables partners to reach customers, with Milestone Systems as the orchestrator of the platform.

“This makes innovations available to buyers through enabling the industry to build intelligent solutions together and expand their reach. I’m excited to take this open platform approach to the next level.”

“Tom Bjerre is a great match for Milestone Systems’ values and culture and has the required skills that the job requires in terms of agile management and ability to collaborate across teams and within the wider leadership group,” says Chief Technology Officer Bjørn Skou Eilertsen, Milestone Systems.

Tom Bjerre will be playing a significant role in executing on Milestone Systems’ cloud strategy, which will offer hybrid solutions combining on-premise and cloud solutions to fit customers’ needs and levels of market maturity.

Netwrix, a vendor of information security and governance software, has announced the release of its global

2019 Cloud Data Security Report. It offers an in-depth analysis of the challenges faced by organisations that store data in the cloud.

The report is based on the feedback of 749 organisations of various sizes located around the world. Respondents shared their experience in storing data in the cloud, their top concerns about securing that data and their plans for storing sensitive data in the cloud in the future.

The report reveals the following key findings for the UK:

While nearly half (49%) of organisations store personally identifiable information (PII) in the cloud, 43% of organisations would never store payment or financial data there. The most common drivers for moving PII to the cloud were to cut costs (50%) and to make the data available for remote workers (41%).

25% of organisations that store customer data in the cloud had at least one security incident during the preceding 12 months. However, among organisations that store customer PII in the cloud but did not classify all their data, 68% experienced a security incident.

75% of organisations were not able to determine the threat actor behind a security incident.

85% of breached organisations said that their cloud security budget did not increase in 2019, and 67% of them stated that their executive leadership teams don’t support their cloud security initiatives.

55% of the organisations are not going to do anything to strengthen their data security in the cloud, and half of those that are taking action will limit themselves to improving employee training.

“Organisations still have very little visibility into what customer data they have and who has access to it. Lack of executive support hampers implementation of a security strategy, leaving organisations vulnerable to security threats.

“Data discovery and classification will help organisations focus their security efforts on truly important data and choose appropriate controls within their limited IT budgets,” said Matt Middleton-Leal, EMEA and APAC General Manager at Netwrix.

June

2019

010 ISB www.securitybuyer.com

Newsin Brief

Egress delivers GDPR compliance to the Benelux market

www.securitybuyer.com ISB 03

Industry News

Tatatis doles dolupient estorem. Itam enihiliam laborem qui qui sim fugit fugiatur? Optur?

Ed que reris a porempores rem con consequam eos nat omnias expedis voluptio qui odi illores placess eribus restiam as am num et di am nossuntium, tempos ne culpa vidit, vellandae dicaboreped minvelis dolo el maxim vellaut re expelendione assinci isinvent lamet pore et in re rempe nit earum ipsam vollab in niendanis dolorempores si odistemporia id qui od ex etum none volo quo vendem. Pa velest explatiist facietur? Alis debitatatur, nihil ipictis ciisci commolu ptist, ut impores eum fugia volorro et erumento oditis eos ut resedit haria diae odiant a delesed quo occabo. Nem reperum de dolorporem aut omnis pelessi velecer ibusantio volorem ex eum non cus anis etusam cus eaquam expero doluptatiam eius acestio estem enimin cuptae doluptiur, volor sunt mosa doluptae. Ciet ditati rerestia dere peliam, opta que dolut volorem deliqui arciam, alita vit ium as dolor aliqui beat mos dolo quidis ra necae ni con net dolum aut officium expla et odi dolorescime et aliqui susae excepro temperum facea conseca borehenisi necabor rem. Ur?

Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae

June

July

Heading line 1Heading line 2

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Newsin Breif

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat

liberibus dolo quias dolum aceate velis con n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con

n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex e r s p e r i o n e niasit accae n o n s e n d a m f a c e a r u m eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto alicimi, quide ipicillacit mo minum recto alicimi, quide

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor

aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit

mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum rectouas ex ersperione niasit accae nonsendam facearum eturiatio eumquia

“We tend to focus on the attacks that have

actually happened, rather than those that

haven’t, so it is sometimes easy to

overlook the importance of passenger

surveillance and covert security operations.”

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex

www.securitybuyer.com

News Powered by:

02 ISB ISB 011www.securitybuyer.com

Centrify appoints Mark Oldemeyer as chief financial officer

Centrify, has announced the appointment of Mark Oldemeyer as its new Chief Financial Officer (CFO).

Oldemeyer steps into the role previously held by current Centrify CEO, Tim Steinkopf, and will be responsible for all finance, accounting, facilities, and human resources functions at Centrify.

“Centrify is laser-focused on executing our growth plan in one of the fastest-growing infosecurity markets, Privileged Access Management,” said Steinkopf.

“Having an industry veteran with Mark’s experience on board to help lead our company during this next growth phase is incredibly valuable, especially as we look to expand our offerings through targeted acquisitions as well.”

Oldemeyer has more than 20 years of financial management and operational experience, focused primarily within the software industry.

Travelers just see an airport.

You see reliable safety and security innovations for a world on the move.Bosch empowers you to build a safer and more secure world. With an integrated portfolio designed to protect people and assets, no matter where they are, or where they go to. Find out more at boschsecurity.com

Medium Security Buyer, Issue June (27.05.2019) SAP No. Color mode 4c / ISO coated v2 (ECI)

Size (W x H) 190 x 130 mm (+ 3 mm) Language EN Notes PDF-Standard: PDF/X-4:2010

Egress has announced its official launch into the Benelux market. The company has selected Amsterdam as the

location of its mainland Europe headquarters due to the city’s reputation for technical innovation and access to an ecosystem of top data security specialists.

“Egress’ success over the past five years has been underpinned by our market-leading security tools that have helped customers in the UK and North America mitigate the considerable compliance and data security risks associated with sharing sensitive data,” Egress CEO Tony Pepper said.

“Inevitably, as we continue to grow and expand, we find ourselves working with enterprises across mainland Europe, something that has been accelerated by the introduction of GDPR 12 months ago.

“For industries such as government, financial services, healthcare and professional services, there is increasing pressure to comply with data privacy and security regulations, whilst managing a heightened security threat.

“As part of this expansion, it was hugely important that we selected the right location

to drive our European growth. With its investment in technology and the innovation community it is fostering, Amsterdam represents the ideal centre for this,” concluded Pepper.

With 95% of C-level IT professionals concerned about insider threats, staff causing data breaches both intentionally and unintentionally pose a significant risk to organisations. Recognising this, Egress has developed an intelligent, people-centric data security platform that uses machine learning to understand the potential risk of a data breach in order to apply the necessary levels of security to shared information.

In addition, powerful auditing and reporting capabilities enable business administrators to identify and report on data shared across their email networks to ensure compliance with GDPR.

As a result, Egress experienced significant growth in 2018, increasing new SaaS subscriptions by 64%, with a 93% renewal rate—demonstrating the loyalty of the company’s customer base, and the strength and trust in its people-centric platform.

Industry News

VuWall has announced that its full product portfolio, along with dedicated local service

and support, is now available in more locations via Mindstec Distribution. With this partnership, VuWall expands for the first time with global distribution in Asia, the Middle East, and Brazil.

“Mindstec is a well-established global AV distributor with regional expertise and exceptional service that provides immense value to customers,” said Valentina Zarivchatska, VuWall’s director of business development in Central and Eastern Europe, APAC, and LATAM. “This partnership will enhance our brand awareness worldwide and bring VuWall solutions to new markets. We’re excited to partner with a company reputable for representing the highest quality solutions in the industry.”

Mindstec will demonstrate VuWall’s product portfolio of video wall solutions in each of the showrooms at its main offices located in United Arab Emirates, India, Singapore, and Hong Kong. This will allow integrators and end users to experience VuWall capabilities first-hand.

Certified by VuWall, Mindstec dedicated personnel will be able to offer first line of support as well as training to system integrators at any of the distributor’s global offices. VuWall will also have a dedicated presence at Mindstec booths at industry events, including InfoComm SEA in Bangkok, InfoComm China, and InfoComm India. The booth will feature a video wall optimized with VuWall’s modular and scalable solutions.

“The heart of what we do is to provide our customers with access to proven and trusted AV solutions that will help grow their businesses,” said Syed Wahab, CEO of Mindstec Distribution. “As AV and IT continue to converge, our portfolio of IP-based products delivers the most comprehensive offering available in the market. With solutions designed for ease of deployment, use, and management, VuWall is a perfect addition to our broadening portfolio.”

VuWall expands into new territories with Mindstec Distribution Partnership

ExtraHop announces new Panorama Partner Program to accelerate enterprise security modernization

The MOBOTIX Innovation Summit DACH 2019

ExtraHop has announced the new ExtraHop Panorama Partner Program. The Panorama Program is designed to

enable global channel partners to accelerate the adoption and integration of network traffic analysis (NTA) to help enterprise customers modernize their security operations.

Fueled by 10x growth in cybersecurity, ExtraHop is expanding its global channel program, working with global reseller, distribution, managed services, and integration partners with deep domain expertise in security. The new Panorama Partner Program supports these channel partners with industry-leading accreditation that provides the foundational knowledge and tools to accelerate integration of NTA into security operations.

The accreditation program also offers partner sales engineers a deeper technical view of the ExtraHop solution including demos, key use cases and competitive differentiation. In addition to partner accreditation, the new partner portal provides easy access to just-in-time (JIT) sales and training materials that help ExtraHop partners rapidly identify use cases and fast-track solutions for their customers.

The Panorama Partner Program also makes it easier than ever for channel partners to pair ExtraHop with industry leading technology solutions. Through the program, partners can leverage the robust integrations offered by ExtraHop with products including ServiceNow, IBM QRadar, and Splunk to provide their enterprise customers with full detection, investigation, and remediation capabilities.

Through the CPPO program, ExtraHop brings together sophisticated analytics, machine learning and threat investigation capabilities from Reveal, world-class security services and program development from channel partners to deliver best of breed cybersecurity for AWS customers. ExtraHop partners with leading organizations around the globe including Allentis, AppCentrix, Epicon, GuidePoint Security, KedronUK, Kite, Macnica, Miel, Optiv Security, Presidio and Trace3.

“As the demand for ExtraHop Reveal continues to expand, we look to the leading channel partners to support our rapid growth around the world,” said Mark Fitzmaurice, Vice President of Global Channel Sales, ExtraHop.

Conquering new markets together’ was the motto of the MOBOTIX Innovation Summit DACH 2019 held in Langmeil

(located in the German state of Rhineland-Palatinate). The main topic was the opening of new market opportunities through a global network of partnerships and technology alliances.

More than 150 participants from Germany, Austria and Switzerland learned about trends in the global markets for cyber security as well as the latest, market ready MOBOTIX innovations. In addition, participants were given thorough insight into the MOBOTIX community and networking opportunities throughout Europe and beyond.

One of the highlights at the Innovation Summit was a glimpse into the near future. At the end of the year, MOBOTIX plans to launch a camera platform developed together with Konica Minolta that is tailored to deep learning methods.

This platform forms the basis for the market solutions developed jointly by MOBOTIX and its technology partners, and at the same time provides access to global distribution. The prototype shown at the event and the planned functions and features reportedly impressed and enthused the visitors.

“MOBOTIX is undergoing a transformation process whereby we are evolving from a product manufacturer to a full-service provider of cyber security solutions based on our strong German DNA,” explained Thomas Lausten, CEO of MOBOTIX, at the conference.

MOBOTIX will also build off of strategic alliances, the expansion of technology and solution partnerships and a comprehensive range of intelligent end-to-end solutions for existing and new vertical markets. “The focus is on decentralized intelligence that ensures that tomorrow’s CCTV monitoring is very different from what we see today,” said Lausten.

In the new Partner Society, MOBOTIX will work closely with its global partners to develop cybersafe and decentralized, energy-efficient systems, thereby creating greater added value. “The key factors here are ensuring trust, innovation and reliability in an increasingly diverse and permanently changing market,” emphasized Lausten.

In addition, the Partner Society will create new opportunities for business growth through a one stop shop with intelligent, cyber-safe video technologies.

June

2019

012 ISB

Newsin Brief

Barix extends paging to mobile recipients with launch of paging cloud

Barix have announced Paging Cloud, a software-as-a-service (SaaS) solution that brings paging into the

smartphone-enabled mobile era. Integrating easily with almost all existing

paging and public address systems, Paging Cloud records paging messages and sends them directly to registered smartphones, enabling visitors in environments such as schools, museums and airports to hear announcements or emergency information on their own mobile devices.

Paging Cloud customers can page directly to mobile phones through their existing in-venue paging solutions, enabling them to reliably reach people who might not clearly hear the announcements over the facility’s public address (PA) system.

The service is ideal for delivering emergency alerts and event updates to visitors in public spaces; school students and teachers wherever they are on campus; and even volunteer firefighters at their homes. It also provides an easy solution for delivering less-critical pages such as conference session start time reminders or informing parents at home of school schedule updates caused by weather.

“Particularly in emergency situations, it is critical to make sure that everyone gets the

message, but background noise or gaps in speaker coverage can cause people to miss PA announcements,” said Reto Brader, CEO, Barix.

“By extending the paging to mobile phones, all subscribed end-users will receive all pages made by local staff as voice recordings on their smartphone wherever they are and can listen to them as many times as necessary to understand the information. For example, no matter where a visitor is within a sprawling zoo, you can reach him or her with an alert about an escaped animal and instruct them to proceed to the nearest exit.”

“Paging Cloud is simple to use for both administrators and recipients,” added Brader. “Combined with its ease of integration and affordability, any venue can ensure its visitors never miss an announcement again.”

www.securitybuyer.com ISB 03

Industry News

Tatatis doles dolupient estorem. Itam enihiliam laborem qui qui sim fugit fugiatur? Optur?

Ed que reris a porempores rem con consequam eos nat omnias expedis voluptio qui odi illores placess eribus restiam as am num et di am nossuntium, tempos ne culpa vidit, vellandae dicaboreped minvelis dolo el maxim vellaut re expelendione assinci isinvent lamet pore et in re rempe nit earum ipsam vollab in niendanis dolorempores si odistemporia id qui od ex etum none volo quo vendem. Pa velest explatiist facietur? Alis debitatatur, nihil ipictis ciisci commolu ptist, ut impores eum fugia volorro et erumento oditis eos ut resedit haria diae odiant a delesed quo occabo. Nem reperum de dolorporem aut omnis pelessi velecer ibusantio volorem ex eum non cus anis etusam cus eaquam expero doluptatiam eius acestio estem enimin cuptae doluptiur, volor sunt mosa doluptae. Ciet ditati rerestia dere peliam, opta que dolut volorem deliqui arciam, alita vit ium as dolor aliqui beat mos dolo quidis ra necae ni con net dolum aut officium expla et odi dolorescime et aliqui susae excepro temperum facea conseca borehenisi necabor rem. Ur?

Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae

June

July

Heading line 1Heading line 2

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Newsin Breif

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat

liberibus dolo quias dolum aceate velis con n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con

n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex e r s p e r i o n e niasit accae n o n s e n d a m f a c e a r u m eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto alicimi, quide ipicillacit mo minum recto alicimi, quide

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor

aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit

mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum rectouas ex ersperione niasit accae nonsendam facearum eturiatio eumquia

“We tend to focus on the attacks that have

actually happened, rather than those that

haven’t, so it is sometimes easy to

overlook the importance of passenger

surveillance and covert security operations.”

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex

www.securitybuyer.com

News Powered by:

02 ISB ISB 013www.securitybuyer.com

Kings Secure Technologies appoints new Head of Strategic Accounts

Security expert appointed to champion British cyber firms overseas

Kings Secure Technologies is pleased to announce the promotion of Damian Sutton as its new Head of Strategic Accounts.

In his new role, Damian will be managing and setting the direction for the relationship with some of Kings Secure Technologies’ biggest, and most high-profile, Fire & Security customers.

Of Damian’s promotion, Kings’ Chief Commercial Officer, Tim Goodwill said: “Damian’s wealth of knowledge and broad expertise will be of great benefit to our customers and our close partnerships with them.”

“I am thrilled to work within a company that recognises my contributions and I will continue to endorse the Kings difference within organisations who can benefit from our innovative approaches and outstanding customer service,” said Damian.

The Department for International Trade announced late April the appointment of Dr Henry Pearson as the UK’s new Cyber Security Ambassador.

The role brings together a dedicated person in government with subject matter expertise and cyber security experience. In this role, Pearson will work closely with UK businesses seeking to secure major international contracts with overseas governments and central banks that are looking to bolster their cyber defences against potential cyber threats.

International Trade Secretary Dr Liam Fox said, “Henry’s appointment will be instrumental in ensuring our world leading firms are able to compete on the global stage and our cutting-edge technology is the first port of call for overseas government’s looking to secure their critical national infrastructure.”

Surveon NVR7800 provides stable platform for water treatment plant in Malaysia

The Malaysia government water treatment plant possesses vision to provide the best Water Treatment Plant

with demand of high security protection in industry sector. Therefore, the high reliable platform with flexibility to expand storage by year by budget becomes important criterions to select surveillance partner.

Surveon NVR7816 ensures high video image quality with high throughput capability in additional to flexible JBOD storage expansion capability become the best candidate for the surveillance ecosystem.

The series is designed as a recording server with an archiving function that offers the advantages compared to traditional system structures composed of recording server plus a separate storage device, making it becomes the top choice for the water treatment plant.

The NVR7800 Series delivers a high level of recording throughput of nearly 2000 Mbps,

supporting recording with more channels, allowing system to receive better video image quality by higher bitrates, and ensuring smooth transmission even with high frame rate.

Support up to 316 drives with high density 4U 60-bay expansion enclosure (maximum capacity of up to 3.6 PB with 10TB HDD). It supports to expand storage through JBOD by year, by timeline, by budget with best flexibility. This provides the government owned plant to expand facilities by year by timeline by budget.

“The hybrid server-storage design of NVR7800 Series gives us the best C/P value candidate. The enterprise level RAID engine enables highest level data protection with RAID 1+Spare, 5+Spare, 6+Spare technology to support robust data protection even with HDD error,” said the administration manager of the water treatment plant.

Industry News

Santander will let customers use voice recognition technology instead of security numbers to

prove their identities when using telephone banking.

Customers using the voice recognition service will need to call Santander’s telephone banking from their mobile and repeat a short phrase.

The voice will then be analysed by biometric voice recognition software to make sure it belongs to the right customer – and Santander says it’s so sophisticated it won’t be fooled by a recording of the customer’s voice.

Santander is the latest bank to introduce voice recognition security checks, already used by Bank of Scotland, Barclays, First Direct, HSBC, Halifax and Lloyds. It is currently rolling out the service and will be available for customers to use by June.

When customers activate the service, they’ll be asked to repeat a short phrase several times to create a ‘voice print.’

And when they call in future, they’ll be asked to repeat the same phrase so the technology can compare it with the original voice print.

The service also uses phone ID technology to check that customers are calling from a phone that is only registered to them, for example, their mobile rather than a shared landline.

Customers who don’t want to use the voice recognition tool can carry on using their current security checks for telephone banking.

Reza Attar-Zadeh, Head of Customer Interactions at Santander, said: “The human voice contains over 100 voice characteristics we can use to ensure that a caller is who they say they are, further protecting our customers’ accounts from fraudsters.”

Santander launches voice recognition security checks

Tenable expands partnership with ServiceNow to improve vulnerability and remediation

Record level of vulnerabilities sparks cybersecurity innovation among global enterprises

Tenable has announced its enhanced integration with ServiceNow to help shared customers improve their

vulnerability prioritization and remediation programs by addressing one of the most difficult challenges in cybersecurity — vulnerability overload.

Prioritizing vulnerabilities with the Common Vulnerability Scoring System (CVSS) presents significant limitations since it scores the majority as ‘high’ or ‘critical.’ Tenable recently released Vulnerability Priority Ratings (VPR) as part of Predictive Prioritization to help organizations focus remediation on the three percent of vulnerabilities that are most likely to be exploited.

Now, Tenable is bringing VPR to ServiceNow Security Operations. For the first time, security and IT teams can use VPR scores to view, sort and filter the remediation priority of each flaw based on the risk it poses to the business.

The latest integration also enables customers to sync their vulnerability data 400% faster by ingesting multiple Tenable vulnerability data streams simultaneously —

rather than individually — into ServiceNow Vulnerability Response and the ServiceNow CMDB.

“These enhanced integrations are putting the three percent of vulnerabilities that pose the most imminent threat to the business into the hands of the IT teams so that they can focus on remediating what matters most,” said Ray Komar, vice president of technical alliances, Tenable.

The integration introduces a single integration app for both Tenable.io and Tenable.sc (formerly Security Centre), providing a seamless user experience and interface for customers who leverage the flexible deployment options of the Tenable Cyber Exposure platform.

“Together, ServiceNow and Tenable offer customers rich context around the business impact and security risk of vulnerabilities, so they can work smarter by focusing on patching the vulnerabilities that have the highest potential impact,” said Sean Convery, General Manager of ServiceNow’s security business.

Dimension Data has revealed exclusive findings from its Executive Guide to NTT Security’s 2019 Global Threat

Intelligence Report concerning the cybersecurity maturity of organisations across a number of markets and sectors.

Globally, the average cybersecurity maturity rating stands at a worrying 1.45 out of 5 – a score determined by an organisation’s holistic approach to cybersecurity from a process, metrics and strategic perspective. This comes during a time when security vulnerabilities have also surged to a record high (up 12.5% from 2017).

The finance (1.71) and technology (1.66) sectors boast the highest maturity ratings and are continuing to ramp up their security posture, most likely prompted by their unenviable positions as the most commonly targeted industries, each accounting for 17% of all attacks recorded in 2018.

Scouring trillions of logs and billions of attacks, the research also revealed the most common attack types, with web attacks the most prevalent threat, doubling in frequency since 2017 and accounting for 32% of all

attacks detected last year. Reconnaissance (16%) was the next most common hostile activity, closely followed by service-specific attacks (13%) and brute-force attacks (12%).

Mark Thomas, VP, Cybersecurity at Dimension Data, said: “There’s clearly work to be done across all sectors in order to establish more robust security postures. However, it’s reassuring to see many C-suite leaders recognising the importance of making more strategic investments to improve their cybersecurity defences.

“There have been some exciting developments in the predictive threat intelligence space, with new levels of collaboration and buy-in across the cybersecurity value chain. What’s more, the most-targeted industries are also the most likely to seek assistance to evolve their strategies and build their security programmes. This bodes well for companies looking to reach their desired cyber-maturity state.”

Other highlights from the research included 35% of attacks originating globally from IP addresses within the US and China, followed by EMEA and APAC as well as cryptojacking representing a significant amount of hostile activity, hitting the technology and education sectors hardest.

June

2019

014 ISB www.securitybuyer.com

DIC579PANTONE2945CC100 / M60

K100

P40723_Optex_40th_297x10_v7.indd 1 13/05/2019 10:58

DIC579PANTONE2945CC100 / M60

K100

P40723_Optex_40th_297x10_v7.indd 1 13/05/2019 10:58

Defence News

Israel Shipyards has unveiled its new multi-purpose Offshore Patrol Vessel, OPV-45, at IMDEX ASIA

2019. The OPV-45 is designed for a wide range of Naval, paramilitary and HLS missions, and can carry a variety of payloads according to mission requirements.

OPV-45 provides open sea patrol and surveillance as well as a wide verity of off-shore missions such as protecting facilities and EEZ, anti-terror/smuggling/illegal activities’ interdiction, intervention forces’ boarding/landing, and close-range Naval combat operations, including anti-piracy missions and enhanced search and rescue operations.

The OPV-45 can also be equipped for minimizing illegal immigration transits, fishing protection & control and anti-pollution activities. Installed with advanced weapon stations, electro-optics, radar and communication systems suitable for various missions, the OPV-45 has an overall length of 45.7m, a sustained speed of above 24 knots, and a command bridge enabling 360° observation. For missions requiring high speed interception, the OPV-45 can carry a Rigid-Hull Inflatable Boat (RHIB) of 7.20m.

The RHIB can quickly, easily and crane-free be launched or retrieved into and out of water, while the vessel is on the move. The OPV-45’s work deck is large enough to carry up to two 20ft containers equipped for various missions, which enables diversified and flexible operational options. The OPV-45 accommodates a crew of 16-24, plus an additional space for up to 24 people for missions involving Special Forces, search and rescue survivors, castaways, etc.

“The OPV-45 is an important addition to Israel Shipyards’ portfolio, offering the most cost-effective solution of its kind in the market today”, said Eitan Zucker, the company’s CEO. “The OPV-45 is another example of our ability to foresee and comply the market’s needs.”

Israel Shipyards to unveil its new offshore patrol vessel

Indra awarded contract by MoD for advanced deployable radar

Parliamentary report recommends building support ships in UK

Indra, a global technology and consulting company, has been awarded a contract to supply the Royal Air Force of the United

Kingdom with an advanced long-range air defence deployable radar

The company was chosen after competing with the main companies in the industry. Indra will deliver the system later this year, meeting tight deadlines.

The Indra LTR25 L-band radar stands out for offering very high long-range detection capabilities, comparable to those of larger fixed radars, but with the added advantage of being able to operate very quickly and be transported in small aircraft, such as the C130.

It is a robust solution designed to facilitate deployments outside the national territory, to reinforce the surveillance of a specific area on a one-off basis or to be available as backup in the event that one of the fixed radars is attacked or damaged. Indra is a leading company in the development of radars and one of the main suppliers of this type of solutions for NATO.

All radar systems in the Indra family are tri-dimensional, solid state, operate in L band, apply pencil beam exploration (electronic control in elevation of radiation beams), with distributed architecture, redundant in critical elements, allowing for soft-fail degradation in the case of certain items failure.

The company has won all the tenders awarded by the Alliance in the last five years. Its systems also cover surveillance of the whole south-western flank of Europe.

Indra has delivered over 50 radars in total to countries from five continents, so the capabilities of its teams have been widely demonstrated in all types of scenarios and environments. The company also has experience in the supply of integrated air defence systems for a number of countries.

The ‘All Party’ Parliamentary Group for Shipbuilding and Ship Repair has launched a report on the National

Shipbuilding StrategyThe report states that the industry is already

facing significant redundancies as the aircraft carrier programme runs down, with the subsequent loss of leading-edge skills. Once lost, these skills cannot be quickly regained and the UK’s sovereign capability to produce complex warships will suffer accordingly, as will the UK’s ability to project naval power.

The APPG states that “it is the responsibility of the Government to ensure the Royal Navy receives its equipment from a leading-edge supply chain and support structure and is therefore able to maintain its operational advantage.”

The report further calls on the Government to factor in revenue returned to the Treasury when scoring bids between domestic suppliers and foreign competitors and to acknowledge that many foreign shipyards receive both direct and indirect state subsidies.

The report also states that the Royal Navy depends on support ships operated by the Royal Fleet Auxiliary (RFA) during deployments. Royal Fleet Auxiliary Solid Support Ships are designed to carry a wide range of stores to support other ships in the

fleet including munitions, fuel and supplies. To maintain a sovereign naval capability,

consisting of all types of ships, building vessels operated by the RFA is crucial for the retention of skills needed for future warship production. Despite this, the National Shipbuilding Strategy states that only Royal Navy destroyers, frigates and aircraft carriers will continue to have a UK-owned design and be built and integrated in the UK.

As such, the Government has decided to open the procurement process for three new Fleet Solid Support (FSS) ships out to international competition with Navantia, a Spanish state-owned shipbuilding company, considered the frontrunner.

Despite concerns raised in Parliament and by trade unions, the Government has no plans to issue any further definitions for the purposes of the National Shipbuilding Strategy. Research conducted by GMB shows that ‘warships of all kinds’ are not subject to compulsory competitive tendering.

June

2019

016 ISB www.securitybuyer.com

Newsin Brief

HENSOLDT launches Kalaetron RWR to protect aircraft from radar-guided weapons

Hensoldt, the independent sensor house, is introducing the new radar warning system ‘Kalaetron RWR’

(Radar Warning Receiver) onto the market, which revolutionises the protection of aircraft and helicopters from radar-guided weapons.

Hensoldt is a pioneer of technology and innovation in the area of defence and security electronics, specialising in civilian and military sensor solutions. The company’s new product will be presented to the public for the first time at the Electronic Warfare Europe Conference in Stockholm.

“With the help of the latest artificial intelligence and digital signal processing methods, our Kalaetron RWR detects radar-based threats early and reliably,” explained Celia Pelaz, Head of the Spectrum Dominance/Airborne Solutions Division.

“Our new product thus increases the assertiveness of aircraft and helicopters and their survivability, especially in view of the increasingly dense signal spectrum and the growing threat posed by highly integrated air

defence systems.”Due to its fully digital design, the new radar

warner detects and identifies threats incredibly quickly and with a very low false alarm rate, over an extremely wide frequency range. The Kalaetron RWR uses artificial intelligence (AI) techniques to detect new threat patterns from a huge amount of collected raw data.

This is especially important to identify the latest air defence radar systems that cover an extremely wide bandwidth, or which hop between particular frequencies in fractions of a second. Kalaetron thus enables fighter or transport aircraft to be protected even against upcoming anti-aircraft weapons and integrated air defence systems, while also offering great potential for adaptability to cope with future threats.

www.securitybuyer.com ISB 03

Industry News

Tatatis doles dolupient estorem. Itam enihiliam laborem qui qui sim fugit fugiatur? Optur?

Ed que reris a porempores rem con consequam eos nat omnias expedis voluptio qui odi illores placess eribus restiam as am num et di am nossuntium, tempos ne culpa vidit, vellandae dicaboreped minvelis dolo el maxim vellaut re expelendione assinci isinvent lamet pore et in re rempe nit earum ipsam vollab in niendanis dolorempores si odistemporia id qui od ex etum none volo quo vendem. Pa velest explatiist facietur? Alis debitatatur, nihil ipictis ciisci commolu ptist, ut impores eum fugia volorro et erumento oditis eos ut resedit haria diae odiant a delesed quo occabo. Nem reperum de dolorporem aut omnis pelessi velecer ibusantio volorem ex eum non cus anis etusam cus eaquam expero doluptatiam eius acestio estem enimin cuptae doluptiur, volor sunt mosa doluptae. Ciet ditati rerestia dere peliam, opta que dolut volorem deliqui arciam, alita vit ium as dolor aliqui beat mos dolo quidis ra necae ni con net dolum aut officium expla et odi dolorescime et aliqui susae excepro temperum facea conseca borehenisi necabor rem. Ur?

Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae

June

July

Heading line 1Heading line 2

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Newsin Breif

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat

liberibus dolo quias dolum aceate velis con n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con

n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex e r s p e r i o n e niasit accae n o n s e n d a m f a c e a r u m eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto alicimi, quide ipicillacit mo minum recto alicimi, quide

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor

aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit

mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum rectouas ex ersperione niasit accae nonsendam facearum eturiatio eumquia

“We tend to focus on the attacks that have

actually happened, rather than those that

haven’t, so it is sometimes easy to

overlook the importance of passenger

surveillance and covert security operations.”

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex

www.securitybuyer.com

News Powered by:

02 ISB ISB 017www.securitybuyer.com

British Chinooks exercise with Estonian Troops in Mali

Cybersecurity demand grows C4I market say analysts

1310 Flight Chinook aircraft have been conducting exercises with a Malian based Estonian Army detachment.

The Chinook helicopter detachment has been conducting an air mobility exercise with the Estonian Army Force Protection platoon which provides part of the guard force for the airfield.

The Estonian platoon commander said: “The exercise gave the Estonians the opportunity to board and deplane from the Chinook in operational conditions and also experience a short flight in the aircraft.

“We aim to train as we would fight so this is an excellent opportunity to practice what we could be called upon to do.”

The Chinooks are in Mali with the primary purpose of transporting French personnel to the forward operating bases as the French military conduct a changeover of troops.

The C4I market direction will reportedly be driven by contemporary defence concerns such as cyberspace and the progressive mainstreaming of new innovations in technology.

While older systems are receiving sustainment services, manufacturers are also working on the next generation of systems. Forecast International projects the C4I market to be worth at least US$75.93 billion over the 2019-2028 timeframe.

“Nations face an evolving array of cyber-based threats arising from a variety of sources,” said Richard Sterk, Senior Analyst of Forecast International’s yearly analysis.

“As more and more network breaches occur with data stolen or corrupted – and the realization that the system has been compromised for quite some time. One can expect an ever-increasing amount of funding to be pumped into cyberspace, specifically cybersecurity, across a wide spectrum of countries.”

Dynetics to build 100 kW laser for US Army

The US Army’s Space and Missile Defence Command has selected a Dynetics-led team to develop an

experimental 100 kW laser weapon system for its Family of Medium Tactical Vehicles (FMTV).

On May 15, the company announced that it had beat out Raytheon to receive a USD130 million contract for the service’s High Energy Laser Tactical Vehicle Demonstrator (HEL TVD) programme.

“High energy laser weapons have been a system that the United States has wanted to add into their defence portfolio since the invention of the laser,” Ronnie Chronister, Dynetics’ senior vice-president of contracts, said in a press release. “We are glad to be selected to build this new and safe weapon system that will provide a simple, yet cost-effective approach in theatre.”

In 2018, the army selected Dynetics and its partners - Lockheed Martin, Rolls-Royce, and MZA Associates Corporation - and Raytheon to move into the HEL TVD preliminary design phase.

Under the new contract, the Dynetics team is selected to prepare for the critical design review, which will determine the final laser design, before building the system and integrating it onto a 6×6 FMTV for field

testing at White Sands Missile Range in New Mexico. The capability is also a potential technology insertion to address the army’s Indirect Fire Protection Capability Increment 2 - Intercept Block 2 objective requirements.

This effort is part of the service’s latest venture into directed-energy weapons and is designed to help the service counter rocket, artillery, and mortar (RAM) attacks, as well as unmanned aircraft systems (UASs).

“The project researches advanced technologies for HEL weapon systems to enable more efficient laser systems with greater power output, which in-turn enables future laser weapons on smaller vehicles for additional missions,” the army wrote in fiscal year 2020 (FY 2020) budget request documents.

Defence News

Specialist insurer Beazley has created a marine cyber insurance product to meet the

rapidly developing needs of vessel owners and operators.

Should a cyber incident impact a vessel’s operational capability, “Beazley Cyber Defence for Marine” provides insurance for physical damage and loss of hire.

At the heart of the product are risk management services designed to reduce the likelihood of a cyber incident occurring and demonstrate compliance with forthcoming International Maritime Organization (IMO) guidelines. By January 1, 2021, vessel owners and operators must have incorporated measures to manage cyber risk into their existing risk management processes, which have traditionally focused on the physical risks to safe shipping operations.

There are three elements to the risk management services included within Beazley’s product: a self-assessment questionnaire; a cyber security workshop; and an on-board cyber survey.

The product has been launched at a time when operational technology has become more digitalized, said Beazley. New challenges have also arisen out of greater interconnectivity between shore-based and on-board systems, including those responsible for navigation, propulsion and power control. A breach of an operating system on board a vessel could, for example, lead to a grounding or collision.

The cover, which focuses on the operational technology of vessels, complements Beazley’s other marine products and existing cyber cover for information technology systems. It can be bought on a standalone basis or as part of a package.

“Shipowners and operators are dealing with the increased threat of cyber-attack as well as the impact of human error and increasingly interlinked vessel operating technology and IT systems,” said Richard Young, Beazley’s head of hull and war.

Beazley launches marine cyber coverage

New Dreadnought submarine revealed as Defence Secretary praises 50 years of nuclear service

E-7 Wedgetail buy to include second-hand aircraft

The Defence Secretary announced the fourth Dreadnought submarine as HMS King George VI ahead of a special

service at Westminster Abbey on May 3 to recognise the Royal Navy’s Continuous at Sea Deterrent (CASD) over the past 50 years.

Since April 1969, a Royal Navy ballistic missile submarine has patrolled every single day, without interruption, providing the nation’s deterrent and helping keep the UK and our allies safe. This is the UK’s longest sustained military operation ever undertaken and is known as Operation Relentless.

Defence Secretary Penny Mordaunt said: “Operation Relentless has seen generations of submariners from HMS Resolution to HMS Vengeance on constant watch, for every minute of every day for the last five decades. This is the longest military operation we have ever undertaken and continues right this minute deep under the sea.

“We pay tribute to those incredible crews, their supportive families, the Royal Navy and the thousands of industry experts who will

continue to sustain this truly national endeavour for many years to come.”

CASD50 provides a chance to not only remember the national endeavour of the past half century but to look to the next generation of ballistic missile submarines, the Dreadnought class. This will consist of four boats helping to ensure the security of generations to come. The Dreadnought-class are expected to enter service in the early 2030’s, helping to maintain Operation Relentless.

Prior to the service at Westminster Abbey, First Sea Lord, Admiral Sir Philip Jones, announced that HMS King George VI will now join HMS Dreadnought, Valiant and Warspite as the fourth Dreadnought submarine.

HMS King George VI has made history, becoming the first naval vessel to bear that royal title. King George VI had strong naval connections having spent time at the Royal Naval College, Osbourne followed by Dartmouth.

Two of the five E-7 Wedgetail early warning aircraft will be converted passenger jets. The information came

to light in a letter from the Defence Committee to Government asking questions about the recently finalised £1.5bn deal.

Dr Julian Lewis, chair of the Defence Committee, asked in a letter: “For what reason are you confident that the aircraft will be delivered in four and a half years, when the production line has been closed for five years and historically the minimum time between contract signature and first delivery of these aircraft has been at least six years?”

Stuart Andrew, Minister for Defence Procurement, answered: “The Seattle production line for the 737NG aircraft, which is then modified to become an E-7 AEW&C, is still operating and producing multiple military variants of the 737NG (including the Poseidon P8) for the US, UK and other customers.

“Boeing has sourced two 737NG from the commercial market and secured a further three production slots on this Seattle production line in 2021 and 2022 to meet our needs. The conversion of these five aircraft to the E-7 AEW&C standard will be undertaken at Marshall Aerospace’s facilities in Cambridge.

“Boeing have significant experience of

the conversion from the 737NG to E-7 having previously set up conversion facilities in three separate countries. They have already started work with Marshall Aerospace, bringing in an experienced team who were involved in the previous conversions to ensure lessons have been learnt and are applied.

“Robust project management disciplines are being applied by industry that the Ministry of Defence (MOD) will continually monitor, for example, the MOD has recently visited Marshall Aerospace to assure itself of progress.”

The E-7 Wedgetail Airborne Early Warning and Control (AEW&C) System is able to fly for long periods of time and manage the battlespace from the sky, providing situational awareness and tracking multiple airborne and maritime targets at the same time. It then uses the information it gathers to direct other assets like fighter jets and warships.

June

2019

018 ISB www.securitybuyer.com

Newsin Brief

Digital Defence records 200% growth of their partner channel from prior year

Digital Defence, SaaS security technology provider, has announced over 200% growth of their partner

channel from the prior year by focusing on trends and challenges faced by MSSPs (managed security service providers).

Digital Defence leverages AWS (Amazon Web Services) to provide its solution globally with many MSSPs leveraging the company’s SaaS platform to effectively and seamlessly deliver vulnerability and threat management services to their customers. “Perhaps the biggest challenge of all for MSSPs lies in finding the right technology infrastructure partners,” says Cybersecurity Ventures’ Steve Morgan.

“It’s not just about the technology though. It’s as much about the people,” he added. “We asked Larry Hurtado to join us, in part, because he’s been with Digital Defence since 2002, and CEO there for the past thirteen years. He’s steadily grown the company, which now has more than a hundred employees — with a focus on ensuring success for clients and partners.”

Digital Defence has identified the trends as platform scalability, true multi-tenancy,

solution accuracy, single pane of glass enablement, and service gap-fill. Challenges MSSPs will face in the years to come include, but are not limited, to threat volume and diversity, skilled labour shortage, brand awareness growth and protection.

Emtec, an IT solutions provider and Digital Defence partner, responds to MSSP challenges by helping clients drive transformation and growth by employing the latest technologies and processes to empower their employees, accelerate innovation and deliver amazing client experiences.

Doug Goodall, Managing Director for Emtec stated: “The breadth of the Digital Defence platform capabilities coupled with the incredible ease of management from their consolidated analyst reporting and multi-tenant architecture creates a powerful offering for our clients – and the ability for us to tightly integrate the Digital Defence platform into our complementary monitoring and IDR solution platforms as a comprehensive client solution results in a market leading enterprise IT/IOT cyber risk solution suite.”

www.securitybuyer.com ISB 03

Industry News

Tatatis doles dolupient estorem. Itam enihiliam laborem qui qui sim fugit fugiatur? Optur?

Ed que reris a porempores rem con consequam eos nat omnias expedis voluptio qui odi illores placess eribus restiam as am num et di am nossuntium, tempos ne culpa vidit, vellandae dicaboreped minvelis dolo el maxim vellaut re expelendione assinci isinvent lamet pore et in re rempe nit earum ipsam vollab in niendanis dolorempores si odistemporia id qui od ex etum none volo quo vendem. Pa velest explatiist facietur? Alis debitatatur, nihil ipictis ciisci commolu ptist, ut impores eum fugia volorro et erumento oditis eos ut resedit haria diae odiant a delesed quo occabo. Nem reperum de dolorporem aut omnis pelessi velecer ibusantio volorem ex eum non cus anis etusam cus eaquam expero doluptatiam eius acestio estem enimin cuptae doluptiur, volor sunt mosa doluptae. Ciet ditati rerestia dere peliam, opta que dolut volorem deliqui arciam, alita vit ium as dolor aliqui beat mos dolo quidis ra necae ni con net dolum aut officium expla et odi dolorescime et aliqui susae excepro temperum facea conseca borehenisi necabor rem. Ur?

Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae sitassi totat volenetur?

Ugia corro bereperci sit etur? Pudamen daernatur, officto taepedia ipsam cus.

Laute cus, sandeligeni nonsequodi quamusam nostrum, volendanitat odis esequatem acesti cuptatis sit, volo verro berate vendios el modi aut fuga. Et hariae

June

July

Heading line 1Heading line 2

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Newsin Breif

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat

liberibus dolo quias dolum aceate velis con n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con

n o n s e q u i s s i t voluptam nat maximil ma p e l i g n a t u r e s abor alicimi, quide ipicillacit mo minum recto consequas ex e r s p e r i o n e niasit accae n o n s e n d a m f a c e a r u m eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto alicimi, quide ipicillacit mo minum recto alicimi, quide

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Breif Story Officid ma volenietur suntet doluptate

prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et v Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?

Pit ventur aciust et enim el inctes dolor

aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?

Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.

Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit

mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex ersperione niasit accae nonsendam facearum eturiatio eumquia voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum rectouas ex ersperione niasit accae nonsendam facearum eturiatio eumquia

“We tend to focus on the attacks that have

actually happened, rather than those that

haven’t, so it is sometimes easy to

overlook the importance of passenger

surveillance and covert security operations.”

Heading line 1Heading line 2

Officid ma volenietur suntet doluptate prature eum et fugitem poriam, officatur, aut omnis nus alis quas doloria ntorit labo. Et quam alique voluptia pellut re net alita ped molora ventota temodit, to to opta pelende llabor aboriae od mo diatiamusdam sus, officil labori a non et velenescia arum alit volorit es mod quodit exeribus si omnimusci dolum dolendigenet reheni que sanit aut aut latur, saestiis solupta sperum volum estrund ellitas perspicatur apernatem as escidi amenis magnimus sandem volorenis derit, que vel et et es debit doluptusda dolore cum volessime excepta ssimper iorrovit exerrum fugit lab invendaecus a plam conemperatus evellibus quis ut etur?Pit ventur aciust et enim el inctes dolor aut et es acit, cone volupta turecta vendes pratisq uatem. Eniatur magnatet repe ipsunt ut provit magnihil idite porunt harum rentius aut porescipsam dolorehenim il mo everchil et vera quuntur?Ommoditatque vel ex exerupt umquidusam vel molorem porrum et eveliquiam, que porio. Bo. Nam esequiae conseque sit veribus cum eat.Pis alique ped magnim faciatiorio experiat liberibus dolo quias dolum aceate velis con nonsequissit voluptam nat maximil ma pelignatures abor alicimi, quide ipicillacit mo minum recto consequas ex

www.securitybuyer.com

News Powered by:

02 ISB ISB 019www.securitybuyer.com

Raytheon wins US$159 million contract for training in Europe

Raytheon has won a contract valued at up to US$159 million to support large-scale, live training exercises at the U.S. Army’s Joint Multinational Readiness Centre located in Hohenfels, Germany.

“Raytheon’s technology-enabled training means that location is no longer a restriction to multinational forces training together,” said Bob Williams, vice president of Raytheon Intelligence, Information and Services.

“Data from allied units, located in their home countries, is sent back to Germany allowing leaders to track training from anywhere.”

Raytheon developed the Mobile Instrumentation System technology that enables the distributed training. On the ground at JMRC, Raytheon provides a range of services including training area instrumentation, after action reviews and battlefield effects to increase training realism.

Dallmeier to showcase its security products used to safeguard cargo logistics at transport logistic 2019

“THE COMBINATION OF THE DALLMEIER

VIDEO TECHNOLOGY AND THE

PROPRIETARY, MODULAR PROCESS

MANAGEMENT SOFTWARE WITH A

SENSOR SYSTEM OFFERS LOGISTICS COMPANIES VERY

MANY ADVANTAGES.””

Dallmeier is a global provider of products for network-based video security solutions and plan to showcase their latest innovations in safeguarding cargo logistics through management systems, perimeter protection and SAP standard objects at transport logistic in Munich, 2019

Digitalisation technologies promise great improvements in an enormous variety of logistics processes. German

manufacturer Dallmeier is particularly well positioned for the combination of systems from video technology, sensor systems, data management and intelligent use of elements of AI.

At transport logistic 2019 in Munich, from June 4-7, 2019, Dallmeier will present a broad portfolio of solutions especially for customers in general cargo logistics at Stand 620, Hall A3.

Dallmeier’s customer base also includes the very largest logistics corporations.

Logistics management systems

Dallmeier can look back on more than 35 years of experience in the development of cameras, recording systems and software. Solutions for customers in the logistics sector represent a primary focus of the company’s corporate strategy.

The portfolio includes systems for protecting property, entrance and exit areas, claims management, yard management, and a broad range of logistics management systems from real-time localisation of unit goods up to automatic volume calculation.

A very recent development is their cooperation with the SAP integrator T.CON. The solutions developed jointly by the two companies enable the transmission of a wide variety of valuable business data straight from video systems into SAP ERP systems and address major challenges in the supply chain, HR and compliance area.

SAP standard objects

To date, the cooperation between Dallmeier and T.CON has produced two solutions for the supply chain area: The ‘Digital Gate’ automates vehicle registration and consignment notes management with a self-service portal running on SAP Fiori. The system recognises vehicle classes, registration numbers, ID numbers and hazardous substance categories. Depending on the requirement, the system can be integrated in yard management and hazardous substance handling functions.

The freight data in SAP is supplemented with the optically acquired data using SAP standard objects. Accordingly, it can be integrated directly in SAP TM or LE-TRA (ECC 6.0). The ‘unit good measurement’ solution enable freight items to be measured and weighed automatically by video systems and wireless weighing forks, and the data can be integrated in SAP EWM or WM.

Perimeter protection

The many advantages of this innovation range from the optimal use of load capacities to plausibility checks and up to coordinated warehouse storage and retrieval strategies. For perimeter protection, Dallmeier combines its patented Panomera camera technology with a two-tier object classification system using neural networks.

This places customers in the position of being able to reduce the number of false alarms to practically zero. At the same time, the role of the cameras is changed so not only do they function as a verification system, they can also assume most of the responsibility for incident detection, and consequently fewer systems are needed to guarantee effective perimeter protection.

Optimised vehicle control

The combination of the Dallmeier video technology and the proprietary, modular process management software with a sensor system offers logistics companies very many advantages. Most significant among these are systems for real-time localisation of unit goods, permanently solving the problem of misplaced or lost packages, which in many medium-size firms happens to between five and ten percent of all items handled every day.

With the Dallmeier system, the position of every package is known from the moment it is received until the moment it is shipped. A similar system also enables uninterrupted package tracking for large logistics businesses and privacy-compliant theft investigation among other capabilities. Other solutions on display at the Dallmeier stand are concerned with optimising the efficiency of all kinds of processes, such as improved yard management and optimised vehicle control, for example, through the display of loading levels, automatic gate assignment or even optimised claims management.

PRODUCT SPOTLIGHT

020 ISB www.securitybuyer.com

Matrox Graphics announces advanced Aggregator Mode, high-tech multi-system control with Matrox Extio 3 IP KVM extenders

Matrox Graphics has announced Aggregator Mode, a cutting-edge, multi-system control feature

available with Matrox Extio 3 high-performance IP KVM extenders. Taking Extio 3 IP extension and switching capabilities to a new level, this new mode of operation permits an Extio 3 receiver unit to aggregate multiple video streams coming from different Extio 3 transmitter units.

Multiple computer desktops can then be viewed and controlled simultaneously from an Extio 3 receiver unit—with a single keyboard and mouse. Moving the mouse across a multi-screen desktop of up to four displays shifts control instantly from one computer to the next, providing users with unprecedented operational efficiency. Aggregator Mode is ideal for a wide range of applications including process control, industrial and automation, military and defence, healthcare, broadcast and post-production, and more.

Extio 3 IP KVM extenders

Aggregator Mode will be revealed for the first time at InfoComm 2019, in booth 3055.

Aggregator Mode streamlines user operations by providing a unified view of information coming from different computer systems. Users have the flexibility to define which computer desktop gets mapped to which screen attached to the Extio 3 receiver unit – they can select the video sources from the Extio on-screen-display (OSD), and then create and save layouts through its easy-to-use, drag-and-drop interface.

Aggregator Mode Extio 3’s Aggregator Mode supports computers with multiple video outputs, including independent or stretched desktop mode, while remote user-station setups can be arranged in various configurations such as 4x1, 3x1, 2x1 or 2x2. Guest connections are also available for collaborative environments, where different users can connect to the same source system simultaneously, with or without USB control.

Aggregator Mode is easy to deploy as it is built into Matrox Extio 3 IP KVM extenders, minimising equipment cost and maintenance. It also does not require any additional software to be installed on the source computer system, ensuring that all system certifications remain intact for a truly seamless and simplified KVM installation.

IP KVM extension and switching

“Matrox Extio 3 continues to set the standard for IP KVM extension and switching,” says Caroline Injoyan, business development manager, Matrox Graphics Inc. “In addition to providing industry-leading 4Kp60 and quad 1080p60 4:4:4 performance at unprecedentedly low bitrates, Aggregator Mode provides users with the most efficient workspace. This is

essential in 24/7 environments for example, where operators can now pull and view critical information from multiple system data points to make timely, well-informed decisions. We encourage you to stop by at InfoComm 2019 to witness this first-hand.”

Aggregator Mode will be available as a free Extio 3 firmware and Matrox Extio Central Manager software upgrade in Q4 2019.

Matrox Extio 3 Series cards

Redefining IP KVM extension technology, Matrox Extio 3 Series cards and appliances are capable of providing 4Kp60 4:4:4 or quad 1080p60 4:4:4, desktop-quality video at 5% of the bandwidth required by most other products available in the market today. With exceptional remote performance, smooth video playback, and pristine image quality, Extio 3 Series features the best-in-class resolution support required of professional applications—a DisplayPort 1.2 connector on Extio 3 N3408 IP KVM extenders ensure a maximum resolution of 3840x2160 at 60Hz in true color.

Extio 3 Series also provides flexible configuration options, supporting copper or fiber-optic cabling in point-to-point or networked KVM operations.

Matrox Graphics produces video card components and equipment for personal computers and has recently launched Aggregator Mode with IP KVM extenders – ideal for process control, industrial and automation and military and defence

PRODUCT SPOTLIGHT

ISB 021www.securitybuyer.com

ICS Security Solutions add the new CAM200-A camera and DB101 doorbell to its wireless SMART devices range

“THE CAM200-A CAN BE USED IN THE HOME

ENVIRONMENT OR EXTERNALLY AS IT IS

IP65 RATED AND COMES COMPLETE WITH PANASONIC

18650 RECHARGEABLE BATTERIES AND A 16G

SD CARD IN ALL UNITS”

ICS Security Solutions are established equipment manufacturers who introduced their new CAM200-A and DB101 doorbell at The Security Event in Birmingham earlier this year with pleasing responses for the innovative and secure design

ICS Security Solutions are importers and manufacturers of security equipment with over 50 years of industry knowledge, including over 15

years of on-site installation experience. One of the company’s strengths has come from being a direct importer of the GEM branded locks and accessories, this together with their own manufacturing division gives ICS Security Solutions quality and reliability in the equipment they produce.

The new SMART camera and doorbell design allows the user the flexibility and security to monitor their home or premises with a simple FREE app (no monthly subscription necessary) with push notifications to a choice of devices. In addition, five other users can be added onto the app and three users can view live video simultaneously – allowing ease for families or shared homeowners who require completely secured access control. Unlimited cameras or doorbells can also be synced to the same device.

ICS Security Solutions have taken delivery of the brand-new WI-FI wireless external 1080p HD camera and 720P doorbells. These devices work off the same app enabling them to be simple to use and easy to share with other family members or office personnel.

The Security Event in Birmingham April 2019 was the first-time exhibiting for ICS Security Solutions and was ultimately a perfect opportunity for the company to introduce their newest products in security technology. The CAM200-A camera and DB101 doorbell were first exhibited at The Security Event and were given a very warm reception by all the visitors who saw the devices working with orders placed during the successful three-day event.

CAM-200A Camera

The wireless camera is full 1080p HD 2.0 Mega-Pixels resolution with a 110-degree wide-angle camera. The CAM200-A can be used in the home environment or externally as it is IP65 rated and comes complete with PANASONIC 18650 rechargeable batteries and a 16G SD card in all units. It has a mounting bracket included as well as a two-way audio with noise-cancellation to enable communication via the app to ward off any unsuspecting activity in or around the area.

The advantage of the PIR motion detection is that anyone approaching the property or vehicle will be picked up within a five-metre range and a notification sent to the owners mobile or other device to enable immediate action to prevent further intrusion happening. The camera also has a zoom in option to get to see up close and in more detail to help the police identify the suspect. With its built-in night vision, it smartly switches between day and night mode automatically with high quality IR. With its 30-day recordings that are saved on to your device, you can replay any video recording should you need to go back and view again.

DB101 Doorbell

The DB101 Doorbell comes in both black and white to give the best aesthetically

pleasing look to any front and is just as easy to install as the CAM200-A. The wireless Wi-Fi video doorbell can fit well on commercial or residential entrances and is rechargeable battery powered with IR night vision and unlimited doorbells per device.

As with the camera motion detection, the camera streams an image to mobile devices to alert homeowners of any activity of anyone approaching the door – allowing customers to take action. Homeowners will never miss a parcel delivery with the built-in two-way audio to talk to the driver as they ring the doorbell. With IOS and Android phones being supported through the app as well as it being a DIY install, the DB101 Doorbell is convenient and accessible for anyone and guarantees reliability and assurance for the homeowner away from home.

PRODUCT SPOTLIGHT

022 ISB www.securitybuyer.com

FIRE RATED PRODUCTS

EXIT DEVICES

EXIT DEVICES

ELECTRIC LOCKING

ACCESS CONTROL

AUDIO & VIDEO ENTRY

ADDITIONAL EQUIPMENT

FIRE RATED PRODUCTS

SMART DEVICES

Setting the Standard in Access Control

DOOR UNLOCKS VIA BLUETOOTH FROM YOUR PHONE

FIRE RATED PRODUCTS SMART WIFI WIRELESS VIDEO DOORBELL AND CAMERA

PRODUCTS AVAILABLE NOW FROM ICS SECURITY SOLUTIONS

Bluetooth readers and keypads with free APP - where your phone is your key.

Now available a full range of fire rated products conforming to EN1634:1.

Connect to your mobile via the free App to protect your home from intruders.

UKFIRE TESTED

EN1634:1

ICS Security Solutions Ltd - Setting the Standard in Access ControlUnits 1-2 JBJ Business Park Northampton Road Blisworth Northampton NN7 3DW Telephone: 01604 879300 Facsimile: 01604 859545 Email: [email protected]

2923/ICS/Advert/SettheStandard_a.indd 1 16/05/2019 12:13

FIRE RATED PRODUCTS

EXIT DEVICES

EXIT DEVICES

ELECTRIC LOCKING

ACCESS CONTROL

AUDIO & VIDEO ENTRY

ADDITIONAL EQUIPMENT

FIRE RATED PRODUCTS

SMART DEVICES

Setting the Standard in Access Control

DOOR UNLOCKS VIA BLUETOOTH FROM YOUR PHONE

FIRE RATED PRODUCTS SMART WIFI WIRELESS VIDEO DOORBELL AND CAMERA

PRODUCTS AVAILABLE NOW FROM ICS SECURITY SOLUTIONS

Bluetooth readers and keypads with free APP - where your phone is your key.

Now available a full range of fire rated products conforming to EN1634:1.

Connect to your mobile via the free App to protect your home from intruders.

UKFIRE TESTED

EN1634:1

ICS Security Solutions Ltd - Setting the Standard in Access ControlUnits 1-2 JBJ Business Park Northampton Road Blisworth Northampton NN7 3DW Telephone: 01604 879300 Facsimile: 01604 859545 Email: [email protected]

2923/ICS/Advert/SettheStandard_a.indd 1 16/05/2019 12:13

024 ISB www.securitybuyer.com

COVER STORY

1.5bn users have been advised to update their app in the wake of this attack, and blame has been apportioned to the products of an Israeli cybersecurity outfit, NSO. What happened?

Messaging service WhatsApp is hacked by an advanced cyber actor

The messaging app WhatsApp is just another high-profile casualty of what is something that is becoming a more frequent

occurrence – it’s been hacked.

This is not the first high-profile company that this has happened to as companies are always being hacked by cyber criminals, however, this is the a highly embarrassing one as the Facebook owned company claims that this is not possible due to its security encryption.

On its own website the app claims that security is done by default and that users should not have to worry about such things as being hacked as “encryption means that WhatsApp and third parties can’t read them anyway.”

How did this happen to such a well-known app? This is still under investigation by a number of authorities, including Facebook itself, but one thing that has come out of this is that they are now not immune to such attacks.

It is being claimed in cyber security that this hack was done by a company known as the NSO group based in Israel due to the advanced nature of the attack and the method used to deliver it.

This was done using the company’s flagship Pegasus software which would allow them to turn on the phone’s microphone and camera, look through emails and messages and also collect data from the phone.Users would not even have had to answer the phone to allow this to happen to them whether they had a iPhone or an Android device.

Daniel Follenfant, Senior Manager Penetration Testing, Consulting Services

NTT Security, said: “The hacking of WhatsApp’s messaging service is a classic example of a Buffer overflow attack.

“Buffer overflows aren’t new, but you don’t often see them these days and this attack is particularly clever because it uses this flaw to gain access to a phone without the user even answering.

“In its simplest form Buffer overflows are a way of writing code to an area of the application in memory that will then be executed. The WhatsApp exploitation resonates the classic but more sophisticated buffer flow attack. To carry this out the attacker had to deceive the receiver by making a call and then send the sending packets of data during the process of the call; once the packet transfers are complete, the packet execution forces WhatsApp’s internal buffer to overflow, overwriting the app’s security and allowing surveillance capability on encrypted chat,

eavesdrop on calls and microphone and control the camera.

“There is nothing you can do about this; it is a design flaw and WhatsApp has quickly addressed the problem by releasing a patch for applications already running and the new versions do not appear to be susceptible.

“Our advice to users is to check that you are not running a susceptible application by checking the version number running “The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15. If you are unable to locate the version or are worried then backup your messages, completely remove WhatsApp and reinstall from the latest version on the relevant App Store.

“THE HACKING OF WHATSAPP’S MESSAGING SERVICE IS A CLASSIC EXAMPLE OF A BUFFER

OVERFLOW ATTACK”

“This was a very coordinated attack developed by NSO group who in the past have been able to breach phone security with its famous Spyware Pegasus software and we urge all users to update their WhatsApp application.”

This is not the first case of NSO software being used to hack into systems as Amnesty International have also claimed that the Pegasus software has been used against them in the past as they are taking the Israeli military and NSO to court over the attack.

In a press release the group state: “In a petition to be filed tomorrow at the District Court of Tel Aviv, approximately 30 members and supporters of Amnesty International Israel and others from the human rights community set out how the MoD has put human rights at risk by allowing NSO to continue exporting its products.” In support of the petition, Danna Ingleton, Deputy Director of Amnesty Tech, said: “As long as products like Pegasus are marketed without proper control and oversight, the rights and safety of Amnesty International’s staff and that of other activists, journalists and dissidents around the world is at risk.”

Javvad Malik, Security Awareness Advocate, KnowBe4, said: “Cyber criminals or state actors will typically follow the users. With WhatsApp being such a popular communication tool around the world, it is no surprise that it would make such an appealing target.

“It doesn’t appear as if masses of users were victims of this attack, rather the vulnerability was exploited to infect specific individuals in a more targeted attack.

“The worrying thing about this attack was that it needed no interaction from the victim. A WhatsApp phone call would infect the user, even if they didn’t answer it. While there is not much the average user can do in this situation, for high profile individuals, or those working with sensitive information, it becomes important to evaluate downloaded apps, and indeed the functionality of a

ISB 025www.securitybuyer.com

COVER STORY

NSO owners’ open letter following WhatsApp attackNovalpina Capital are determined to ensure NSO’s technology is used for its intended purposes and not abused by third parties, says Founding Partner Stephen Peel

He said: “We are determined to do whatever is necessary to ensure that NSO technology is used for the purpose for which it is

intended – the prevention of harm to fundamental human rights arising from terrorism and serious crime – and not abused in a manner that undermines other equally fundamental human rights.

“There can be no doubt whatsoever that the lawful, appropriate and responsible deployment of NSO technology by intelligence and law enforcement agencies is essential in order to address the serious challenges in many countries of what would otherwise be untraceable and undisruptable serious crime, terrorism, paedophile rings, human trafficking, drug cartels and the like. As the UK National Crime Agency notes in its National Strategic Assessment of Serious and Organised Crime 2019 report: “Advancing technology gives offenders new tools to commit and hide their crimes. Today’s criminals can sell drugs, share indecent images of children, or hack into national infrastructure from anywhere in the world, communicating covertly through encrypted services and moving illicit finances at speed. Serious and organised criminals at all levels remain engaged in the widespread abuse of encryption tools to evade law enforcement. [Serious organised crime] offenders continue to exploit both legitimate, widely commercially available encrypted communications applications, and secure encrypted platforms designed for criminal use.”

“The matters highlighted by Amnesty International [in its affidavit] reflect precisely the reasons why we believe so strongly in the merits of bringing NSO into full compliance with the UN Guiding Principles… Our intention is to establish a new benchmark for transparency and respect for human rights in full compliance with the UN Guiding Principles… This is a challenging goal – wholly without precedent within the cybersecurity industry (in fact, it remains rare in any industry) – that will need

to address complex matters of national security law and of intelligence and law enforcement agency practice. The intended outcome is a significant enhancement of respect for human rights to be built into NSO’s policies and procedures and into the products sold under licence to intelligence and law enforcement agencies.”

“We abhor any form of misuse of any form of surveillance technology by any government, agency or individual, and we particularly condemn without hesitation any such misuse directed at people who are vulnerable simply as a consequence of their commitment to report on, speak out for or defend human rights. It is also important to note that NSO does not operate its technology in its own right to target any individual or organisation. Moreover, it would never seek to do so (even if it did possess the capabilities required, which it does not) as the company clearly has no lawful interception mandate and any such action would therefore be illegal. The company’s technology is designed in such a way that it can only be deployed by an intelligence or law enforcement agency to whom the technology is sold under licence. NSO has no involvement whatsoever in any end-user agency’s tactical deployment decisions.”

“The revised governance framework for NSO will reflect the importance of considering the company’s business relationship with the state entities that are the end-users of its products, mindful of the salient human rights risks that arise in the context of the countries within which end-user agencies operate…. Furthermore, the framework will be designed to reflect the need for particular attention to be paid to adverse human rights impacts on individuals at “heightened risk of vulnerability or marginalisation” (in line with the UN Guiding Principles) which would include journalists, human rights defenders, and members of other civil society groups at risk of being targeted as a consequence of the legitimate exercise of their human rights.”

026 ISB www.securitybuyer.com

COVER STORY

smartphone as a whole. “Flaws can exist in every software, but kudos to the WhatsApp team for their rapid turnaround and releasing of a fix.”

Experts from across the industry have been commenting on the What’s App hacking incident and this is a selection of comments they made:

Dan Boddington, Systems Engineer, StarLeaf, said: “The latest WhatsApp exploit is an extremely severe security hole. Despite instant messaging becoming a growing part of our culture of communication, social platforms are often unwisely used for the businesses.

“This example clearly demonstrates that there are many organisations aggressively hunting for flaws in consumer applications for commercial gain and for use by third parties. Consumer apps are not designed for business usage.

“Therefore, it is the responsibility of every employee to only adopt the right solutions to minimise risk and protect users’ data (company and customer). Secure

messaging specifically engineered for the enterprise enables a more mobilised workforce to meet and message more effectively, as well as remain data compliant.” Ed Macnair, CEO of CensorNet, said: “WhatsApp has over 1.5bn users globally, so the news that it had such a massive vulnerability is going to unsettle plenty of people. And rightly so, as the details of this cyberattack, where spyware is being injected onto users’ devices via the app’s call function, is particularly unnerving.

“The attacks appear to have been specifically targeted, for example a UK based attorney’s phone was attempted to be breached, but this doesn’t mean that the rest of civil society shouldn’t be worried that such an extensive vulnerability was present in the app.

“There’s been a blurring of lines between what we might consider consumer tech and enterprise tech. WhatsApp started its life firmly in the consumer corner but has since been adopted by employees and organizations as an easy way to communicate. What we now have is

an excellent example of why that can be a problem.

“WhatsApp has instructed users to update the app to a version that has fixed the vulnerability in the infrastructure which allowed this to happen. Businesses must remember that, whether they know it or not, WhatsApp is being used on corporate devices and they also need updating.”

Leigh-Anne Galloway, cyber security resilience lead, Positive Technologies, said: “Almost all applications contain some form of vulnerability and when those applications are as popular as WhatsApp, those flaws will be hunted out with far more vigour than others.

“That doesn’t negate the fact that this is going to be incredibly concerning for the general public and it returns us to the subject of Facebook. Facebook has been proven to have less than a concrete grip on privacy and security, so this will only add fuel to the fire.

“It is worth remembering that WhatsApp is an internet application and with that comes risks of hacking, so the usual advice stands – don’t share anything on it that you wouldn’t want to be seen or appear in public. Everyone should take the advice of WhatsApp and update their applications immediately. If required, they should also update their phone’s operating system as doing so can help protect against other security flaws – and its good practice to do so as soon as updates become available.”

BANK BRANCH NETWORK SOLUTION

Blacklist AlarmProtecting all assets through recognizing unwanted individuals.

Transaction DisputesTrace back to any transaction with all the details you need.

Crucial Area Security Color imaging helps to secure the most important zones all day.

TRANSFORMING BANKINGWith Enhanced Security and Service

C

M

Y

CM

MY

CY

CMY

K

Ed Macnair of CensorNet

BANK BRANCH NETWORK SOLUTION

Blacklist AlarmProtecting all assets through recognizing unwanted individuals.

Transaction DisputesTrace back to any transaction with all the details you need.

Crucial Area Security Color imaging helps to secure the most important zones all day.

TRANSFORMING BANKINGWith Enhanced Security and Service

C

M

Y

CM

MY

CY

CMY

K

Fewer than six months have passed since the UK was told it would face an imminent and life-threatening cyber attack, says Tom McAndrew, CEO of cybersecurity consultancy Coalfire

War games: what cyber attacks mean for businesses

The warning came from GCHQ’s National Cyber Security Centre (NCSC), whose latest annual review made for grave reading.

The report revealed that the NCSC had dealt with more than 1,160 cyber incidents since its creation in 2016, the majority of which were carried out by nation states in some way hostile to the UK.

According to the NCSC, these attacks were undertaken by groups of computer hackers ‘directed, sponsored or tolerated’ by the governments of those countries and often carried out on UK businesses.

This shows that a growing number of countries are using cyber warfare as a foreign policy tool and, as reports of nation-state attacks continue to rise, it now seems more than likely that the NCSC’s prediction will prove itself to be true.

Indeed, some of the most high-profile cyber attacks across the world have been committed, allegedly, by nation states. Russia’s NotPetya malware attack on US financial and energy institutions and North Korea’s WannaCry hack that brought the UK’s National Health Service to a standstill are just two examples. But more recently,

another country in particular has become a focal point of criticism by both the UK and US governments.

China’s cyber offensive

In December 2018, the UK government publicly accused elements of the Chinese government of being responsible for a cyber espionage campaign against British businesses. Foreign secretary Jeremy Hunt named a group known as APT 10, claiming it acted on behalf of the Chinese Ministry of State Security to carry out a malicious cyber campaign targeting intellectual property and sensitive commercial data in Europe, Asia and the US.

Less than a month later, the US filed indictments against Chinese telecoms giant Huawei that included 23 counts pertaining to the theft of intellectual property, obstruction of justice and fraud, ultimately resulting in a US ban.

The company, which is considered by many to be affiliated with the Chinese state, has grown rapidly to become a global leader, and recently, it became the world’s third-largest smartphone supplier after Samsung and Apple.

Huawei has also been a pioneering force for fifth generation (5G) mobile broadband. Alongside superfast mobile connectivity, the technology will power the internet of things (IoT), enabling connected machines – from traffic lights to driverless cars – to communicate with each other.

If claims about the link between Huawei and the Chinese government are to be believed, the state’s influence in foreign markets increases as the company’s does. By controlling the 5G technology that will be at the heart of vital communication and infrastructure networks via Huawei, China could have the capacity to cause disruption on a massive scale.

Gaining an edge

Global economic dominance equates to political advantage and China knows this all too well. It’s for this reason that many now suspect Huawei’s actions to be symptomatic of the state’s strategy for achieving its economic and political objectives.

In this way, China’s approach could be likened to that of any other cybercriminal attacking and extracting sensitive data. The difference in this case is that the state is not seeking short term monetary gain, but instead is stealing intellectual property and privacy information. The reason: to level the playing field between Chinese businesses and the foreign companies they are competing with at home and abroad.

Mirror image Although we’re more acutely aware of China’s malicious activity when it occurs on our own shores, we must also consider the many western businesses that operate within

028 ISB www.securitybuyer.com

CYBER

China’s borders and are increasingly affected by the state’s interference in the competitive dynamics of the market.

This issue was made most clear in a statement by assistant director of the FBI’s counterintelligence division, Bill Priestap, who told American businesses operating in China, that they do so on “borrowed time”.

He claimed that the Chinese government’s continued proliferation of cyber hacking tools and human intelligence capabilities makes the world’s second-largest economic market a treacherous place for western firms.

Priestap argued that the Chinese government will allow foreign companies to operate on Chinese soil, but only while it’s advantageous for them to do so. If a product is not yet available domestically for example, the foreign manufacturer will be allowed to remain – but only as long as it takes for valuable intellectual property to be stolen and a Chinese replica to become readily available.

The Chinese tech industry is another good example of where this sort of activity plays out. Historically, it’s been viewed as lagging behind its western equivalents; however, it now seems the state is using its cyber arsenal to obtain the information needed for it to catch up to the positions of western businesses in China. This leaves many UK and US businesses potentially facing competition from Chinese mirror brands assisted by extremely capable intelligence and security services.

Political reaction

While both the US and UK have been critical of Chinese intentions, unlike the US, the UK has so far so far resisted an outright ban of Huawei. By no means does this suggest they have been any less cautious of the more negative aspects of Huawei’s reputation.

After reports emerged that Huawei infrastructure was behaving unusually in 2010, GCHQ took the unprecedented step of setting up the Huawei Cyber Security Evaluation Centre (HCSEC), a designated facility where every Huawei device destined for use in the UK is tested and approved, in a bid to alleviate fears surrounding the company’s involvement with the Chinese government.

Those fears have once again been in the news as a GCHQ-backed security review of the telecoms firm found that it would be ‘difficult to risk-manage Huawei’s future products until defects in its cyber-

security processes were fixed’.

The report revealed that ‘technical issues with the company’s approach to software development had resulted in vulnerabilities in existing products, which in some cases had not been fixed, despite having been identified in previous versions’.

Dr Ian Levy, the technical director of the NCSC, announced Huawei could face being banned from Westminster and other sensitive parts of the UK as a result of their ‘shoddy’ engineering practices.

Despite slightly different approaches, it’s clear that governments in both the UK and US are suspicious of Huawei and have put checks in place to limit the company’s influence.

Business interests

While government attitudes towards Huawei suggest real apprehension towards partnering with China, many businesses on both sides of the Atlantic still see the country as an important business ally, provider of cost-effective technology and lucrative customer base.

Mobile UK – an industry group that represents Vodafone, BT, O2 and Three – for example, has warned that preventing Huawei from being involved in the UK’s 5G rollout could cost the country’s economy up to £6.8bn and delay the launch by up to two years. There is no doubt that China presents opportunities for western businesses both at home and abroad, but it also poses an undeniable threat. The NCSC’s annual report shows that the number of cyber attacks carried out by nation states on businesses are increasing – in number but also in sophistication – and China is one of the main culprits.

Businesses must acknowledge this and ensure their approach to cyber defence is as robust as possible if they are to tap into the world’s second-largest economy. They need to consider what value a malicious actor could extract from their own organisation and swiftly move to protect these assets. They have to put contingency and disaster recovery plans in place and make education and training available to all employees from boardroom to shop floor.

Whether from the FBI or the NCSC, the warning is clear: hostile nation states pose an undeniable threat to businesses. It’s vital that firms now take the necessary precautions to ensure they can continue to safely access the global marketplace.

“DR IAN LEVY, THE

TECHNICAL DIRECTOR OF

THE NCSC, ANNOUNCED

HUAWEI COULD FACE BEING

BANNED FROM WESTMINSTER

AND OTHER SENSITIVE

PARTS OF THE UK AS A RESULT

OF THEIR ‘SHODDY’

ENGINEERING PRACTICES”

ISB 029www.securitybuyer.com

CYBER

As cyber criminals use popular TV shows – especially those with dragons – to spread malware, new reports look closer at the most targeted files and the best steps for protection

Game of threats: Hackers use TV as a new way to breach cyber defences

There’s no escaping the global phenomenon that is Game of Thrones – and it is exactly this type of television behemoth that

is giving cyber criminals a huge boost.

Hackers are tapping into a growing consumer trend, the use of illicit streaming devices and apps to access pirated movies, TV shows and live programming to spread malware and exploit unsuspecting users. And when a show is particularly successful globally, the opportunities for illegal activity soar with it

Over the course of a recent nine-month probe, the Digital Citizens Alliance – a consumer-oriented coalition focused on educating the public and policymakers on the threats that consumers face on the Internet – observed malware from the piracy apps stealing user names and passwords, probing user networks and surreptitiously uploading data without consent. Investigators also found an illegal scheme to monetise stolen Netflix accounts and ads for premium brands.

The shift towards piracy streaming mirrors the shift towards streaming overall. An estimated 12 million people in North

America alone are active users of piracy apps and devices. And usage appears to come at a price: a Digital Citizens research survey of 2,073 Americans found that those who have used these devices and apps are six times more likely to have reported an issue with malware over the last 18 months.

“What the investigation shows is that as piracy shifts from websites and downloads to devices and apps, hackers are adapting and finding new ways to exploit consumers,” said Tom Galvin, Executive Director of Digital Citizens.

“Consumers think these devices are like an Apple TV or Roku device, but they have a distinct difference: they have little to no incentive to protect their users. In other words, they are perfect for hackers.”

It’s a golden age for TV drama and, globally, consumers can’t get enough. In many regions, such programs can now be consumed through illegal channels, such as torrent-trackers and illegal streaming platforms. Unlike legitimate resources, torrent trackers and hosted files may send a user a file that looks like an episode of a TV show but is in fact malware with a similar name.

Research by global cyber security firm Kaspersky Lab has found Game of Thrones, The Walking Dead, and Arrow are the shows receiving the most attention from attackers. These and other findings are published in a new report: ‘Game of Threats: How cybercriminals use popular TV shows to spread malware.’

Seeing how easily TV shows downloaded from illegitimate resources can be replaced with malware-carrying versions, Kaspersky Lab researchers took a closer look at such

compromised files, covering both 2018 and 2017.

Leading the list in both years was Game of Thrones. In 2018, it accounted for 17% of all infected pirated content, with 20,934 attacked users, followed by The Walking Dead, with 18,794, and Arrow, with 12,163. This is even though in 2018, there were no new episodes of Game of Thrones released, while the other shows in the ranking were accompanied by high profile promotional campaigns.

In every case observed, the malware distributors opted for the first and the last episode of each season, with the launch episode the most actively used, for example, Game of Throne’s ‘The winter is coming’ episode in season one.

“We can see clearly that malware distributors exploit TV shows that are in high demand on pirated websites: these are usually actively promoted dramas or action series,” said Anton V. Ivanov, security researcher at Kaspersky Lab.

“The first and final episodes, attracting the most viewers, are likely to be at greatest risk of malicious spoofing. Online fraudsters tend to exploit people’s loyalty and impatience, so may promise brand new material for download that is in fact a cyberthreat. Keeping in mind that the final season of Game of Thrones [has started], we would like to warn users that it is highly likely there will be a spike in the amount of malware disguised as new episodes of this show.”

While the Middle East, notably the UAE, is tough on illegal streaming the issue of malware distribution is still pressing. A new malware called “Slingshot” has been uncovered in the MENA region which

030 ISB www.securitybuyer.com

CYBER

attacks and infects victims through compromised routers and can run in kernel mode, giving it complete control over victims’ devices.

According to another report by Kaspersky Lab, the malware has been used for cyber espionage from at least 2012 until February 2018.

Researchers say that many of the techniques used by this threat actor are unique and it is extremely effective at stealthy information gathering, hiding its traffic in marked data packets that it can intercept without a trace from everyday communications.

The Slingshot operation was discovered after researchers found a suspicious keylogger programme and created a behavioral detection signature to see if that code appeared anywhere else. This triggered a detection that turned out to be an infected computer with a suspicious file inside the system folder named scesrv.dll. The researchers decided to investigate further.

Analysis of the file showed that despite appearing legitimate, the scesrv.dll module had malicious code embedded into it. Since this library is loaded by ‘services.exe’, a process that has system privileges, the

poisoned library gained the same rights. Researchers realised that a highly advanced intruder had found its way into the very core of the computer.

According to Kaspersky, the most remarkable thing about Slingshot is probably its unusual attack vector. As researchers uncovered more victims, they found that many seemed to have been initially infected through hacked routers.

During these attacks, the group behind Slingshot appears to compromise the routers and place a malicious dynamic link library inside it that is in fact a downloader for other malicious components. When an administrator logs in to configure the router, the router’s management software downloads and runs the malicious module on the administrator’s computer. The method used to hack the routers in the first place remains unknown.

Security steps to avoid falling victim

Use only legitimate services with a proven reputation for producing and distributing TV-content

Pay attention to the downloaded file extension. Even if you are going to download TV-show episodes from a source you consider trusted and legitimate, the file should have an .avi, .mkv or mp4 extension or any others, yet definitely not the .exe

Pay extra attention to the websites’ authenticity. Do not visit websites allowing you to watch TV-show until you are sure that they are legitimate and start with ‘https’. Check that the website is genuine, by double-checking the format of the URL or the spelling of the company name, before starting downloads

Don’t click on suspicious links, such as those promising an early view of a new episode; check the TV-show schedule and keep track of it

Use reliable security solution for comprehensive protection from a wide range of threats, such as Kaspersky Security Cloud

ISB 031www.securitybuyer.com

CYBER

“THE FIRST AND FINAL EPISODES,

ATTRACTING THE MOST VIEWERS, ARE

LIKELY TO BE AT GREATEST RISK OF

MALICIOUS SPOOFING”

Almost two years since WannaCry, the ransomware attack that brought the NHS (National Health Service) in UK to a halt, healthcare IT professionals feel

more confident in their ability to respond to a cyber-attack. That’s according to new research from Infoblox Inc., the leader in Secure Cloud-Managed Network Services.

As healthcare providers continue to undertake digital transformation initiatives in an effort to improve efficiencies and the quality of care they deliver, the risk of falling victim to cyberattack is increasing. Infoblox commissioned a survey of healthcare IT professionals in the UK, US, Germany and the Benelux Union to gauge the preparedness of the industry to tackle cyberthreats.

The research reveals that 92% of healthcare IT professionals are confident in their organisation’s ability to respond to a cyber-attack, compared to only 82% two years ago. More than half (56%) have automated systems in place that actively scan their networks for suspicious activity, and around a third (31%) have their own Security Operation Centers (SOCs) for the same purpose. However, despite this confidence, the industry still faces challenges.

In the event of ransomware, nearly half (39.7%) of IT professionals are not aware if their organization would be willing to pay a ransom in the event of a cyber-attack. Additionally, a quarter (24%) remain defiant, however, stating that they would beunwilling to pay a ransom. A large amount of uncertainty remains for IT professionals about how they should respond to potential ransomware attacks.

Healthcare organisations are spending between 11% and 20% more on cybersecurity than in 2017, with the top three investments being anti-virus software (59%), firewalls) (52%), and application security (51%). Additionally, employee education has grown in popularity, with a ten percent higher investment in 2019 compared to 2017. The reason for this has much to do with improving email hygiene in an effort to avoid phishing scams and

the delivery of ransomware. Healthcare IT professionals are addressing the growing adoption of the Internet of Things (IoT) and as a result the number of security policies in place for new connected devices has increased from 85 to 89%, with fewer respondents doubting the effectiveness of these policies (9% in 2019 v 13% in 2017).

The majority (66%) of connected devices now run on Microsoft Windows 10, however Linux (33%) and Mac OS X (31%) popularity is growing significantly since 2017. Over a quarter of medical devices continue to run on old operating systems including Microsoft Windows 7 (26.5% running medical devices) and Microsoft Windows 8 (4.6% running medical devices). Also, an alarming number of IT professionals (16.6%) do not have the ability to patch their operating systems, leaving their network wide open for attacks.

Victor Danevich, CTO of Systems Engineering at Infoblox, said: “Healthcare companies hold some of the most sensitive and valuable personal data, making them extremely vulnerable to cyberattack. Additionally, as the number of internet connected devices in this industry continues to skyrocket, cybercriminals will have a surplus of options to mine for network vulnerabilities.”

Ashraf Sheet, Regional Director, Middle East and Africa at Infoblox says, “It’s encouraging to see healthcare organizations across the globe taking action in the form of increased cybersecurity spending, managing connected devices, and educating employee security protocols.

By taking such precautions, healthcare IT providers are right to be more confident about their ability to tackle threats to their network. They mustn’t become complacent, though, and must continue to think strategically about ensuring the security of their networks and – most importantly - the safety of their patients.”to their network. They must think strategically about ensuring the security of their networks and – most importantly - the safety of their patients.”

“BY TAKING SUCH

PRECAUTIONS, HEALTHCARE IT PROVIDERS ARE RIGHT TO

BE MORE CONFIDENT

ABOUT THEIR ABILITY TO

TACKLE THREATS TO

THEIR NETWORK”

Ashraf Sheet, Regional Director, Middle East and Africa at Infoblox 032 ISB www.securitybuyer.com

CYBER

IT Professionals still struggle with patching operating systems and managing shadow IT after previous WannaCry ransomware attack

Infoblox reveals top cybersecurity challenges in healthcare

ISB 033www.securitybuyer.com

CYBER

WinGuard from Advancis is an open architecture command & control platform to integrate and unify security, building automation, IT and communication systems

Open architecture PSIM: WinGuard from Advancis

With more than 1,400 realised installations, Advancis based in Frankfurt/Germany is a global leader in the PSIM

industry with offices and partners around the world. The company was founded in 1994 with the goal of developing a command & control management platform to unify disparate security systems and to provide real time incident handling for security control rooms.

WinGuard from Advancis is an open architecture command & control platform to integrate and unify security, building automation, IT and communication systems. Most essentially WinGuard provides operators with an instant picture of full situational analysis for decision making, command and control of all systems as well as dynamic and interactive handling procedures for live security incidents via the control room and in the field for mobile security agents.

WinGuard is sold via a network of specialists in over 70 countries at projects of various sizes and complexity. Many of these protect national and critical infrastructure or corporate security.

Main features of WinGuard PSIM

Guided Operations The operator works with an intuitive and adaptable user interface providing them with contents such as maps and camera images depending on the particular situation. Guided process instructions support the user in event processing and lead them through the required actions for a quick and secure resolution of the situation.

Reports & Audits All actions such as event messages and user entries are logged in WinGuard. Based on this data, reports and evaluations can be generated, offering a quick overview of relevant key figures of the connected systems and the control centre. For external use, this information can be exported into standard formats or provided in real-time.

Open Scalability

The platform is scalable from a single workstation system to an internationally cross-linked control centre and can be extended anytime by further servers and clients, function and interface modules. Currently, over 400 interface drivers to different security, building and communication systems are available. In addition, development of new interfaces is possible as well. Therefore, WinGuard is the ideal solution for most diverse project requirements.

Latest innovations: New version WinGuard X4

The latest version WinGuard X4 offers numerous innovations as well as increased performance, stability and security to meet the rapidly increasing demands on modern control centres. It provides highest system security due to strongest encryption of the database and network connection. In addition, all system and configuration files are protected from unauthorised access with data signatures. The latest 64-bit architecture offers increased performance and stability. The segmentation function for large installations improves both security and performance.

Given the recent global focus on network and device security, WinGuard is one of the most highly protected systems of its kind in the market.

www.advancis.net

“WINGUARD X4 OFFERS INCREASED PERFORMANCE, STABILITY AND SECURITY TO

MEET THE RAPIDLY INCREASING DEMANDS ON MODERN CONTROL CENTRES”

034 ISB www.securitybuyer.com

COUNTER TERROR

Chief of Section for Europe, Middle East and Central Asia, A.E. Seif El-Dawla, briefed NATO diplomatic representatives and officials

NATO and the United Nations mark continued cooperation

A high-level delegation of the United Nations Security Council Counter-Terrorism Committee and its Executive Directorate

visited NATO Headquarters in Brussels to discuss the latest emerging threats of terrorism, foreign terrorist fighters and returnees, as well as possible areas for enhancing cooperation.

Ambassador Gustavo Meza-Cuadra (Chair of the Counter Terrorism Committee, or CTC) and Michèle Coninsx (Assistant Secretary-General and Executive Director of the UN Security Council Counter-Terrorism Committee Executive Directorate, or CTED), accompanied by CTED’s Chief of Section for Europe, Middle East and Central Asia, A.E. Seif El-Dawla, briefed NATO diplomatic representatives and officials, including Dr. Antonio Missiroli (Assistant Secretary General for Emerging Security Challenges), Robert Weaver (Deputy Assistant Secretary General for Emerging Security Challenges) and James Appathurai (Deputy Assistant Secretary General for Political Affairs and Security Policy).

They highlighted lessons learned from more than 150 assessment field visits, as well as UN tools and guidelines that aim at supporting the efforts of member states and

international partners in addressing challenges related to countering terrorism.

They recalled the Counter-Terrorism Committee special meetings held with representatives of member states, UN partners and international organizations on relevant UN Security Council resolutions, including the Addendum to the Madrid Guiding Principles on stemming the flow of foreign terrorist fighters and returnees.

Chair of the Counter Terrorism Committee, Ambassador Meza-Cuadra, said: “The full and effective implementation of the relevant Security Council resolutions by member states and effective cooperation at the international level are of critical importance to address the evolving threats posed by terrorism, foreign terrorist fighters, and returnees.”

Assistant Secretary-General and Executive Director of the UN Security Council Counter-Terrorism Committee Executive Directorate

Michèle Coninsx, said: “It is vital that states continuously monitor, evaluate and review the effectiveness of their prosecution, rehabilitation and reintegration strategies and programmes with due regard to the protection of international human rights and taking into consideration age and gender sensitivities.”

The high-level visit provided also an opportunity to reconfirm the commitment by NATO and the United Nations to boost their political dialogue and practical cooperation in different realms, in the spirit of complementarity, including information sharing on emerging threats and regional terrorist challenges, capacity building programmes designed to improve states’ counter-terrorism capabilities, joint briefings, and sharing of best practices, including with respect to the use of biometrics, battle-field evidence and countering drones.

“SECURITY COUNCIL RESOLUTIONS BY MEMBER STATES AND EFFECTIVE COOPERATION AT THE

INTERNATIONAL LEVEL ARE OF CRITICAL IMPORTANCE”

security.gallagher.com

How cyber-secure is your security system?

A cyber-attack on your security system can result in considerable damage to your business

and ultimately its reputation to customers and employees.

The solution you relied on today may not protect you tomorrow. Gallagher solutions are

continually evolving, with regular software releases to ensure you stay up-to-date.

Take a proactive approach to managing your security – choose Gallagher to ensure your

security is always present, always working.

Call us on 02476 64123 or email [email protected] to find out more.

Cyber advert.indd 1 18/04/2019 13:36:31

security.gallagher.com

How cyber-secure is your security system?

A cyber-attack on your security system can result in considerable damage to your business

and ultimately its reputation to customers and employees.

The solution you relied on today may not protect you tomorrow. Gallagher solutions are

continually evolving, with regular software releases to ensure you stay up-to-date.

Take a proactive approach to managing your security – choose Gallagher to ensure your

security is always present, always working.

Call us on 02476 64123 or email [email protected] to find out more.

Cyber advert.indd 1 18/04/2019 13:36:31

036 ISB www.securitybuyer.com

SMART CITIES

One of the biggest challenges security professionals face currently is outdated and siloed systems which present data separately

Unveil the bigger picture in a changing emergency situation

Whether you are tasked with the security of a campus, a local business or a dozen remote sites, keeping up with

the events triggered by the growing number of doors, cameras and sensors is a full-time task. The danger is that this can narrow the operator’s focus, making them lose sight of the broader situation.

We are under more threats than ever before. Not a day goes by when you don’t hear about malicious cyber-attacks targeting firms, or the increasing levels of drone or knife attacks. These collective dangers are putting businesses and public safety organisations under pressure, and as any security professional knows, how one responds to an attack is crucial, as it can either prevent an escalation, or not.

When an emergency takes place, decisions need to be made quickly – yet one of the biggest challenges security professionals face currently is outdated and siloed systems which present data separately, leading to lost time piecing the clues together. With many moving operations to the Cloud, this can also cause issues, as information is needed from both physical

and digital systems, which then need integrating into one, clear picture. Access to analytical tools and unified security solutions is therefore essential in overcoming this issue, as this holistic, real-time picture will enable security professionals to react to a security incident before it has a chance to cause significant damage.

Security Center by Genetec has been designed with this exact purpose in mind, as this unified security platform provides those in charge with all the relevant information they need in a single dynamic interface. Plus, with information readily available on a mobile app too, those in charge of keeping their areas safe, are able to do so from wherever they are at the time.

Unlike integrated systems that simply connect a variety of security applications to share data, Security Center delivers an

unparalleled unified operator and user experience. From a single monitoring application at their workstation or in a security operations control room, operators view the entire security environment. And, with information correlated before their eyes, they benefit from greater awareness and operational insights. This improves decision-making and reaction time, augmenting the safety of people or firms at risk.

For example, traditionally, when an incident takes place security will be notified through an alarm or warning sign and are dispatched to deal with the incident – sometimes with little or no information of the hazard. This in itself presents a problem – if those being sent to stop the threat don’t have a true picture of what they’re facing, how can they possibly mitigate it as efficiently and effectively as possible? That’s where the importance of a unified display comes in. With the help of a unique combination of solutions such as access control, video surveillance, automatic license plate recognition, intrusion detection, and analytics, security professionals can significantly enhance their situational awareness, as well as their ability to provide a more cohesive response. This combination significantly improves operations and limits response times, which in turn enhances operational safety and security.

There’s also the integration issue. Very few companies can afford the best-in-class cameras, access control systems etc, and often will have a mismatch of partners and technology as systems are added to. As the security market continues to migrate towards a unified approach to security, customers require increased levels of connectivity between security systems, devices, and other business systems. Genetec offers a clear path for the providers of standalone solutions to link to or embed their applications within our Security Center platform.

“THE DANGER IS THAT THIS CAN NARROW THE OPERATOR’S FOCUS, MAKING THEM LOSE SIGHT

OF THE BROADER SITUATION”

EXPLORE 300+ EXPERT-LED SESSIONS,each designed to deliver valuable, actionable takeaways to help shape your security strategy—today and in the future.

The GSX education program—peer-led by ASIS, CSS, and InfraGard subject matter experts—consists of a full curriculum of quality content in an immersive and interactive learning environment, offering insights and best practices to security professionals at every stage in their career.

REGISTRATION IS OPEN! GSX.ORG/SND

A Smarter EXCHANGEGlobal Security Exchange (GSX) is the security industry’s premier global event.

EXPLORE 300+ EXPERT-LED SESSIONS,each designed to deliver valuable, actionable takeaways to help shape your security strategy—today and in the future.

The GSX education program—peer-led by ASIS, CSS, and InfraGard subject matter experts—consists of a full curriculum of quality content in an immersive and interactive learning environment, offering insights and best practices to security professionals at every stage in their career.

REGISTRATION IS OPEN! GSX.ORG/SND

A Smarter EXCHANGEGlobal Security Exchange (GSX) is the security industry’s premier global event.

038 ISB www.securitybuyer.com

SMART CITIES

The Department for International Trade (DIT) and Invest Northern Ireland were instrumental in enabling ESF to quote for this prestigious project at Dubai Arena

ESF Completes £600k Dubai Arena Project

NEWTOWNABBEY-based Environmental Street Furniture (ESF) has completed their largest contract to date at the

new state-of-the-art Dubai Arena, supplying a range of customised street furniture and security products in a deal worth £600k.

Known for their award-winning exporting capabilities, which include some of the world’s largest theme parks and government organisations, ESF supplied over 700 products to the project including bollards, benches, tree grates and litter bins.

Speaking about ESF’s work at the impressive new arena, Managing Director, Alan Lowry said, “Dubai Arena has been ESF’s largest project to date and we’re delighted to have contributed to what is sure to be one of Dubai’s most popular tourist attractions. Having the opportunity to showcase our products to the millions of tourists, estimated to be 25 million per year by 2025, is a great achievement for a small company from Northern Ireland.

“We supplied a number of products, most of which were manufactured in Northern Ireland, including security bollards to go around the perimeter to ensure its protection as well as benches, litter bins and tree grates.

“A greater focus is being placed on perimeter security across the globe due to the increase of attacks, especially where large crowds gather, so it’s important to ensure each product installed at the Dubai Arena is fit for purpose. All ESF’s security bollards are PAS 68 tested and certified and due to our recent acquisition of Sentry Posts, we have the technical ability to design and deliver a global project of this scale.”

Alan continued, “We have been very fortunate to deliver a number of projects across the United Arab Emirates (UAE) in recent years with our street, themed and solar powered products, including IMG Worlds of Adventure, Warner Brothers Park and Global Village. We are hopeful to continue that growth, with the addition of our security products, throughout the UAE and Middle East in the months and years ahead.”

Both the Department for International Trade (DIT) and Invest Northern Ireland were instrumental in enabling ESF to quote for this prestigious project at Dubai Arena.

Speaking about ESF’s work at Dubai Arena, Swathi Sri, Head of Territory – India, Middle East and Africa at Invest Northern Ireland said, “We are delighted to see the ESF team build on their recent successes in the UAE and to work on such a significant project as the Dubai Arena. Northern Ireland has a world class reputation for design capabilities, and ESF’s success stands as a testimony to their commitment to high-class quality and ongoing innovation.”

Dubai Arena, officially named the Coca-Cola Arena following a ten-year deal with Coca Cola, is due to open in June 2019

and will span half-a-million square feet. The multi-purpose arena, located at City Walk, will have the capacity to accommodate 17,000 people and will host a variety of events all year round.

ESF has experienced an array of global success since breaking into the export market in 2013. In 2018, the company supplied products to 22 countries globally and opened their first American office, which will allow them to better service their American customers.

Alan Lowry has also been announced as a finalist in the prestigious Institute of Directors ‘Director of the Year’ awards where he is shortlisted in both the International and Innovation categories.

• Free choice between edge-based or server-based video analytics

• Various video analytics available for different applications

• Intuitive configuration and operation with state-of-the-art webtools

• Compatible with current video management systems

• iLIDS certified for critical infrastructure

IPS VideoAnalytics - intelligent, software-based analytics modules for real-time detection of suspicious objects or events

IPS VideoAnalytics

Securiton GmbHIPS Intelligent Video Analytics

www.ips-analytics.com

Visit us at Hikvision booth IF1530

• Free choice between edge-based or server-based video analytics

• Various video analytics available for different applications

• Intuitive configuration and operation with state-of-the-art webtools

• Compatible with current video management systems

• iLIDS certified for critical infrastructure

IPS VideoAnalytics - intelligent, software-based analytics modules for real-time detection of suspicious objects or events

IPS VideoAnalytics

Securiton GmbHIPS Intelligent Video Analytics

www.ips-analytics.com

Visit us at Hikvision booth IF1530

040 ISB www.securitybuyer.com

SMART CITIES

Cabling from R&M connects thousands of cameras, card readers and the data center with 90,000 connections installed in the first section of the airport

R&M Enables Istanbul Airport to be Securely Digitized

As some of the world’s most advanced and secure facilities, airports rely heavily on the latest IT systems. A great deal

of pioneering work in this field is being carried out by Istanbul Grand Airport (IGA), which became operational this year. It is the largest airport in the world and also the first airport in the world to be fully digitized with its key security, communication and IT functions based on a network provided by R&M.

“R&M has extensive experience in the aviation sector,” commented the Istanbul Grand Airport Construction project enterprise when providing its reason for selecting the network provider. For Ersin Inankul, CIO and Deputy General Manager at Istanbul New Airport, one of the key factors for selecting R&M was that the cables would guarantee outstanding signal transmission and eliminate interference for decades. Inankul said, “The quality of the R&M cabling system ensures that we can run 9,000 surveillance cameras and 3,000 card readers in real-time with confidence that they will be protected against any transmission interference or loss. We are also connecting 5,000 Wi-Fi access points, giving the airport a full-coverage WLAN. These access points will be trouble-free and fail-safe. The cabling also connects the ICT infrastructures for customs, the security staff and the police force.”

Customized

Several aspects of the cabling had to be specifically designed for this mega-project. “R&M’s specialists understand our needs and can customize their solutions. This is the biggest advantage for us as it separates R&M from other vendors,” said Ersin Inankul. The other key criteria were the delivery reliability, security and cost-effectiveness of the R&M products. Owing to their modular design, the cabling systems can keep pace with the expansion of the airport and can be expanded modularly in just a few simple steps.

R&M CEO, Michel Riva, said, “R&M has proven once again its ability to support major projects with tailored cabling solutions.”

In the first phase of construction, R&M supplied 5,400 km of copper cablings and 3,270 km of fiber-optic cabling. Installation also required fiber-optic distribution cabinets, patch panels as well as 115,000 connector ports. Special requirements also needed to be fulfilled in each area, such as a color-coding system.

The highest connection density R&M outfitted the airport’s data center with the Netscale solutions, which is the fiber-optic management platform with the world’s highest connection density of up to 120

ports per rack unit in a 19’’ rack. The R&MinteliPhy digital management and monitoring system was also installed. This system automates the monitoring and operation of the data network from a central location and can detect any unsolicited changes to the infrastructure or attempts to tamper with the connectors in real time.

The cabling is designed for a lifetime of 25 years and unconditional reliability, and R&M has provided a guarantee for this. The airport wants to provide travellers, logistics companies and airlines with a guarantee of 99.982% reliability (TIER III class). Up to 200 million passengers are expected to use the airport every year in the long term. The recently opened first section of the airport processes 90 million passengers every year. Three additional construction phases will be completed over the next 15 years.

Professional project management

“When it comes to airports, it is particularly important to be able to accurately coordinate complex installations over a very long project duration and to always deliver the same level of quality. This requires professional and highly organized project management teams to be put in place on site,” explained Michel Riva.

For such tasks, R&M puts together international teams that take full responsibility for the achievement of these goals. They coordinate engineering, logistics and communication, installation, measurements and testing, and services, thus allowing projects to be completed on time. The sales office in the Middle East was in charge of the installation of the cabling in Istanbul Grand Airport, with support provided by specialists from the company’s headquarters.

ISB 041www.securitybuyer.com

SMART CITIES

Solution utilized video analytics to allow city officials to better understand what is happening in and around their city

Stanley security help to provide CCTV solution Californian city

With a population of almost 130,000 residents, the City of Concord is one of the largest cities in the San

Francisco Bay Area. The city currently has 85 cameras deployed in the downtown area, with the goal to deploy more in the future.

However, the camera system for the City of Concord, California was experiencing downtime that caused a lack of available, critical video evidence.

The city’s information technology (IT) department needed a solution that would automatically send an alert if a failure, potential failure or vulnerability were to be detected. This would allow issues to be fixed immediately, rather than days, weeks or even months after an incident occurs.

For months, the Concord IT department had been examining their camera system to find the leading cause of the downtime, which could have been caused by a number of reasons: networking, lack of storage, or the physical cameras themselves.

However, every diagnostic check the IT department performed reported no areas registering errors. Surveillance increases

public safety, combats criminal activity and monitors traffic patterns.

Rather than continue to use manual, time-consuming methods of debugging the system the City of Concord knew they needed a purpose-built solution. One that verifies physical security infrastructure.

It was not until Concord IT staff attended a local Municipal Information Systems Association of California (MISAC) conference that they were introduced to a solution they had been looking for: Stanley IntelAssureTM, powered by Viakoo.

Stanley Security provided a solution that utilized video analytics to allow city officials to better understand what is happening in and around their city by monitoring both community and infrastructure through one system.

Stanley IntelAssure is the first and only service assurance software solution for physical security systems available today that utilizes automation to continuously detect and diagnose problems and recommend solutions. Stanley was entrusted to recommend a solution that

can help find the cause of video downtime and provide constant updates on the status of the surveillance system.

Taking only 30 minutes, Stanley IntelAssure was installed into the city’s four servers that included all 85 cameras. Within a week of installing the assurance solution, the persistent issues causing failures in the surveillance system were identified and corrected, allowing the City of Concord to have a fully operational surveillance system downtown. The city will now be able to continuously detect and diagnose problems and will recommend solutions for the video surveillance system with the help from Stanley IntelAssure.

The City of Concord has the scientific evidence provided by Stanley IntelAssure, through key performance indicators (KPI’s), that the video surveillance system is consistently running well. Since being installed, the City of Concord’s video surveillance has not experienced a system downtime. Now stable and performing as required, the City of Concord spends less time managing the system and can confidently plan future enhancements to it.

042 ISB www.securitybuyer.com

DATA STORAGE AND SECURITY

Whether in private life or professional life, there are scarcely any activities or services that don’t depend on a data centre somewhere down the line

The Growing Significance of Data Centres for Everyday Life

Any malfunction in a data centre can of course have major repercussions and the seriousness of this risk has

led to the development of a highly specialized industry concerned with their planning, implementation, smooth operation and service.

The future outlook for data centres continues to be one of growth. Analysts at 451 Research expect worldwide growth, in terms of space, of 2.8% per annum, until 2020. As a result, providers of colocation centres are experiencing annual growth of just under 10% in area over the same period, while Hyperscale Cloud data centres are expected to grow 20.3% per year.

Data is now Common Currency

The Internet of Things, Industry 4.0 and Big Data have also gained greater traction as data increasingly becomes the focus of value chains, as well as a requirement by many company departments for daily operations. Employees are routinely using

data analysis, for example, to optimise processes or as an important tool in new product development or for increasing customer satisfaction.

Indeed, assessing and understanding customers’ individual needs and preferences are the key to delivering the brand experience through highly personalised after-sales service and support. Companies need up-to-date information in order to deliver customer engagement strategies that achieve competitive differentiation. Data can help create a brand-specific identity even in markets where there are comparable products and services.

Energy Consumption

By 2020, worldwide data centre electricity demand is expected to reach approximately 375 billion kWh per year.Companies can start testing the energy efficiency of their data centres right now and it’s clear that using modern cooling systems can permanently reduce energy

costs, thereby improving efficiency.For example, it might make sense for operators to switch from a room cooling system to a direct expansion (DX)-based rack cooling system within small IT environments. Split climate control units with a coolant are mounted directly on, in or beside the rack.

Manufacturers such as Rittal supply cooling units with inverter-controlled compressors that respond quickly and directly to load changes on the servers inside the rack.Furthermore, data centre operators should always use fans powered by speed-controlled EC (electrically commutated) motors because they use less energy.

Overall, energy costs can be minimised through targeted modernisation despite the expansion of a company’s IT environment, all of which will actively promote digital transformation.

www.rittal.co.uk www.friedhelm-loh-group.com

ISB 043www.securitybuyer.com

DATA STORAGE AND SECURITY

It will also feature previous Women in Biometrics Awards recipients as part of a panel on government security applications for advanced biometric technologies

SIA to honor female biometrics and security leaders at SIA Govsummit

Nominations are now being accepted for the 2019 Women in Biometrics Awards, co-founded by the Security Industry

Association (SIA) and SecureIDNews and co-presented with sponsors IDEMIA and SIA’s Women in Security Forum.

Winners of this year’s awards program will be recognized at the 2019 SIA GovSummit, held June 26-27 in Washington, DC The conference will also feature previous Women in Biometrics Awards recipients as part of a panel on government security applications for advanced biometric technologies.

“Biometric technologies – which play a key role in securing today’s physical and digital identities – are integral to the security industry and other areas like health care, law enforcement and air travel,” said SIA CEO Don Erickson. “Women in Biometrics Awards winners are innovative women helping create a more secure world through these technologies, and SIA looks forward to welcoming the next class of awardees to this elite group.”

The Women in Biometrics Awards recognize top female leaders in the biometric identity and security industry. Nominees and past winners include those working for biometric

companies, peripheral suppliers, system integrators, academia, government and security and IT departments at a variety of organizations.

“Now in its fifth year, the Women in Biometrics Awards have grown to become an internationally-recognized program,” said Chris Corum, publisher of SecureIDNews. “Biometrics is an increasingly important component of modern identity and security programs, and female leaders continue to pave the way forward.”

Each nominee should exemplify one or more of the following contributions to the industry:

• Leadership: Substantive and defining leadership in academic, public awareness, legislative and/or standards efforts• Participation: Efforts that go above and beyond individual company walls and into the larger identity sphere• Innovation: Pioneering product development, innovation or corporate start-

up efforts• Mentoring: Industry involvement sharing expertise and mentoring peers, thus growing the market

“The Women in Biometrics Awards have inspired a conversation about female leadership and the strength of diversity in the biometrics industry. The award, which is celebrating its fifth year, is providing more evidence of the significant professional and academic contributions women are making in the biometric technology fields,” said Teresa Wu, vice president, strategic marketing and product management for North America at IDEMIA. “Recognizing the accomplishments of female leaders motivates the next generation of women in technology.”

Nominations for the 2019 awards will be accepted until June 1; learn more and submit a nomination at womeninbiometrics.com.

SIA GovSummit, the annual government security conference held by SIA, brings together government security leaders and private industry technologists for top-quality information sharing and education on security topics affecting federal, state and even local agencies. GovSummit 2019 will be held at the Ronald Reagan Building and International Trade Center in Washington, D.C. Learn more about the 2019 conference – including the full agenda, key topics and speakers and hotel and travel information – and register at securityindustry.org/summit.

“WOMEN IN BIOMETRICS AWARDS WINNERS ARE INNOVATIVE WOMEN HELPING CREATE A MORE

SECURE WORLD THROUGH THESE TECHNOLOGIES”

044 ISB044 ISB www.securitybuyer.com

DATA STORAGE AND SECURITY

Only half of UK businesses insure themselves against loss or damage to data, says new research from Accenture

Only half of UK businesses insure themselves against loss to data

Cybersecurity should be a major concern for every organisation in business today. Cybercrimes affect all types of organisations

(large, small, well-known, private, public, etc.) and seem to be making news headlines nearly every day. The impact of a breach on your organisation can mean significant profit loss, regulatory fines, reputation destruction and the loss of valuable customers.

When customers trust your organisation, you are expected to protect their customer data. That’s why organisations need to learn how to collect, properly utilise and eventually eliminate customer data, all while maintaining robust security posture. Customers need organisations to be transparent, prepared and vigilant when it comes to cybersecurity.

One in four business leaders are aware of a malicious attempt to steal or destroy their data in the last 12 months, rising to 34% for large firms – and yet they don’t take complete steps to protect its value. More than one in ten say they experienced an internal threat to their data, such as accidental damage.

Those that do insure their data, do so for only a fraction of the costs associated with collecting and analysing it. The average medium-sized business spends £980,000 on collecting and analysing data and the costs of data loss or damage are potentially far higher. Yet, on average, the insured value of that data is only £65,000.

One of the barriers to realising the value of data is actually the access to it. Businesses believe that 30% of the data they hold is inaccurate and 70% of the people that use data don’t have access to everything they need.

George Marcotte, Managing Director, Accenture Digital, said: “The disparities we’re seeing in the insured value of data versus costs associated with it, as well as those choosing not to insure, show how companies are clinging to traditional

practices. These businesses still revolve around the five classic asset classes: monetary, physical, relational, organisational and human, which I imagine they will have insurance to protect. And yet they don’t put data into that category.

“It’s only the new platform companies that see data as a sixth asset class. Not only will they take steps to insure it, but they also take bigger steps to invest in it. As data becomes more vital to business success, not taking all steps to protect it is like forgetting to insure the crown jewels.”

“It’s only once businesses change their culture to be more data oriented that they will start to do things like insure it. Insurance is clearly not the end goal, but it’s an indicator of companies seeing data as a valuable asset instead of simply a cost to be covered.”

“IT’S ONLY ONCE BUSINESSES CHANGE THEIR CULTURE TO BE MORE DATA ORIENTED THAT

THEY WILL START TO DO THINGS LIKE INSURE IT”

ISB 045www.securitybuyer.com

DATA STORAGE AND SECURITY

They are now launching a seventh generation SkyHawk AI 14TB surveillance- optimized drive which is tuned to work with 24/7 mixed workloads

Seagate the market leader in surveillance storage for 40 years

SkyHawk AI 14TB is a surveillance-optimized drive designed for NVRs and edge computing. Recording footage from up to 64 HD cameras,

supporting 32 AI streams with metadata, and storing over 9000 hours of HD video, SkyHawk AI is tuned for 24/7 workloads. Its SkyHawk Health Management software actively monitors drive health. A seventh-generation product, SkyHawk AI 14TB features expanded durability and a new 14TB capacity, the highest for a surveillance-optimized drive for security edge applications. At 550TB/year, SkyHawk AI is designed for more than 3x the workload of standard surveillance drives. SkyHawk AI supports up to 64 HD cameras and 32 AI streams with metadata simultaneously. Its 90% write and 10% read workloads are ideal for NVRs enabled with AI for edge computing applications. Powered by SkyHawk AI, NVRs can ensure data is

preserved and instantly accessible for analytics and real-time decision making.

By implementing SkyHawk AI, system integrators optimize their storage capabilities, maximize NVR and server performance, and ensure system longevity. Deploying SkyHawk AI reduces the risk of critical data loss and ensures data is readily available and protected. This ultimately results in fewer maintenance calls, greater peace of mind, higher customer satisfaction, high customer retention, and increased revenues.

SkyHawk AI meets the need of providing both increased and more reliable storage as IoT and artificial intelligence technologies continue to see rapid adoption. About 2,500 petabytes of data are expected to be recorded every day by surveillance cameras installed in 2019, according to IHS Markit. HD and ultra HD video coupled with metadata from surveillance AI puts hard

drives under increasing stress. Not only do these drives have to adapt to 24/7 mixed workloads, but they also have to accommodate longer retention periods for deep learning. SkyHawk AI is designed to meet all of these needs and is the ideal storage solution for surveillance AI applications. SkyHawk AI drives offer many benefits to system integrators by optimizing their storage capabilities, maximizing NVR and server performance, and ensures system longevity. Deploying SkyHawk AI reduces the risk of critical data loss and ensures data is readily available and protected. This ultimately results in fewer maintenance calls, greater peace of mind, higher customer satisfaction, high customer retention, and increased revenues.

Visit them at IFSEC, booth IF1240 or go to www.seagate.com

Specifications 14TB 12TB 10TB 10TB 8TB

Capacity 14TB 12TB 10TB 10TB 8TB

Interface SATA 6Gb/s SATA 6Gb/s SATA 6Gb/s SATA 6Gb/s SATA 6Gb/s

Height (mm/in, max) 26.11mm/1.028" 26.11mm/1.028" 26.11mm/1.028" 26.11mm/1.028" 26.11mm/1.028"

Width (mm/in, max) 101.85mm/4.01" 101.85mm/4.01" 101.85mm/4.01" 101.85mm/4.01" 101.85mm/4.01"

Depth (mm/in, max) 146.99mm/5.787" 145.99mm/5.787" 146.mm/5.787" 146.99mm/5.787" 146.99mm/5.787"

Weight (g/lb) 690g/1.521" 690g/1.521lb 690g/1.521lb 650g/1.433lb 650g/1.43lb

046 ISB www.securitybuyer.com

TRAINING

The British Security Awards is the national event that recognises the talent and commitment of our industry’s finest.

Organised by the British Security Industry Association, the British Security Awardscelebrates the achievements, acts of bravery and innovations made by members of theUK’s security industry.

The regional winners will now go forward as national finalists to the British Security Awards held in London on July 10 at the Marriott Hotel, Grosvenor Square.

The BSIA holds its annual awards to celebrate excellence in security both regionally and nationally for some of the truly outstanding personnel within the industry, recognising those who have gone above and beyond the call of duty in their everyday work.

For over 20 years these awards, sponsored by Camberford Underwriting, serve to recognise the talent, dedication, skill and bravery exhibited by security personnel in their roles. Each year, the BSIA is inundated with fantastic nominations, from literally saving lives to being instrumental in police investigations, demonstrating just how committed and admirable security personnel are. In 2019 the regional winners have exhibited some truly outstanding acts of bravery, customer service, teamwork and forward thinking from across the United Kingdom representing a broad spectrum of BSIA members and their clients.

Mike Reddington, Chief Executive of the BSIA said: “It is vital as the voice of the professional security industry that we recognise the great lengths security personnel go to in keeping the public and property safe. More often than not, these security professionals are first on the scene when incidents and emergencies occur, and they demonstrate true quality and professionalism in their actions. This year’s regional winners are no exception and have shown remarkable achievements throughout the past year.

“Judging all the inspirational nominations was a tough task, especially as the process included a substantial number of entries. This year’s winners should be immensely proud of their achievements and we wish them the best of luck as they go forward to the national stage at the British Security Awards in July.”

There are 16 categories to choose from; five devoted to security personnel (Best Newcomer, Best Team, Best Use of Technology, Service to the Customer and Outstanding Act), Innovative Security Project, Apprentice of the Year, International Partnership, and the SaferCash Bravery Awards (industry and public). There are a further five new categories this year to nominate from: National Partnership, Entrepreneur of the Year, Small, Medium and Large Business of the Year and Contribution to the Industry.

Nominations for security personnel closed on 29 March and for all other awards ended on 1 May. The 2019 regional winners are:

• VSG (Best Newcomer, Best Team, Outstanding Act, Service to the Customer)• SecuriGroup (Best Newcomer, Outstanding Act)• OCS Group (Outstanding Act, Best Team)• Westgrove Group (Service to the Customer, Best Use of Technology, Outstanding Act)• MAN Commercial Protection (Best Team)• G4S (Best Newcomer, Outstanding Act)• Mitie (Best Team, Outstanding Act)• SGS (Service to the Customer)• Amulet (Outstanding Act)• Robinson Services (Best Team)

“IT IS VITAL AS THE VOICE OF

THE PROFESSIONAL

SECURITY INDUSTRY THAT WE RECOGNISE

THE GREAT LENGTHS SECURITY

PERSONNEL GO TO IN KEEPING

THE PUBLIC AND PROPERTY

SAFE”

Mike Reddington, Chief Executive, BSIA

The British Security Industry Association (BSIA) have announced the regional winners of the Security Personnel Awards.

Outstanding security personnel work to be recognised by BSIA

The British Security Awards is the national event that recognises the talent and commitment of our industry’s finest.

Organised by the British Security Industry Association, the British Security Awardscelebrates the achievements, acts of bravery and innovations made by members of theUK’s security industry.

The regional winners will now go forward as national finalists to the British Security Awards held in London on July 10 at the Marriott Hotel, Grosvenor Square.

The BSIA holds its annual awards to celebrate excellence in security both regionally and nationally for some of the truly outstanding personnel within the industry, recognising those who have gone above and beyond the call of duty in their everyday work.

For over 20 years these awards, sponsored by Camberford Underwriting, serve to recognise the talent, dedication, skill and bravery exhibited by security personnel in their roles. Each year, the BSIA is inundated with fantastic nominations, from literally saving lives to being instrumental in police investigations, demonstrating just how committed and admirable security personnel are. In 2019 the regional winners have exhibited some truly outstanding acts of bravery, customer service, teamwork and forward thinking from across the United Kingdom representing a broad spectrum of BSIA members and their clients.

Mike Reddington, Chief Executive of the BSIA said: “It is vital as the voice of the professional security industry that we recognise the great lengths security personnel go to in keeping the public and property safe. More often than not, these security professionals are first on the scene when incidents and emergencies occur, and they demonstrate true quality and professionalism in their actions. This year’s regional winners are no exception and have shown remarkable achievements throughout the past year.

“Judging all the inspirational nominations was a tough task, especially as the process included a substantial number of entries. This year’s winners should be immensely proud of their achievements and we wish them the best of luck as they go forward to the national stage at the British Security Awards in July.”

There are 16 categories to choose from; five devoted to security personnel (Best Newcomer, Best Team, Best Use of Technology, Service to the Customer and Outstanding Act), Innovative Security Project, Apprentice of the Year, International Partnership, and the SaferCash Bravery Awards (industry and public). There are a further five new categories this year to nominate from: National Partnership, Entrepreneur of the Year, Small, Medium and Large Business of the Year and Contribution to the Industry.

Nominations for security personnel closed on 29 March and for all other awards ended on 1 May. The 2019 regional winners are:

• VSG (Best Newcomer, Best Team, Outstanding Act, Service to the Customer)• SecuriGroup (Best Newcomer, Outstanding Act)• OCS Group (Outstanding Act, Best Team)• Westgrove Group (Service to the Customer, Best Use of Technology, Outstanding Act)• MAN Commercial Protection (Best Team)• G4S (Best Newcomer, Outstanding Act)• Mitie (Best Team, Outstanding Act)• SGS (Service to the Customer)• Amulet (Outstanding Act)• Robinson Services (Best Team)

“IT IS VITAL AS THE VOICE OF

THE PROFESSIONAL

SECURITY INDUSTRY THAT WE RECOGNISE

THE GREAT LENGTHS SECURITY

PERSONNEL GO TO IN KEEPING

THE PUBLIC AND PROPERTY

SAFE”

Mike Reddington, Chief Executive, BSIA

The British Security Industry Association (BSIA) have announced the regional winners of the Security Personnel Awards.

Outstanding security personnel work to be recognised by BSIA DESIGNERS, MANUFACTURERS AND

INSTALLERS OF AWARD-WINNING PERIMETER SECURITY PRODUCTS

www.heald.uk.com+44 (0)1964 [email protected]

@healduk Heald Ltd

INNOVATING TO CREATE SECURE AND SUSTAINABLE ENVIRONMENTS WITH OUR ELECTRO MECHANICAL RANGE

The HT3 Matador 4 is IWA crash tested to halt a 7.2 tonne truck @ 50 mph!

Security Buyer - Full Page Advert -.indd 1 16/05/2019 16:21:59

DESIGNERS, MANUFACTURERS AND INSTALLERS OF AWARD-WINNING PERIMETER SECURITY PRODUCTS

www.heald.uk.com+44 (0)1964 [email protected]

@healduk Heald Ltd

INNOVATING TO CREATE SECURE AND SUSTAINABLE ENVIRONMENTS WITH OUR ELECTRO MECHANICAL RANGE

The HT3 Matador 4 is IWA crash tested to halt a 7.2 tonne truck @ 50 mph!

Security Buyer - Full Page Advert -.indd 1 16/05/2019 16:21:59

048 ISB www.securitybuyer.com

TRAINING

Research finds that companies that have a diverse workforce can out grow the competition. The changing role of women in the Middle East is becoming commonplace

Changing role of women in the Middle East

The role of women in Middle Eastern workplaces and governments is changing. Those in the West who haven’t had first-

hand experience working in the Middle East might find these developments surprising given the region’s seemingly divergent attitudes and laws regarding gender parity. But because of the commercial imperative for diversity, there is a visible appetite for change.

Companies in the top quartile for gender diversity are 21% more likely to experience above-average growth than competitors in the fourth quartile, according to compelling research from McKinsey. The guidance is clear: increasing gender diversity is a simple step towards better decisions and greater corporate growth. This empirical evidence, often revalidated, has led to an increasing concern in the Middle East and elsewhere that companies that do not embrace its findings, especially in changing economic times, will fall behind on performance and fail to attract top talent.

So it is unsurprising that today nine of the members of United Arab Emirates President Sheikh Khalifa’s cabinet are women, and around a third of start-ups in the UAE are run by women. While the growing visibility of

women in politics is yet to translate into equality legislation, there is a strong push for change from the bottom up. Despite this momentum, the culture of the Middle East is not quite at the same stage as the London insurance industry was when I first joined the latter 20 years ago, but there are analogies and lessons to be drawn.

Five ways to increase gender parity

1. Keep it simple and don’t entertain excuses for delayStart with the “why” in communicating the commercial imperative for change, and don’t let perfection be the enemy of the good. Some may say they haven’t the proof of the need for diversity in their organization, but just look at the evidence. Others have done that research for us. Some may use excuses like, “you can’t measure gender diversity because the data isn’t available”, but you don’t need data to see if your leaders are male or female. That’s the great thing about gender diversity - it’s obvious whether you have it or not. Don’t allow people to make excuses for not being able to start moving the dial. 2. Build your pipelineYou need to have a diverse range of people entering your organization to build diversity

within it, and you also need to retain the women who are there. Make sure your training and development is relevant and available to all, and be aware that flexible and agile work environments help ensure that

3. Ensure you have diverse slates of applicants and diverse interview panelsThe most simple and cost-effective way to build diversity is to make sure you have a diverse slate of people when selecting people for promotion, especially into senior roles, or recruiting applicants from outside. Take time to find a suitably qualified pool of applicants and if the pipeline doesn’t yet exist, don’t be afraid to look outside your organization. And ensure that the selection panel is in itself diverse. Diverse selection panels encourage debate and minimize the impact of both unconscious bias and the risk of a sole decision-maker recruiting in their own image.

4. Look at your teamsRemember to think about the teams into which you place people. You need diversity of thought for good decision-making, so it’s not just about recruiting women. The benefits of gender parity work both ways. There might be little point putting a woman on an all-female team. You may need a man to broaden perspectives.

5. Commit to mentoring and sponsoring women (and men) with high potentialAs leaders and role models, we all have valuable life lessons to share and guidance to give that can help shape our future leaders, but it takes time and commitment. Counselling and showcasing best practices and behaviours (mentoring) and sponsoring young talent for stretch assignments or roles is more valuable than any costly external coaching or training, though these too have their place.

050 ISB www.securitybuyer.com

FACTORIES

Qatar Rail’s soft launch this week of its brand-new Doha Metro a year early bodes well for the nation’s ambitious mega-project

Doha Metro embarks on an historic journey

The ‘preview service’ of Qatar’s new urban transit rail features air-conditioned, trains travelling at 100 km/hr between gleaming

stations designed to evoke traditional tents and mother-of-pearl and marks a major milestone on track for the World Cup 2022 as well as a considerable triumph for its leadership.

Doha Metro is already notable among major international infrastructure projects for launching ahead of schedule and within budget while maintaining an impressive safety record, with work on its Green Line alone at one point showing a log of six million man-hours without lost time injury. With over three-quarters of its contracts awarded to local companies, the project can also justifiably claim to have contributed substantially to Qatar’s economic buoyancy, while delivering a major part of the National Vision 2030 led by the Emir.

Eng. Abdulla Saif Al Sulaiti, Chief of Service Delivery at Qatar Rail, said: “The preview service is a testament to the tremendous efforts carried out by Qatar Rail’s executive teams and board of directors, as well as the continuous support of His Excellency the Prime Minister and the Minister of Interior, Sheikh Abdullah bin Nasser bin Khalifa Al Thani. The outcome of the preview service is essential for us, and we will build on these as we prepare for the full opening of the network by 2020.”

Ajlan Eid Al Enazi, Chief of Strategies and Business Development at Qatar Rail, said: “Doha Metro is considered one of the key pillars of Qatar’s new integrated transport system. We invite everyone to share with us their experience of the metro during this phase so that we can review build on the factors and develop solutions to enhance the passenger experience.”

The preview service comprises a section of the coastal Red Line scheduled to open weekdays 08.00–23.00 with trains every six minutes, closing at weekends for work to continue. Full network is set to open in 2020, including the Al Hamad airport branch line and the Gold, Green and (eventually) Blue Line, connecting other major destinations including five World Cup stadiums, Education City and historic sites. Smart integration with local transport services is intended to further reduce car use in the

crowded city.This efficient, clean, and convenient public-transport system will help to distinguish Qatar as an advanced society capable of achieving sustainable development and maintaining excellent environmental credentials in the run-up to the World Cup, and the launch of the Doha Metro, set to be the fastest of its kind in the region, can only provide a huge boost to the nation’s ambitions as a sporting, touristic and business destination.

“THE OUTCOME OF THE PREVIEW SERVICE IS ESSENTIAL FOR US, AND WE WILL BUILD ON

THESE AS WE PREPARE FOR THE FULL OPENING OF THE NETWORK BY 2020”

ISB 051www.securitybuyer.com

FACTORIES

The in-air communications market is set to grow from its current market value of over US$ 1.5 Billion to US$ 2.9 Billion by 2025, according to a new report by Global Market Insights

Aircraft communication systems market to beat US$ 2.9 Billion by 2025

Rapid globalization in conjunction with increasing air connectivity across new destinations will showcase potential opportunities

for air travel over the forecast period. Moreover, expansion in the tourism and defense industry are the key factors expected to escalate air carrier demand over the study timeframe. Introduction of new aircrafts with a focus on reducing weight and incorporation of advanced avionics are boosting the aircraft communication system market over the study timeframe.

Industry participants are continuously investing in R&D for developing innovative communication solutions further boosting the market share. For instance, in May 2016, NASA and FAA demonstrated innovative wireless technology that offers seamless transmission including sending route options and weather information. The Aircraft Access to System Wide Information Management (SWIM) enables efficient wireless operations with a taxiing speed of up to 70 miles per hour. These trends will positively influence aircraft communication system market over the coming years.

Major regulatory bodies including International Civil Aviation Organization (ICAO) and FAA regulate aircraft communication systems marketplace to ensure fast and accurate exchange of information. Stringent regulations pertaining to air carrier safety has encouraged industry participants to invest more on development of signal transmission systems. Regulatory policies for replacement of outdated systems including IFR and VFR are positively influencing the market over the projected timeframe.

SATCOM systems accounted for a significant volume share in the aircraft communication system market owing to efficient earth-based information flow to aircraft located anywhere across the globe. It is associated with the Aircraft Earth Station (AES), Ground Earth Station (GES), and satellites that facilitate the efficient use of telecommunication devices for aircraft and weather monitoring. In addition, it provides data and voice communication systems for governments and military platforms, further augmenting the aircraft communication system market growth.

Antennas hold a substantial potential to capture the aircraft communication systems market. The requirement for constant transmission of signal from air carriers to ground air traffic control for maintaining the flight during the course of its journey are supporting the segment share over the study timeframe. Moreover, the availability of a multiple range of antennas with varied size and transmission capabilities based on the flight application further supports the aircraft communication system market share over the study timeframe.

Commercial air carrier will witness prominent growth in the aircraft communication system marketplace.

Proliferating air carrier production across the globe owing to rising air passenger traffic are boosting the segment growth over the study timeframe. For instance, in 2018, Airbus SE deliveries rose to 800 commercial aircrafts with an increase of 11% as compared to 2017. Growing adoption of low-cost carriers along with improving regional connectivity are escalating the industry size over the study timeframe.

Europe aircraft communication system market share will witness robust growth owing to government initiatives on precautionary measures on accidents along with stringent regulations on air carrier inspection & safety. Increasing adoption of advanced technologies to enhance travel safety and avert air carrier accidents will propel the industry demand over the projected timeframe.

Major players operating in the aircraft communication system market include L3 Technologies, Iridium Communications Inc., Harris Corporation, Honeywell Aerospace, Lockheed Martin, Northrop Grumman Corporation, Raytheon and Rockwell Collins, Inc. Industry participants are engaged in strategic acquisitions and mergers for expanding their market share.

Verified.Me is now available for Canadian consumers of select financial institutions, with more to come in near future

Securekey bring digital identity network to market

SecureKey Technologies Inc., a leading provider of federated identity and authentication solutions, announced that its

digital identity network, Verified.Me, is now available for consumers of CIBC, Desjardins, RBC, Scotiabank and TD across Canada. Beginning today, Canadian customers and members of these financial institutions will be able to use Verified.Me to help verify their identities online with the services they need in a privacy-enhanced and secure way, with BMO Bank of Montreal and National Bank of Canada to launch soon. Sun Life Financial Inc. has signed on as an early adopter and the first North American insurer on the service.

This approach to digital identity brings together the best capabilities of numerous parties including financial services, telecommunications and insurance providers, to create a holistic approach to digital identity that will protect the interests of consumers and businesses as they

participate in today’s digital economy. Verified.Me is a digital identity and attribute sharing network, built on top of blockchain technology, that simplifies the sharing of personal information to help with identity verification in a safe way, allowing consumers to quickly and securely share information with participating service providers, while enabling businesses to achieve more streamlined, effective and cost-efficient client services and onboarding.

“This announcement marks the first time that consumers are officially able to access the Verified.Me application and gain greater control over their digital identities,” said Greg Wolfond, Founder and CEO, SecureKey Technologies. “Digital identity is one of the most enduring challenges of our time and having the opportunity to showcase how a network of cross-industry organizations can come together to build a solution by and for consumers is an honour. We are excited to bring this first-

of-its-kind network to market and look forward to its expansion as new participants join our service.”

“As Canadians increasingly turn to digital channels, it’s important to continue to develop solutions that create a more seamless way for Canadians to get access to the products and services they need,” said Brett Pitts, Chief Digital Officer, BMO Financial Group. “With Verified.Me, Canadians can now have an easier and more secure way to share their personal information, and it puts them in control to share that information when and how they want.”

“This initiative will play a critical role in further meeting consumer expectations for privacy and trust when transacting digitally,” said Greg Elcich, Vice President Enterprise Innovation, CIBC. “We are proud to be part of this effort and are looking forward to the enhanced experiences and benefits for CIBC clients.”

052 ISB www.securitybuyer.com

FACTORIES

“The issues with identity today would be impossible to tackle without strong industry collaboration,” said Yann Jodoin, Head of Payments and Everyday Banking, Desjardins. “For us, the digital shift is about more than just technology – it’s a way of offering services designed to meet the needs and expectations of our members and clients. It’s an opportunity to make choices that will add value for them – and for society. By taking a network approach with Verified.Me, we provide our members with a stronger control over their information and the ability to use that information where and when they want, with peace of mind thanks to improved privacy and security.”

“Verified.Me uses blockchain technology to make the online identification process faster, more private and more secure for consumers,” said Lionel Pimpin, Senior Vice President, Digital Channels, National Bank of Canada. “This solution aligns perfectly with National Bank’s commitment to providing a simple and unified digital experience.”

“Security and trust are two expectations that consumers have when it comes to their personal information and digital identity. Creating seamless and convenient experiences that consumers have come to expect, based on these imperatives of security and trust, are fundamental to meeting their evolving digital needs,” said Peter Tilton, Senior Vice President, Digital, RBC. “The collaboration between industry

partners to launch Verified.Me is a testament to our collective focus on the consumer as we strive to bring incremental value to their everyday digital interactions.”

“Verified.Me has been a combined effort of several network participants’ dedication, openness and innovative thinking,” said Katie Greenberg, Vice President, Digital Products and Retail Payments, Scotiabank. “We are entering a new era in which Canadians can clearly and confidently assert when, why and with whom their digital identity assets are shared. We are eager to offer this solution to our customers and look forward to setting the gold standard of digital identity worldwide.”

“By participating in SecureKey’s new Verified.Me service, we are putting technology to work for our customers to help them access the services they need in a digital world,” said Rizwan Khalfan, EVP and Chief Digital and Payments Officer, TD. “We are proud to be one of the first to offer our customers a simpler, more secure way to share their information in order to transact online.”

“The launch of Verified.Me is an exciting step towards making it easier for our Clients to do business with us and ensuring that their access to Sun Life services is safe and secure,” said Mark Saunders, Executive Vice-President and Chief Information Officer, Sun Life. “To be able to bring this to market and provide Canadians with more control over their digital identities speaks to the importance of industry partnerships and collaboration to spark innovation.”

Along with Canada’s major financial institutions, a number of key digital identity network participants and innovation partners have helped to bring Verified Me to market, including the Digital ID and Authentication Council of Canada (DIACC), the US Department of Homeland Security Science and Technology Directorate (DHS S&T), Global Privacy and Security by Design, EnStream, Equifax, IBM and Prodigy Labs. Verified.Me is built on top of the IBM Blockchain Platform which is based on Linux Foundation’s open source Hyperledger Fabric v1.2 and will be interoperable with Hyperledger Indy projects.

ISB 053www.securitybuyer.com

FACTORIES

“THIS ANNOUNCEMENT MARKS THE FIRST TIME THAT CONSUMERS ARE OFFICIALLY ABLE TO ACCESS THE VERIFIED.ME APPLICATION AND

GAIN GREATER CONTROL OVER THEIR DIGITAL IDENTITIES”

xxx xxx

054 ISB www.securitybuyer.com

FACTORIES

Airport will be able to offer advanced biometric technology and improve safety and security for passengers at an important regional hub

Vision-Box provide Border Control Platform for Bahrain Airport

Vision-Box,a provider of biometric-based travel and digital identity solutions, is set to supply Bahrain International Airport’s new

Passenger Terminal Building with a state-of-the-art Automated Border Control platform.

Located in Muharraq, Bahrain International Airport (BIA) serves as an important hub in the Gulf region. It is currently being transformed through the Airport Modernisation Programme (AMP), one of the biggest national projects in the Kingdom’s history.

The AMP will elevate BIA’s infrastructure, facilities, and services, transforming it into a world-class boutique airport and a key driver of national economic growth. The crowning jewel of the AMP is the new Passenger Terminal Building, which will increase BIA’s capacity to 14 million passengers a year and offer users an improved travel experience.

The new Passenger Terminal Building will be equipped with advanced biometric technology to improve safety and security while offering passengers added convenience.

Bahrain Airport Company (BAC) Chief Executive Officer, Mohamed Yousif

AlBinfalah, said: “One of the Airport Modernisation Programme’s most important objectives is to enhance the overall airport experience. The new Automated Border Control platform will play a key role in achieving this goal by giving passengers more control over their journeys and streamlining time-consuming immigration and security formalities. BAC is pleased to partner with Vision-Box to bring this state-of-the-art technology to BIA. I am confident that the new platform will help to reinforce our status as a friendly and efficient airport.”

The Vision-Box-designed Automated Border Control platform will streamline border control monitoring and inspection for both Departures and Arrivals at BIA. In addition, 22 new eGates will enable travellers to pass through immigration checkpoints faster and with less staff involvement, while still maintaining a high level of security. The eGates will verify

passengers’ identities, using biometrics including facial, iris, and fingerprint recognition.

The new Passenger Terminal Building will utilise a complete multi-modal biometric identity management solution, catering for different passengers’ profiles. Vision-Box continues to support these advancements in the region, currently operating more than 200 airport solutions in the Middle East.

Miguel Leitmann, Vision-Box CEO, said: “Vision-Box technology naturally matches BAC’s goals. It’s a proven solution that will significantly augment the terminal processing capacity, streamline the passenger flow, improve security and enhance the appeal of using the airport.

“Bahrain International Airport now joins the leading group of airports in the region that are using trusted biometric-based technology to support their growth plans. It’s an honour to be part of this program together with BAC. We believe the new airport has what it takes to be a passenger experience benchmark and will certainly have a positive impact in Bahrain and the region, and on the lives of passengers.”

The Vision-Box-designed solution will be inaugurated with the opening of the new Passenger Terminal Building in the third quarter of this year.

“THE NEW AUTOMATED BORDER CONTROL PLATFORM WILL PLAY A KEY ROLE IN ACHIEVING

THIS GOAL BY GIVING PASSENGERS MORE CONTROL OVER THEIR JOURNEYS AND

STREAMLINING TIME-CONSUMING IMMIGRATION AND SECURITY FORMALITIES”

ISB 055www.securitybuyer.com

According to a study, the global perimeter intrusion detection market is likely to record a total incremental opportunity of US$25,679.2m during the forecast period of 2018 to 2028

Next-gen technologies benefits perimeter detection market

Nowadays, for several industrial verticals, perimeter intrusion detection system is in the focal point when it comes to

establishing a security plan. Industry verticals across the globe are adopting advanced security and surveillance systems to increase their internal and external security.

Moreover, governments across the globe are increasing the security at their borders for protection against terrorist attacks. These are some of the prominent factors that are boosting the global perimeter intrusion detection market. The global perimeter intrusion detection market report has segmented the global

perimeter intrusion detection market by component, by type, by vertical, and by region. The component segment is further segmented into solution and services. Due to rapid adoption of next-generation and cloud-based solutions, the solution sub-segment is expected to create potential growth opportunities for the providers of perimeter intrusion detection solutions.

The global perimeter intrusion detection market is sub-segmented into barrier-mounted, ground-based, free-standing, and rapidly deployable. Due to the rising integration of advanced sensors with barrier-mounted perimeter intrusion detection systems, the market is expected to witness an incremental opportunity of US$ 7,494.6 Mn between 2018 and 2028. On the

other hand, the ground-based perimeter intrusion detection system sub-segment is expected to exhibit a CAGR of 14.3% during the forecast period.

Based on vertical, the perimeter intrusion detection system market is sub-segmented into military and defence, government, industrial, critical infrastructure, commercial, residential, and others. Due to increasing demand from the commercial sector, the commercial sub-segment is expected to create potential growth opportunities for the providers of perimeter intrusion detection systems. Furthermore, with the rising adoption of advanced security systems in the industrial sector, the industrial sub-segment is expected to grow with a high CAGR during the forecast period.

PERIMITER PROTECTION

Protecting our schools involves deployment of a range of security and physical hardening tools

Protecting Education Campuses with AI Video Solutions

Maintaining an educational environment that is conducive to learning requires, at a minimum, that we keep our

school children safe and secure. It’s easier said than done, given the wide range of sizes and types of educational institutions.

High-profile violence in educational environments highlight the urgency of the need for security and safety systems, and the challenges extend beyond preventing the active shooter incidents that grab headlines. In the United States, 79% of public schools recorded that one or more incidents of violence, theft, or other crimes had taken place, amounting to 1.4 million crimes. That translates to a rate of 29 crimes per 1,000 students. (See footnote 1 below)

Security is a 24-hour challenge. Protecting our schools involves deployment of a range of security and physical hardening tools. Reducing risk requires that access to school buildings be controlled, while also preserving an ‘open’ campus atmosphere that promotes a learning environment. Schools should be an inviting place for students and families, so technology solutions aimed at restricting access

should be low-profile and unobtrusive. School security must also be designed in layers, or concentric circles of protection, starting at the school’s perimeter and working inward to secure individual classrooms and other internal areas.

How technology can help

Video surveillance is a technology that is unobtrusive and can promote security beginning at the outermost boundaries of the school environment – at the perimeter and as automobiles drive onto school grounds. Surveillance can keep a silent and constant watch on people comes and goes. Furthermore, incorporating new artificial intelligence (AI) and deep learning technologies are increasing the real-time capabilities of video surveillance to provide early warning of a possible security threat

as it enters a campus. AI and deep learning analyse the content of video feeds and provide usable information to security personnel, including analysis of trends and real-time alarms when an event takes place.

In addition to controlling perimeter access, video surveillance incorporating AI can also provide other benefits, such as keeping watch on a school campus after hours – before and after school, or even on weekends when extra-curricular activities may be taking place. The systems can monitor traffic flow and ensure that only authorized vehicles enter an area. The benefits of AI-driven video systems also enable greater effectiveness of systems that are not being actively monitored. Video feeds are analysed in real-tim and alarms can be raised only if there is a problem.

Use case: Controlling illegal parking and restricted areas

Whenever a vehicle passes into a restricted area on a school’s campus, the video system captures a vehicle image and automatically provides significant data.

Automated number plate recognition (ANPR) systems identify the license numbers of cars that enter a school’s parking entrance or gate and can match the numbers to a watch list and provide an alarm. The technology could also be used to monitor compliance with restricted areas;

“SCHOOL SECURITY MUST ALSO BE DESIGNED IN LAYERS, OR CONCENTRIC CIRCLES OF

PROTECTION, STARTING AT THE SCHOOL’S PERIMETER AND WORKING INWARD TO SECURE

INDIVIDUAL CLASSROOMS AND OTHER INTERNAL AREAS”

056 ISB www.securitybuyer.com

PERIMITER PROTECTION

for example, to only allow vehicles that registered for a parking pass to park in a certain lot. A more advanced approach could involve dual identification technologies – vehicle plate and facial recognition of a driver – to add another layer of security.

Video systems with illegal parking detection can define a zone for no parking at a school. If any vehicle enters the area, the camera will be triggered to collect evidence. Images are captured of illegally parked vehicles, and the system provides data about when and where it occurred, the vehicle plate number and the parking violation.

Use case: Controlling ‘buses only’ and restricted areas

Traffic cameras with deep learning technology can also identify and classify vehicles; in effect, to distinguish between small and large vehicles and even detect a vehicle’s make, model and colour. For instance, it is possible to differentiate between cars and buses in ‘buses only’ areas. Currently such cameras are more commonly deployed on public streets and highways, but the capability is there.

The system can also capture images and produce alarm data if a vehicle is driven in the wrong direction, such as into an exit-only lane or the wrong way on a roadway.

Use case: Facial recognition at school entrances

Facial recognition can be used at school entrances and gates to promote security of

students and staff and to identify known suspects who attempt to enter the building. ‘Blacklist alarm’ technology generates a notification if a known suspect enters.

Clarity is paramount when identifying faces, and cameras that provide wide dynamic range (WDR) can offset challenges such as backlighting on a bright day when the light behind a person coming in is brighter than the ambient light inside.Facial recognition systems can also be used inside school buildings. A facial recognition terminal installed at the entrance of a campus building or library can be configured to ensure that only registered students and staff have access to the buildings.

People counting cameras can be used in cafeterias and libraries to provide daily or monthly traffic reports and to better understand peak times and arrange workflow accordingly.

Unified solution combines various applications

Feeds from all the cameras can be managed, monitored and stored in an authorised security centre, either located on a campus or in a central location that combines camera feeds from multiple campuses in a school district, for example. In general, security staff can access surveillance data in a variety of ways, via a desktop, laptop, or mobile device. Such flexibility makes the job of security personnel easier. A campus police or resource officer can view video on a mobile device while patrolling the campus.

Often video surveillance systems at schools are not monitored. School security personnel have more pressing duties than sitting in front of a video monitor, and it is difficult for operators to stay alert for detailed incidents that may be shown on the screen. Tedious and error-prone manual monitoring can now be replaced by more intelligent systems that provide alarms only when there is something to see.

A defence line for safer learning environment

Systems to maximize school surveillance and security include dedicated, high-performance cameras for event capture, embedded network video recorder for event recording and storage, and a centralized video management platform to unify the system. AI and deep learning technologies automate security processes and provide useful real-time information that extends beyond video images. Deploying these technologies at the perimeter can promote better security campus-wide by preventing danger from entering the learning environment.

ISB 057www.securitybuyer.com

PERIMITER PROTECTION

058 ISB www.securitybuyer.com

PERIMETER PROTECTION

Frontier Pitts will be exhibiting at the IFSEC Exhibition at Excel, London between the 18th and 20th of June 2019.

Frontier Pitts at IFSEC 2019

Stand No IF450

Frontier Pitts will be showcasing a fully operational LPS1175 Automatic Bi-folding Gate SR2 on the stand.

Many clients had been installing unrated Security Gates that had not been tested alongside LPS1175 security rated fence lines. By testing and upgrading certain elements on all models of our Automatic Security Gates, Frontier Pitts is now pleased to bring to the market the first complete LPS1175 Anti-Intruder Gate Range to the market, introducing another perimeter security layer to the security onion.

The Platinum Automatic Security Gate range with Security Ratings of 2 and 3 includes:Platinum Sliding Gate up to 10m widePlatinum Bi-folding Gate: double leaf up to 10m wide, single leaf up to 5m wide

Platinum Hinged Gate: double leaf up to 10m wide, single leaf up to 5m widePlatinum Pedestrian Gate: Fully Automatic, Semi-Automatic, Manual operation.

The Platinum range joins our large portfolio of high security products, further bridging the gap between Frontier Pitts Security Range and our High Security Anti-Terra IWA14/PAS68 impact tested products, enhancing our accreditations further. We can offer the complete solution for all Mob Attack scenarios and Crowded Place, Public Realm venues.

Our Technical Consultants will be available to discuss your Perimeter Security requirements, and advise on the best IWA 14, PAS 68 & LPS 1175 solutions.

LPS 1175

Requirements and testing procedures for

the LPCB approval and listing of intruder resistant free-standing barriers.LPS 1175 covers the broadest scope of physical security products and services of any publicly available standard in the world. LPS 1175 is the result of many years of work by LPCB, Government, Insurers and Police, and has rapidly become a core element of physical security specification across many sectors. The standard comprises a number of security ratings with test requirements of ascending intensity. These are measured in terms of attack tools and time available to the attacker and enables specifiers to select products according to the risks that they and their property face. LPS 1175 can be used in a range of applications, including critical infrastructure projects.

The correct specification of Security Products and systems is critical in protecting people and property from losses associated with crime and terrorism.

ISB 059www.securitybuyer.com

ACCESS CONTROL

The modern threat landscape calls for security teams to remain alert to a wide range of hazards – both physical and cyber

More advanced tools needed to deal with influx of threats

New technology has had a catalytic effect on cybercrime, with hackers increasingly crossing the boundary into the physical security sphere due to the digital vulnerabilities of the likes of access control systems.

The onus on hardening physical and cyber security procedures has therefore never been greater. While system administrators are invariably aware of the critical nature of security systems, they often lack the tools to assess the potential exposure of their software, operating systems and physical security devices.

For example, according to our own research, 23% of users have at least one camera that uses default credentials. However, with greater connectivity of systems over the internet, an unsecure device can become the gateway to accessing a large amount of data and information. Put simply, working to protect a physical security system is also working to protect all of the other systems and data on that network.

Due to the threat from this continued convergence, Genetec’s Security Centre

5.8 offers a powerful new tool for system administrators to protect software, operating systems and physical security devices. An open-architecture platform, it unifies video surveillance, access control, automatic number plate recognition (ANPR), communications, and analytics, and aims to tackle these common challenges security professionals are currently facing.

A key feature of Security Centre’s interface is the ability to monitor a security system while on the go - through a mobile app which gives operators a valuable new asset in the security environment. This app allows users to record incidents, access nearby video and access control, as well as sharing video from their phones to Security Centre. This provides the user with actionable information, that can be shared across the whole security team – allowing them to respond according to the situation at hand.

In addition, this is displayed in user-friendly,

highly customisable dashboards, presenting all desired information logically, including real-time data from the scene of an ongoing incident. These dashboards show live video feeds from the exact locations where an alarm may have been triggered and provides users with insightful reports and charts depending on their interest area. It also helps address system weaknesses, by providing a Security Score to track each system’s compliance with hardening guidelines, firmware availability/updates, and password strength. As mentioned above, when one in four firms are leaving their technology to run via default passwords, a huge threat-scape is opened up. Available through the built-in System Health dashboard, Security Score will measure individual cybersecurity processes and verify that they are followed by the system.

As threat prevention has become more sophisticated, so has the amount of technology available. This has resulted in sprawling systems encompassing various technologies and providers, all of which need integrating into one, coherent system. Security Centre achieves this by presenting all the data in a logical way, via customisable dashboards.

Consequently, security infrastructures are vital in mitigating threats – integrating everything from biometric identification through to perimeter security.

“A KEY FEATURE OF SECURITY CENTRE’S INTERFACE IS THE ABILITY TO MONITOR A

SECURITY SYSTEM WHILE ON THE GO”

060 ISB www.securitybuyer.com

ACCESS CONTROL

Traka is attending IFSEC 2019 to showcase the latest advances in key and asset management

Traka’s Global Integration Solutions on show at IFSEC 2019

Intelligent management solutionsfor keys and equipment

Learn more at traka.com

Control Access Track UsageSave Time Drive Process

Traka systems enable you to secure, manage and audit the use of almost any asset, including premises, devices, secure areas, equipment, machinery and vehicles.

Traka provides intelligent key and equipment management to better protect your important assets – resulting in improved efficiency, reduced downtime, less damage and fewer losses which in turn means less administration and lower operating costs.

Visit us at IFSEC International on stand IF105

TRK14037 Key Management Advert A4 AW.indd 1 29/03/2019 15:23

Traka will be showcasing its latest advances in key asset management together with innovative technical development

and integration capabilities, developed as part of its journey to becoming a Global Solutions provider.

Traka systems enable you to secure, manage and audit the use of almost any physical asset, including: premises, devices, secure areas, equipment, machinery and vehicles. Traka provides intelligent key management and equipment management to better protect your important assets - resulting in improved efficiency, reduced downtime, less damage and fewer losses which in turn means less administration and lower operating costs.

Originally, Traka was a manufacturer of one of the world’s first electronic key management systems in 1990 and are now considered providers of innovative technology for sophisticated, intelligent key management systems and lockers solutions to manage and control access to your most important assets.

On stand IF105, the industry leader in intelligent management solutions for keys and equipment will unveil its latest

generation Traka Web software, offering remote administration with the benefits of faulty item exchange, fleet management and full audit control capability. It can be recorded with instant email notifications linked to specific item movements.

Traka will also be highlighting its integration credentials with leading access control providers, to present increased efficiency, resource and significant cost savings, without compromising on safety or security.

Says Steve Bumphrey, Traka UK Sales Director: “IFSEC has continually evolved with the changing landscape of security, introducing new sectors and recognising truly innovative companies together with their products and services. It was an obvious choice for Traka to attend and highlight our new position as a global solutions provider.

“The journey has enabled us to really advance our technical product development, with an expanded R&D team. We are thrilled to demonstrate how our technical innovations such as Traka Web can present powerful user functionality. And to deliver our systems with the latest integration to assist with access control, we can really show our ability to offer customers

smart solutions that display full visibility of assets anytime, anywhere.”

On the stand, visitors will be able to see Traka’s latest system offerings, including specialist lockers that are modular and scalable. Bespoke in design and created to manage equipment such as body-worn camera technology, which is increasingly being adopted by a number of sectors and often required to be instantly available for use in fast moving situations.

Traka’s dedicated Tablet Locker System will be used as a part in a dedicated integration zone, showcasing our ability to meet customer needs for a seamless security management system.

Traka’s innovative key management portfolio, including scalable L-Touch and M-Touch solutions, offer simple ways to control keys and manage different facilities, including full and compliant audit trail capability of keys and users.

For more information on Traka’s product portfolio of intelligent asset management solutions, please visit stand IF105 at IFSEC 2019, taking place between 18 – 20 June 2019 at Excel, London.

www.traka.com

Intelligent management solutionsfor keys and equipment

Learn more at traka.com

Control Access Track UsageSave Time Drive Process

Traka systems enable you to secure, manage and audit the use of almost any asset, including premises, devices, secure areas, equipment, machinery and vehicles.

Traka provides intelligent key and equipment management to better protect your important assets – resulting in improved efficiency, reduced downtime, less damage and fewer losses which in turn means less administration and lower operating costs.

Visit us at IFSEC International on stand IF105

TRK14037 Key Management Advert A4 AW.indd 1 29/03/2019 15:23

Sagit Manor joined former President Barack Obama at a celebratory luncheon in Dallas to celebrate women in the technology industry

The sky is the limit: Women in technology

After a career in the technology industry spanning two decades, Sagit Manor, will be recognised as one of the 50 leading women

in the industry at an event with the former President of the United States, Barack Obama.

As the CEO of Nytron, a company set up just 18-months ago, she has now become one of the most powerful women in the technology industry and hopes that her position will help to inspire other women and girls to do the same and reach for the top in which ever profession they take up.

This is the main message she gave during a recent interview with Security Buyer after the announcement by The California Diversity Council is proud to announced Top 50 Most Powerful Women in Technology for 2018.

Manor said: “It is a great honour to be named as one of the most powerful women in technology and I will use that to help inspire the next generation of women and to be a role model and I greatly look forward to

meeting [former President Barack] Obama.Talking about how this award will help others she said: “This can be helping them to set goals or inspire start-ups, helping to raise awareness within the industry and provide senior roles with support networks. In this joining support networks is necessary as this will not only give you support but also help to inspire others.

“As I tell my children, the sky is the limit.”

The names on that list were selected following a criteria that included them being a top leader in her organisation, directly responsible for growth or strategic vision, corporate leadership, has a record of accomplishment(s), operates to the highest ethical integrity and behaviours and provides an effective role model for other women to follow and mentors the next generation.

These were qualities that have shone through her career to date after graduating from college in 1998 she began her career in the US at Lipman Electronic engineering,

where she became the first person to fill the Corporate Controller position.She then worked at Verifone for more than a decade during which she rose to the position of VP & CFO, Verifone Solutions, where she was a key member of VeriFone’s senior team that drove the Finance Department which supported VeriFone’s overall business objectives.

Since setting up Nytron she said: “I’m honoured to be managing the most innovative company in cybersecurity today. A truly disruptive innovator with a global team of security experts and professional support teams monitoring endpoints all around the world (we call it the Nyotron War Room).”

Talking about her company she said: “The Nytron Paranoid system is not like other systems out today. The way our system operates is like using a satnav and it learns the right way of doing something. It will learn all the ways something can be done and then find the gaps in that learning.

Manor further elaborated “That means that once it has found all the ways that are bad then the only way left is good. It will not follow the bad ways, as it follows legitimate behaviours. At present anti-virus can stop 50% to 80% of hacks from happening but this solution can close that gap.

“It takes anti-virus software to the next level and closes the gap that is left as hacking is a numbers game and the more that you can stop those that are left are easier to deal with.”

So confident is she in the software that it is used by El Al airlines where it provides a visible deterrent, is intelligent in operation and is incident responsive. But it is not the only area that this is used, as it is also used

062 ISB www.securitybuyer.com

PEOPLE

“THE NYTRON PARANOID SYSTEM IS NOT LIKE OTHER SYSTEMS OUT TODAY. THE WAY OUR SYSTEM OPERATES IS LIKE USING A SATNAV AND IT LEARNS THE RIGHT WAY OF

DOING SOMETHING”

in healthcare, aviation and transport, gaming and hospitality, financial services and finally the public sector.

She added: “The gaming industry is one of the most regulated in the country and is mainly using Windows based software and we are used as the last line of defence in the industry.”

At present the software is not available to the commercial market but will remain focused on business enterprises and continue to help them against hacking attacks.

She added: “It was an honour standing among such wonderful and powerful women that are changing the landscape of their organisations.

“The group was very diverse, with representatives of several nationalities, states, industries and positions. It really fulfilled the mission of the National Diversity Council.

“It was such a fruitful experience to participate in a panel that spoke about emotional intelligence. I believe that sharing my professional experience with the audience was a way to give back to my community.”

PARANOID

Nyotron’s PARANOID software protects endpoints and data from attacks that other software misses.

The software allows for further protection of your sensitive data and keeps breaches from disrupting business operations, damaging your brand or potential financial loss.

PARANOID is the cyber security industry’s only OS-Centric Positive Security solution that protects endpoints regardless of the attack vector, type of attack, how, where or when the attack penetrated the organisation.

Winning the war on malware requires layered protection for endpoints. PARANOID acts as a last line of defence to shield you from threats that antivirus and next-generation antivirus solutions tend to miss - completely new, unknown and fileless malware, zero-day exploits and advanced persistent threats. The security solution leverages a map of operating system behaviour called Behaviour Pattern Mapping to identify actions that can cause system damage or lead to data theft.

There is no artificial intelligence, machine learning or deep learning involved. No sandboxing, micro-virtualization or application isolation. No whitelisting or application control. No OS hardening or lockdown. No indicators of compromise (IOCs), indicators of attacks (IOAs or antivirus signatures. No baselining or user behaviour analytics or disk scanning. And no cloud connectivity required.

The software is powerful, yet simple.

www.nyotron.com

“I’M HONOURED TO BE

MANAGING THE MOST

INNOVATIVE COMPANY IN

CYBER-SECURITY

TODAY”

Sagit Manor, CEO, Nyotron

ISB 063www.securitybuyer.com

PEOPLE

Supported by Organised byFollow us on

@DSEI_event

Follow us on

DSEI

Platinum Partner

SAVE UP TO £125 WWW.DSEI.CO.UK/REGISTER

BENEFIT FROM THE EARLY BIRD RATE REGISTER BEFORE 30 JUNE

SEE THE LATEST DEVELOPMENTS IN CYBER & SECURITY

Visitors to the Security Zone can expect to see the latest in cyber capabilities, border security, CBRNE, EPRR and protective securities. The Security Seminar will also provide insight from government and industry experts on topics including cyber defence and security, counter-insurgency, counter-terrorism, urban and hybrid warfare.

Considered by many as the ‘fi fth domain’, Cyberspace has and continues to shape modern warfare. The Cyber Hub showcases the latest capabilities and services to assist both industry and governments in tackling cyber threats. It will encompass offensive cyber, threat intelligence, data protection, information assurance and security, CNI protection and OSINT.

J400127_DSEI03_Advert_420mm x 297mm_2019_v2.indd 1 15/05/2019 16:30

Supported by Organised byFollow us on

@DSEI_event

Follow us on

DSEI

Platinum Partner

SAVE UP TO £125 WWW.DSEI.CO.UK/REGISTER

BENEFIT FROM THE EARLY BIRD RATE REGISTER BEFORE 30 JUNE

SEE THE LATEST DEVELOPMENTS IN CYBER & SECURITY

Visitors to the Security Zone can expect to see the latest in cyber capabilities, border security, CBRNE, EPRR and protective securities. The Security Seminar will also provide insight from government and industry experts on topics including cyber defence and security, counter-insurgency, counter-terrorism, urban and hybrid warfare.

Considered by many as the ‘fi fth domain’, Cyberspace has and continues to shape modern warfare. The Cyber Hub showcases the latest capabilities and services to assist both industry and governments in tackling cyber threats. It will encompass offensive cyber, threat intelligence, data protection, information assurance and security, CNI protection and OSINT.

J400127_DSEI03_Advert_420mm x 297mm_2019_v2.indd 1 15/05/2019 16:30

066 ISB www.securitybuyer.com

SHOW PREVIEW

It is an opportunity to join thousands of security professionals from across the UK and Europe to discover the latest technology and guest speakers

Security experts get ready for IFSEC International 2019

IFSEC International is the UK and Europe’s leading integrated security event. Taking place on 18-20 June at ExCeL London, it brings together over

27,000 security professionals from 110+ countries looking to source new and established security technologies, learn from world-renowned speakers and network with manufacturers, distributors, government bodies and industry associations.

IFSEC International is the global hub for all the energy and innovation of the security industry, demonstrating where the biggest developments are happening and helping you set your security agenda for the year ahead. It is supported by the BSIA, ASIS, Association of Security Consultants, the Security Institute, BRE Group/ LPCB, ECA as well as accreditation bodies NSI and SSAIB.

With more than 500 security suppliers exhibiting at IFSEC International 2019, you can gain a picture of the entire security market and see the most innovative technology in action, including deep learning analytics, behavioural biometrics and smart locks.

Among the exhibitors confirmed are HID Global, Cortica, CSL, Jacksons Fencing, BT Redcare, Genetec, Traka, Vidsys Inc.,

AnyVision, HISILICON, Abloy UK, Anixter, Avigilon, MIT Technologies, Azur Drones, Hanwha Techwin, IDIS and Texecom.

IFSEC’s ‘Show Me How’ initiative gives you the chance to pose questions directly to the technicians behind the tech, enabling you to learn how products are installed, operated and maintained. Hanwha, briefCam Ltd., Advancis and Octopus Systems are amongst the companies involved in this year’s ‘Show Me How’ programme.

Discover world-class perimeter defences at the LPCB Attack Testing Zone

Show Me How also extends to the LPCB Attack Testing Zone, one of the most exciting features at IFSEC International. This area lets LPCB members put their accredited perimeter defence equipment to the test, demonstrating the performance difference between certified security equipment and products which – while seemingly similar – fail to deliver equivalent levels of protection.

Technicians will conduct exciting live attack tests on a wide range of perimeter and façade security products, as well as safes, security enclosures and padlocks, featuring products from leading suppliers such as CLD Fencing, Insafe, Jacksons Fencing,

Kingsley Plastics and Sunray Engineering among others. These rigorous tests help you source and identify the solutions best suited to your security strategy by proving their efficacy live on the show floor.

Improve your security strategy with 35+ hours of critical content

IFSEC’s comprehensive conference agenda comes in at over 35 hours of free content hosted in several dedicated theatres.

At the Keynote Arena (sponsored by Western Digital), security journalist Frank Gardner OBE presents a world-class agenda of security thought-leadership from global experts. World-renowned speakers and industry leaders will discuss and debate some of the most critical issues facing the security industry: using drones to secure the future, organised crime reduction - overcoming the disruptive effects of criminality, social media and internet security: a new opportunity, tackling the cyber threat, artificial intelligence and machine learning for security: has its time come?

Plus – don’t miss the launch of National Camera Surveillance Day and a brand new ‘Secure by Default’ Standard from Tony Porter, Surveillance Camera Commissioner on Thursday 20 June.

Alongside the Keynote Arena, IFSEC International features several other theatres including the Future of Security Theatre (brought to you by Tavcom) where experts will share their visions for the future of security, covering topics such as autonomous vehicles - can they be hacked, will AI change the face of electronic security industry and future proofing your CCTV networks.

9SHOW PREVIEW 2019 sponsored byVisit us at FIREX 2019 on stand FX812www.gerdasecurity.co.uk

SPOT 534 PANTONE

CMYK

IFSEC KEYNOTE ARENATUESDAY 18 JUNETIME SESSION11:00 - 12:00 The Converged Security Operations Centre - Unifying Physical Security and Cyber Security Maurice Singleton, President, Vidsys; David Humphrey, CTO, Micro Focus; Steven Kenny,

Industry Liaison - Architecture & Engineering, Axis Communications; Sarb Sembhi, CISM, CISO, Virtually Informed Ltd; James Willison MA MSyI, Founder, Unified Security Ltd12:15 - 12:45 Keynote Address: A Global Political and Security Outlook from Frank Gardner OBE Frank Gardner OBE, Broadcaster and Security Journalist13:00 - 13:50 Securing Football Stadiums in 2019 - NFC using FLIR Systems Chris Garden, Managing Director, FLIR Security UK; Andy Batley, Stadium Safety and Security Manager, Norwich City

Football Club14:00 - 14:50 Cost vs Safety & Security - which is most important? What is the right balance? Andy Billings, Head of Security and Contingency Planning (Southampton Port), Associated British

Ports; Nick Orwin, Emergency Planning Manager, London Luton Airport and Vice-Chair, UK Aviation Emergency Planning Group15:00 - 15:30 Using Drones to Secure the Future Speakers tbc 15:40 - 16:30 Organised Crime Reduction - Overcoming the Disruptive Effects of Criminality Warren Stein, Vice President Sales, EMEA & APAC, BriefCam 16:40 - 16:50 Engineers of Tomorrow: Heats Winners

WEDNESDAY 19 JUNETIME SESSION11:00 - 12:00 Is your Security Culture fit for Purpose? Simon Roberts MSc CSyP, Global Head of Security Compliance, DHL Express Security; Darren Carter CPP MSyl F.ISRM, Head of Group Security - Edwardian

Hotels London, Chairman - Institute of Hotel Security Management and Directors ASIS UK; Oz Alashe MBE, CEO & Founder, CybSafe; Spencer Marshall, Director of Sales, HID Global12:15 - 12:45 Understanding Drones - Everything you need to know from the Technology to the Legislation Speakers tbc 13:00 - 13:50 Social Media and Internet Security: A New Opportunity Mark Folmer CPP FSyI, Vice President, Security Industry, TrackTik Software14:00 - 14:40 Private Public Partnerships in Security Joe Connell, Chairman of the Association of Security Consultants, Vice Chairman of UK Security Commonwealth; Hugo Rosemont, Director -

Security and Resilience, ADS group; David Clark CPP PSP PCI, Chairman, ASIS International, United Kingdom Chapter14:50 - 15:40 Secure by Design Andrew Sieradzki. Director of Security and Technology, BuroHappold Engineering; Mike Gillespie, Vice President, Centre for Strategic Cyberspace + International

Studies (CSCIS); Buzz Coates, IP CCTV Business Development Manager, Norbain SD15:50 - 16:40 Everyday Digital Threats - What are the Risks? Steve Cook, Biometrics and Digital Identity Expert16:45 - 17:00 Engineers of Tomorrow: Heats Winners

THURSDAY 20 JUNETIME SESSION10:15 - 10:45 National Surveillance - Camera Day Speakers tbc10:45 - 11:05 Hikvision panel session11:15 - 12:05 Tackling the Cyber Security Threat Paul Taylor FREng, Partner and UK Lead for Cyber in the Boardroom, KPMG12:15 - 13:00 Keynote Address: It takes a Network to Defeat a Network Dr Dave Sloggett, Alan Taylor Research Fellow, The University of Oxford13:10 - 14:00 Artificial Intelligence and Machine Learning for Security: Has its time come? Speakers tbc14:15 - 15:15 Modelling Risk and Crisis Management for 2030 Institute of Strategic Risk Management15:20 - 15:30 Engineers of Tomorrow: Prize Winner Presentation

sponsored by

sponsored by

CONVERGED SECURITY THEATRETUESDAY 18 JUNETIME SESSION13:30 - 14:15 How Do Converged Security Centres Respond in Real-Time to Physical and Online Threats? Professor Martin Gill, Director, Perpetuity Research & Consultancy International (PRCI) Ltd;

Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 14:45 - 15:30 How Do Converged Technologies Ease Prevention and Response to Unauthorised Physical/Logical Access to Corporate Facilities and Networks? Professor Paul Dorey, Chair, Internet of

Things Security Foundation; James Willison MA Msyl, Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 16:00 - 16:45 How Chief Security Officers Can Benefit from Data Analytics and Converged Platforms to Understand the Complex Physical and Cyber Risks Posed to Transport Systems Mike Hurst CPP FIRP MSyI

HJA Consult, Vice Chair ASIS UK Chapte; Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.

WEDNESDAY 19 JUNETIME SESSION11:00 - 11:45 How Converged Security Centres Respond in Real-Time to Physical and Online Threats Alan Jenkins, Principal Consultant, Cyber Security Pilotage; James Willison MA Msyl,

Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.13:45 - 14:30 How Converged Technologies Ease Prevention and Response to Unauthorised Physical/Logical Access to Corporate Facilities Networks Brian Sims BA (Hons) Hon FSyI Editor Risk Xtra and The

Paper, Pro-Activ Publications; Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 15:00 - 15:45 How Chief Security Officers can Benefit From Data Analytics and Converged Platforms to Understand the Complex Physical and Cyber Risks Posed to Transport Systems Godfried

Hendriks, ASIS International, President Elect; Business Development Director Europe @ Revolution Retail Systems; James Willison MA Msyl, Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.

THURSDAY 20 JUNETIME SESSION11:00 - 11:45 How Converged Security Centres Respond in Real-Time to Physical and Online Threats David Clark, Chief Security Officer and Head of Logistics The Francis Crick Institute, Chair,

ASIS UK Chapter; James Willison MA Msyl, Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 14:00 - 14:45 How Converged Technologies Ease Prevention and Response to Unauthorised Physical/Logical Access to Corporate Facilities Networks Dr. Danny Dresner FInstISP, Co-Founder and Director of

Research, IASME Consortium; Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.

Correct at time of going to press

9SHOW PREVIEW 2019 sponsored byVisit us at FIREX 2019 on stand FX812www.gerdasecurity.co.uk

SPOT 534 PANTONE

CMYK

IFSEC KEYNOTE ARENATUESDAY 18 JUNETIME SESSION11:00 - 12:00 The Converged Security Operations Centre - Unifying Physical Security and Cyber Security Maurice Singleton, President, Vidsys; David Humphrey, CTO, Micro Focus; Steven Kenny,

Industry Liaison - Architecture & Engineering, Axis Communications; Sarb Sembhi, CISM, CISO, Virtually Informed Ltd; James Willison MA MSyI, Founder, Unified Security Ltd12:15 - 12:45 Keynote Address: A Global Political and Security Outlook from Frank Gardner OBE Frank Gardner OBE, Broadcaster and Security Journalist13:00 - 13:50 Securing Football Stadiums in 2019 - NFC using FLIR Systems Chris Garden, Managing Director, FLIR Security UK; Andy Batley, Stadium Safety and Security Manager, Norwich City

Football Club14:00 - 14:50 Cost vs Safety & Security - which is most important? What is the right balance? Andy Billings, Head of Security and Contingency Planning (Southampton Port), Associated British

Ports; Nick Orwin, Emergency Planning Manager, London Luton Airport and Vice-Chair, UK Aviation Emergency Planning Group15:00 - 15:30 Using Drones to Secure the Future Speakers tbc 15:40 - 16:30 Organised Crime Reduction - Overcoming the Disruptive Effects of Criminality Warren Stein, Vice President Sales, EMEA & APAC, BriefCam 16:40 - 16:50 Engineers of Tomorrow: Heats Winners

WEDNESDAY 19 JUNETIME SESSION11:00 - 12:00 Is your Security Culture fit for Purpose? Simon Roberts MSc CSyP, Global Head of Security Compliance, DHL Express Security; Darren Carter CPP MSyl F.ISRM, Head of Group Security - Edwardian

Hotels London, Chairman - Institute of Hotel Security Management and Directors ASIS UK; Oz Alashe MBE, CEO & Founder, CybSafe; Spencer Marshall, Director of Sales, HID Global12:15 - 12:45 Understanding Drones - Everything you need to know from the Technology to the Legislation Speakers tbc 13:00 - 13:50 Social Media and Internet Security: A New Opportunity Mark Folmer CPP FSyI, Vice President, Security Industry, TrackTik Software14:00 - 14:40 Private Public Partnerships in Security Joe Connell, Chairman of the Association of Security Consultants, Vice Chairman of UK Security Commonwealth; Hugo Rosemont, Director -

Security and Resilience, ADS group; David Clark CPP PSP PCI, Chairman, ASIS International, United Kingdom Chapter14:50 - 15:40 Secure by Design Andrew Sieradzki. Director of Security and Technology, BuroHappold Engineering; Mike Gillespie, Vice President, Centre for Strategic Cyberspace + International

Studies (CSCIS); Buzz Coates, IP CCTV Business Development Manager, Norbain SD15:50 - 16:40 Everyday Digital Threats - What are the Risks? Steve Cook, Biometrics and Digital Identity Expert16:45 - 17:00 Engineers of Tomorrow: Heats Winners

THURSDAY 20 JUNETIME SESSION10:15 - 10:45 National Surveillance - Camera Day Speakers tbc10:45 - 11:05 Hikvision panel session11:15 - 12:05 Tackling the Cyber Security Threat Paul Taylor FREng, Partner and UK Lead for Cyber in the Boardroom, KPMG12:15 - 13:00 Keynote Address: It takes a Network to Defeat a Network Dr Dave Sloggett, Alan Taylor Research Fellow, The University of Oxford13:10 - 14:00 Artificial Intelligence and Machine Learning for Security: Has its time come? Speakers tbc14:15 - 15:15 Modelling Risk and Crisis Management for 2030 Institute of Strategic Risk Management15:20 - 15:30 Engineers of Tomorrow: Prize Winner Presentation

sponsored by

sponsored by

CONVERGED SECURITY THEATRETUESDAY 18 JUNETIME SESSION13:30 - 14:15 How Do Converged Security Centres Respond in Real-Time to Physical and Online Threats? Professor Martin Gill, Director, Perpetuity Research & Consultancy International (PRCI) Ltd;

Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 14:45 - 15:30 How Do Converged Technologies Ease Prevention and Response to Unauthorised Physical/Logical Access to Corporate Facilities and Networks? Professor Paul Dorey, Chair, Internet of

Things Security Foundation; James Willison MA Msyl, Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 16:00 - 16:45 How Chief Security Officers Can Benefit from Data Analytics and Converged Platforms to Understand the Complex Physical and Cyber Risks Posed to Transport Systems Mike Hurst CPP FIRP MSyI

HJA Consult, Vice Chair ASIS UK Chapte; Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.

WEDNESDAY 19 JUNETIME SESSION11:00 - 11:45 How Converged Security Centres Respond in Real-Time to Physical and Online Threats Alan Jenkins, Principal Consultant, Cyber Security Pilotage; James Willison MA Msyl,

Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.13:45 - 14:30 How Converged Technologies Ease Prevention and Response to Unauthorised Physical/Logical Access to Corporate Facilities Networks Brian Sims BA (Hons) Hon FSyI Editor Risk Xtra and The

Paper, Pro-Activ Publications; Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 15:00 - 15:45 How Chief Security Officers can Benefit From Data Analytics and Converged Platforms to Understand the Complex Physical and Cyber Risks Posed to Transport Systems Godfried

Hendriks, ASIS International, President Elect; Business Development Director Europe @ Revolution Retail Systems; James Willison MA Msyl, Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.

THURSDAY 20 JUNETIME SESSION11:00 - 11:45 How Converged Security Centres Respond in Real-Time to Physical and Online Threats David Clark, Chief Security Officer and Head of Logistics The Francis Crick Institute, Chair,

ASIS UK Chapter; James Willison MA Msyl, Founder, Unified Security; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc. 14:00 - 14:45 How Converged Technologies Ease Prevention and Response to Unauthorised Physical/Logical Access to Corporate Facilities Networks Dr. Danny Dresner FInstISP, Co-Founder and Director of

Research, IASME Consortium; Sarb Sembhi CISM, CISO, Virtually Informed Ltd; Phil Stockham Vice President of Operations, EMEA at Vidsys; Kris Heath Product Manager at Vidsys, Inc.

Correct at time of going to press

Organised byProudly in partnership with

Improve your security strategy at IFSEC 2019.Europe’s leading Security event brings you everything you need to know under one roof. Attend major keynote addresses from strategic global security leaders and high-level panel debates from government and industry influencers. Access case-by-case examples of strategic security resolutions, assess the business benefits of security innovation entering the marketplace and network with the industry’s brightest minds whilst collecting the ideas you need to go above and beyond.

Register for your free ticket todaywww.ifsec.co.uk/securitybuyer

9308 IFSEC Advert A4+3mm.indd 1 17/04/2019 17:15

10 SHOW PREVIEW 2019 sponsored byVisit us at FIREX 2019 on stand FX812www.gerdasecurity.co.uk

SPOT 534 PANTONE

CMYK

FUTURE OF SECURITY THEATRE

WEDNESDAY 19 JUNETIME SESSION11:00 - 11:25 Future Leaders of Security James Morris, Director of Young Professionals, ASIS UK

11:35 - 12:00 GDPR – Video Surveillance: Balancing Privacy and Security David White Dip.Ed MSyl RISC MASC MAPM, Senior Management Tutor, Tavcom Training

12:10 - 12:35 Is the Security World Ready for 5G Richard Broom CTSP, Senior Technical Tutor, Tavcom Training

12:45 - 13:10 Drones – Threats and Countermeasures Justin Pringle, CEO and Drone Matter Expert, sUASinnovation

13:20 - 13:45 Counteracting the Menace of Cybercrime Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

14:00 - 14:25 Improving Security Through Integrated Systems Colin Harding CTSP, Business Development Manager, Cathexis Europe Limited

14:35 - 15:00 ECHO and the Transition to Next Generation Networks David Wilkinson, CTSP, Director of Technical Services, BSIA

15:15 - 15:40 The Digital Switchover -Are you ready? Sodhi Dhillion, Senior Product Manager – Digital Voice Special Services, BT

15:50 - 16:15 Autonomous Vehicles – Can They Be Hacked Mike Gillespie M. Inst ISP MSyl CIRM, Founder and MD, Advent IM

16:15 - 19:00 CTSP Networking & Drinks

THURSDAY 20 JUNETIME SESSION11:00 - 11:25 Doctor or Dalek? Security Managers Evolving Space Angus Dorrock-Warren BA (Hons) MSc PSP RISC CSyP Fsyl, Group Director, Linx International Group

11:35 - 12:00 Counteracting the Menace of Cybercrime Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

12:10 - 12:35 The Digital Switchover – Are You Ready? Ruth Sanders, BT

12:45 - 13:10 IoT, Smart Homes & Security Peter Aylett, President & CTO, Archimedia

13:20 - 13:45 Managing Security and public safety within the museum sector Riyaz Somani BA (Hon), PRINCE2P, IOSH, Security & Estate Project Manager, Victoria & Albert Museum

14:00 - 14:25 Future Proof your CCTV Networks Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

14:35 - 15:00 CTSP Networking

Correct at time of going to press

TUESDAY 18 JUNETIME SESSION11:00 - 11:25 Counteracting the Menace of Cybercrime Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

11:35 - 12:00 Security for the Fourth Industrial Revolution Dr Alison Wakefield Fsyl, Senior Lecturer in Security Risk Management

12:10 - 12:35 Autonomous Vehicles – Can They Be Hacked? Mike Gillespie M. Inst ISP MSyl CIRM, Founder and MD, Advent IM

12:45 - 13:10 Will AI Change the Face of Electronic Security? Darren Wildgoose CCSP, CCNP-S, PRINCE2, CTSP, Lead IP Tutor, Tavcom Training

13:20 - 13:45 GDPR – Video Surveillance: Balancing Privacy and Security David White Dip.Ed MSyl RISC MASC MAPM, Senior Management Tutor, Tavcom Training

14:00 - 14:25 Future Proof your CCTV Networks Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

14:35 - 15:00 BSIA Cyber Security Best Practice Guidance Steve Lampett, Technical Manager, BSIA

15:15 - 15:40 The Digital Switchover - Are you ready? Phil Cain, Senior Product Manager - Digital Voice Special Services, BT

15:50 - 16:15 Intruder Alarm Standards Update Involving PD6662 David Roscoe CTSP, Technical Manager, SSAIB

16:15 - 17:00 CTSP Networking & Drinks

Register now to meet 500+ security suppliers – secure your free ticket at ifsec.events/internationalDon’t forget that your IFSEC badge also grants you access

to FIREX, Safety & Health Expo and Facilities Show.

brought to you by

Organised byProudly in partnership with

Improve your security strategy at IFSEC 2019.Europe’s leading Security event brings you everything you need to know under one roof. Attend major keynote addresses from strategic global security leaders and high-level panel debates from government and industry influencers. Access case-by-case examples of strategic security resolutions, assess the business benefits of security innovation entering the marketplace and network with the industry’s brightest minds whilst collecting the ideas you need to go above and beyond.

Register for your free ticket todaywww.ifsec.co.uk/securitybuyer

9308 IFSEC Advert A4+3mm.indd 1 17/04/2019 17:15

10 SHOW PREVIEW 2019 sponsored byVisit us at FIREX 2019 on stand FX812www.gerdasecurity.co.uk

SPOT 534 PANTONE

CMYK

FUTURE OF SECURITY THEATRE

WEDNESDAY 19 JUNETIME SESSION11:00 - 11:25 Future Leaders of Security James Morris, Director of Young Professionals, ASIS UK

11:35 - 12:00 GDPR – Video Surveillance: Balancing Privacy and Security David White Dip.Ed MSyl RISC MASC MAPM, Senior Management Tutor, Tavcom Training

12:10 - 12:35 Is the Security World Ready for 5G Richard Broom CTSP, Senior Technical Tutor, Tavcom Training

12:45 - 13:10 Drones – Threats and Countermeasures Justin Pringle, CEO and Drone Matter Expert, sUASinnovation

13:20 - 13:45 Counteracting the Menace of Cybercrime Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

14:00 - 14:25 Improving Security Through Integrated Systems Colin Harding CTSP, Business Development Manager, Cathexis Europe Limited

14:35 - 15:00 ECHO and the Transition to Next Generation Networks David Wilkinson, CTSP, Director of Technical Services, BSIA

15:15 - 15:40 The Digital Switchover -Are you ready? Sodhi Dhillion, Senior Product Manager – Digital Voice Special Services, BT

15:50 - 16:15 Autonomous Vehicles – Can They Be Hacked Mike Gillespie M. Inst ISP MSyl CIRM, Founder and MD, Advent IM

16:15 - 19:00 CTSP Networking & Drinks

THURSDAY 20 JUNETIME SESSION11:00 - 11:25 Doctor or Dalek? Security Managers Evolving Space Angus Dorrock-Warren BA (Hons) MSc PSP RISC CSyP Fsyl, Group Director, Linx International Group

11:35 - 12:00 Counteracting the Menace of Cybercrime Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

12:10 - 12:35 The Digital Switchover – Are You Ready? Ruth Sanders, BT

12:45 - 13:10 IoT, Smart Homes & Security Peter Aylett, President & CTO, Archimedia

13:20 - 13:45 Managing Security and public safety within the museum sector Riyaz Somani BA (Hon), PRINCE2P, IOSH, Security & Estate Project Manager, Victoria & Albert Museum

14:00 - 14:25 Future Proof your CCTV Networks Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

14:35 - 15:00 CTSP Networking

Correct at time of going to press

TUESDAY 18 JUNETIME SESSION11:00 - 11:25 Counteracting the Menace of Cybercrime Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

11:35 - 12:00 Security for the Fourth Industrial Revolution Dr Alison Wakefield Fsyl, Senior Lecturer in Security Risk Management

12:10 - 12:35 Autonomous Vehicles – Can They Be Hacked? Mike Gillespie M. Inst ISP MSyl CIRM, Founder and MD, Advent IM

12:45 - 13:10 Will AI Change the Face of Electronic Security? Darren Wildgoose CCSP, CCNP-S, PRINCE2, CTSP, Lead IP Tutor, Tavcom Training

13:20 - 13:45 GDPR – Video Surveillance: Balancing Privacy and Security David White Dip.Ed MSyl RISC MASC MAPM, Senior Management Tutor, Tavcom Training

14:00 - 14:25 Future Proof your CCTV Networks Peter Mason M.Ed, CTSP, Senior Tutor, Tavcom Training

14:35 - 15:00 BSIA Cyber Security Best Practice Guidance Steve Lampett, Technical Manager, BSIA

15:15 - 15:40 The Digital Switchover - Are you ready? Phil Cain, Senior Product Manager - Digital Voice Special Services, BT

15:50 - 16:15 Intruder Alarm Standards Update Involving PD6662 David Roscoe CTSP, Technical Manager, SSAIB

16:15 - 17:00 CTSP Networking & Drinks

Register now to meet 500+ security suppliers – secure your free ticket at ifsec.events/internationalDon’t forget that your IFSEC badge also grants you access

to FIREX, Safety & Health Expo and Facilities Show.

brought to you by

070 ISB www.securitybuyer.com www.securitybuyer.com

L e a d i n g S u p p l i e r s

Leading provider of access control and integrated security management systems

www.cemsys.com

One of the world’s leading suppliers of video surveillance products and solutions

www.hikvision.com

Leading sensor manufacturer providing perimeter protection, intrusion and

piggybacking detection solutionswww.optex-europe.com

Leading provider of IP video surveillance, access control and license plate recognition solutions

unified in a single platformwww.genetec.com

Raytec are the World leader in LED lighting for security and safety

www.rayteccctv.com

Leading Video Surveillance Solution Provider with IP Camera, NVR, Analog, DVR, Speed

Dome, HD-SDI and NVSwww.dahuasecurity.com

A global market leader in entry solutionswww.boonedam.co.uk

World leading manufacturer and supplier of integrated access control solutions

www.kerisystems.co.uk

First-Class Visual Display Solutions for Control Rooms

www.eyevis.de

Cognitec develops market-leading face recognition technology and applications

for facial image database searchwww.cognitec.com

BCDVideo best in class IP video surveillance systems. BCDVideo - simplicity, scalability, & reliability for the video surveillance market

www.bcdvideo.com

Leading manufacturer of network cameras for the physical security and video surveillance industries

www.axis.com/gb/en

Manufacturers of transmission equipment, Fibre Optic, Wireless, IP and Encrypted

Secure Transmissionwww.kbcnetworks.com

MOBOTIX is known as an innovative producer of smart and autonomous IP

cameras since the year 2000www.mobotix.com

P cameras, Panomera, network cameras, security cameras, HD cameras,

DVR, NVR, softwarewww.dallmeier.com

Quantum Corporation is a manufacturer of tape drive, tape automation, data

deduplication storage productswww.quantum.com

We provide hardware to security, military & blue light industries worldwide with our range of night vision products, providing

low light imagerywww.nocturna.co.uk

The UK’s premier CCTV distributor, offering high quality CCTV products and industry

leading service & supportwww.cop-eu.com

For security and communications products, solutions and services, Bosch

Security Systems is the preferred partnerwww.boschsecurity.com

NVIDIA takes security concerns seriously and works to quickly evaluate and address them

www.nvidia.com

We power the trusted identities of the world’s people, places & things with solutions like access control, identity management, asset tracking & more

www.hidglobal.com

Subscribers Know More. Subscribers Get More. Subscribers Save More.

Subscribers get 10 issues for just £99

Subscribe now to instantly start saving.Call 01622 823 920 or visit www.securitybuyer.comFull details can be found online via www.securitybuyer.com/subscriptions - UK Subscription cost: £99 for 10 issues - Rest of World cost: £149 for 10 issues

Subscription Features:

Exclusive Online Content

Digital & Print Editions

Fully Involved with the Industry

YOU’VE SEEN THE NEWS...NOW DISCOVER THE STORY

FOR TODAY’S SECURITY PROFESSIONALSECURITY

S

S

S

Subscribers Know More. Subscribers Get More. Subscribers Save More.

Subscribers get 10 issues for just £99

Subscribe now to instantly start saving.Call 01622 823 920 or visit www.securitybuyer.comFull details can be found online via www.securitybuyer.com/subscriptions - UK Subscription cost: £99 for 10 issues - Rest of World cost: £149 for 10 issues

Subscription Features:

Exclusive Online Content

Digital & Print Editions

Fully Involved with the Industry

YOU’VE SEEN THE NEWS...NOW DISCOVER THE STORY

FOR TODAY’S SECURITY PROFESSIONALSECURITY

S

S

S

www.securitybuyer.com 072 ISB

What's On? Our latest round-up of recommended shows and exhibitions

Cansec29-30 May 2019EY Centre, Ottowa, Canadawww.defenceandsecurity.ca/CANSECCANSEC is Canada’s Global Defence and Security Tradeshow, at the EY Centre in Ottawa, Canada with 11,000 visitor and 330 trade stands (estimated).

Electronic Security ExpoJune 3-6, 2019Indiana Convention Center, 100 S Capitol Ave, Indianapoliswww.esxweb.com/contactOpen exclusively to the electronic security and life safety industry, ESX is designed to allow passionate professionals the ability to learn more, share more, and interact more.

InfoSecurity Europe4-6 June, 2019London, UKwww.Infosecurityeurope.comOne of Europe’s biggest and most-attended information security industry event, attracting more than 400 exhibitors and more than 19,500 information security professionals.

IFSEC International18-20 June 2019Excel, London, UKwww.ifsec.events/internationalIFSEC boasts 27,000 security professionals that gather yearly to see the latest security technology put to the test and to learn directly from industry leaders from across the globe.

ISC Brasil 201925-27 June 2019 Sao Paulo, Brazil www.iscbrasil.com.brOver its three days, ISC Brasil brings together intelligent and integrated security solutions for more than 16 sectors of the economy, whose needs include electronic, private, property, digital and public security.

National Sports Safety and Security Conference and Exhibition 20199-11 July 2019New Orleans, United States of America (USA) www.cvent.comThe 10th annual National Sports Safety and Security Conference and Exhibition will gather top professionals in the field for a program dedicated to security and safety technologies.

Cyber: Secured Forum 29-31 July 2019 Dallas, United States of America (USA) www.cybersecuredforum.com Cyber:Secured Forum delivers two days of in-depth content on cybersecurity trends and best practices related to the delivery of physical security systems and other integrated systems.

Secutech Vietnam 2019 14-16 August 2019 Ho Chi Minh City, Vietnam www.secutechvietnam.twThis year, Secutech Vietnam will deliver more technologies and solutions focussed on smart buildings and add to the success of previous editions in the fields of security and fire safety.

Shanghai Smart Home Technology (SSHT) 2019 3-5 September 2019 Shanghai, China www.shanghai-smart-home-technology.hkSSHT 2019 will showcase a broad and deep range of solutions including Internet technologies, cloud platform technologies, smart hardware, user interface and smart home integrated solutions.

DATES FOR YOUR DIARY

Seagate provides reliable storage solutions for all surveillance environments from edge to cloud with SkyHawk, SkyHawk AI, Exos, and Nytro.

This robust portfolio allows every surveillance application to take advantage of superior software and services, including ImagePerfect, SkyHawk Health Management, Seagate SecureTM, and Rescue Data Recovery Services.

Harness 40 years of data storage innovation for optimal surveillance. Learn more atSeagate.com/Surveillance

SURVEILLANCE

IN FOCUSUnlock data insights with edge to cloud solutions.

SkyHawkTM and SkyHawk AITake your surveillance video and AI stream analytics above and beyond.

ExosTM

Leverage �exibility to scale and secure back-end surveillance storage.

Nytro®

Quickly accelerate surveillance data analytics and deep learning.

VISIT US AT

STAND: IF1240

seagate.com/gb/en/internal-hard-drives/surveillance

TM

Reinforce your resilience

Your security system is only as strong as its weakest link. With Genetec™ Security

Center 5.8, understand how your defenses measure up and identify improvements with

new Security Score and Firmware Vault.

Find out how to strengthen your security at IFSEC, booth #IF710 or at genetec.com/SC58

© 2

019

Gen

etec

Inc.

Gen

etec

, the

Gen

etec

logo

, the

Mob

ius

stri

p lo

go, a

nd th

e G

enet

ec S

ecur

ity

Cen

ter l

ogo

are

trad

emar

ks o

f Gen

etec

Inc.

, and

may

be

regi

ster

ed o

r pen

ding

reg

istr

atio

n in

sev

eral

juri

sdic

tion

s.

Ad_EN_SC58_campaign_IFSEC_210x297mm.indd 2 2019-04-16 10:36 AM