Daily Archives: 25/02/2014

Axis Communications introduces interactive camera visualisations tool for SketchUp® 3D CAD software

Using the Axis Communications Camera Extension for the SketchUp® 3D CAD software, system designers can conveniently select Axis Network Cameras and insert them into 3D models of buildings.

Different mounting positions and view angles can be evaluated through interactive camera views showing the respective camera coverage areas. Users can pan, tilt and zoom the cameras to determine the optimal set-up for the best video surveillance coverage.

The Axis Camera Extension for SketchUp provides interactive 3D models of Axis Network Cameras to aid in the planning and design of video surveillance systems. Users can place cameras directly into CAD building plans and visualise the areas the cameras will cover.

The new SketchUp extension from Axis allows users to see exactly how the cameras fit into the building layout and to easily spot if camera views are obstructed by columns or walls. This effectively reduces the risk of unexpected blind spots when planning and designing video surveillance systems.

SketchUp in action

SketchUp in action

Axis Network Cameras can be conveniently selected from the SketchUp toolbar allowing users to compare and evaluate different camera models as well as to determine the optimal camera mounting positions. Users can pan, tilt and zoom the cameras to adjust the field of view and define the optimal camera settings.

Precise planning of camera angles and coverage

“SketchUp is a popular and easy-to-use 3D CAD software for security system design,” explained Peter Friberg, director of systems and services at Axis Communications. “With the new Axis Camera Extension, system integrators can use SketchUp to place Axis Network Cameras into virtual buildings to precisely plan camera view angles and coverage.”

Friberg continued: “As SketchUp integrates with Google Maps, it makes it easy when working on city surveillance or critical infrastructure projects to get a good overview of the environment where the cameras are placed. The Axis Camera Extension allows system integrators to find the optimal camera model and settings for a given mounting position, and significantly streamlines the overall planning and design process for video surveillance systems.”

Axis Communications' headquarters in Lund, Sweden

Axis Communications’ headquarters in Lund, Sweden

Axis’ broad portfolio of video surveillance system design tools also includes Axis Coverage Shapes for Microsoft Visio and Axis Camera Families for Autodesk Revit.

The Axis Camera Extension for SketchUp may be downloaded free of charge from axis.com/tools. The Axis Camera Extension for SketchUp is initially available in English. More languages (French, Italian, German, Spanish, Russian, Japanese, Korean, Brazilian Portuguese and Chinese) will be added in Q2 2014.

SketchUp is a trademark of Trimble Navigation Limited

Leave a comment

Filed under IFSECGlobal.com News

AT&T and IBM simplify cyber security management through new joint venture

AT&T* and IBM have announced a new strategic relationship to give businesses a simplified, single-source for network security and threat management.

The two companies will offer business customers a new joint service combining security network infrastructure with advanced threat monitoring and analytics. The new service is initilly available in the US with plans for global expansion.

Cyber threats have become a Boardroom agenda with the potential to bring down an organisation’s network, create compliance issues, damage bottom lines and impact brand reputation.

Additionally, disparate security technologies create ‘security silos’ and can increase the cost and complexity of security management, making it almost impossible to uniformly monitor security threats across IT environments.

The new service from AT&T and IBM will help businesses address these challenges with a highly secure network infrastructure, analytics and the optimal blend of on-premise and next generation cloud-managed security capabilities.

AT&T and IBM will improve the management of these capabilities with the following customer benefits:
• Reduced costs and minimised complexities
• Advanced visibility with intelligence and control across diverse IT environments
• Simplified infrastructure with less need for security hardware, licenses and maintenance

Specifics of the joint offer

Individually, AT&T and IBM boast world class IT security data monitoring operations, each generating advanced security threat intelligence from the billions of security events they track each day.

Together, the companies will create a combined security intelligence source and analytics capability that will be “unmatched” in the industry.

The new offering is comprised of proven solutions from AT&T and IBM. Specific elements of the new offering include Network Security Infrastructure and Managed Security Services from AT&T, including network-based firewall, IDS/IPS, web filtering, secure e-mail gateway and distributed denial of service (DDoS) protection services for security devices managed on premise or in the AT&T cloud.

IBM capabilities include IBM Network Security Consulting to assess and transform network security, IBM Security Monitoring and Threat Intelligence for faster threat detection and response and IBM Emergency Response Services for around-the-clock security expert support in responding to sophisticated attacks and helping remediate them.

“With today’s constantly changing threat environment, companies need cost-effective solutions that provide end-to-end protection alongside real-time monitoring and response operations,” said Andy Daudelin, vice-president (security services) at AT&T Business Solutions. “We’ve created an unparalleled solution with the combined strength, reliability and agility of AT&T network-based security services and IBM threat intelligence and analytics.”

Kris Lovejoy – general manager for IBM Security Services – added: “Organizations are finding great benefits with hybrid IT strategies that blend mobile, cloud-based and on-premise IT resources. However, securing these infrastructures can be complicated without a single, integrated management system that avoids creating silos of security data making it almost impossible to uniformly monitor security threats across environments. IBM and AT&T have come together to offer unprecedented security services designed to break down those silos and better secure data no matter where it resides.”

“This is an advantageous combination of industry-leading network-based security, consulting, and analytics,” commented Christina Richmond, program director for infrastructure security at IDC.

“AT&T and IBM are meeting a real market need with a robust end-to-end security solution that provides enterprise customers with both integration and simplicity.”

Note: *AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.

Leave a comment

Filed under IFSECGlobal.com News

McAfee study highlights mobile threat for SMEs

New research conducted by McAfee has found that mobile malware tripled in scope last year, compromising 82% of Android apps.

McAfee has discovered that 82% of Android apps are compromised with increasingly malicious and invasive malware, in particular placing at risk those smaller businesses without a mobile device management strategy in place.

The study found a steep rise in malware downloaded through seemingly harmless apps, such as tools, to give cyber criminals remote control over devices or use exploits to get installed on vulnerable systems. It also revealed that over a third of apps (36%) know users’ account information, while more than a quarter (26%) read how individuals use the apps on their chosen device.

Mobile technology: crucial for SME business success

For small businesses this proliferation of threats comes at a critical time. According to an Oxford Economics study, mobile technology is crucial for SMEs to succeed in business. For most SMEs, mobile is instrumental for delivering customer service benefits and improving product development.

The steep rise in attacks against mobile devices not only puts small businesses at risk but also opens up access to the much larger organisations with which many SMEs do business. Protecting SMEs and securing the supply chain is incredibly important to ensure any potential data breaches are not exacerbated and cause widespread damage.

Tim Stone: SME director for the EMEA region at security specialist McAfee

Tim Stone: SME director for the EMEA region at security specialist McAfee

Information gathered through malware can give cyber criminals the exact geographic location of infected devices as well as the ability to contact the victim via SMS to launch attacks such as highly personalised phishing scams.

The vulnerabilities also allow hackers to find defences such as antivirus software and instruct malware to manoeuvre around or interfere with it.

Protecting against mobile malware

SME business leaders should take this proliferation of threats as a stark warning and ensure their business is protected against mobile malware by following the below advice:

(1) Educate employees
Mobile and remote users often struggle with technology and see security systems as an obstacle to productivity. They will click past a software update alert or defer a suggested scan in the interest of speed. Small business owners should educate remote employees and provide security tools that work well and as unobtrusively as possible to minimise any potential threats, user error or naivety.

(2) Inventory devices
SMEs should identify and secure all devices employees use, including USB sticks, smartphones, tablets and laptops. This will enable them to identify devices that shouldn’t be accessing the network.

(3) Protect the network
With employees logging on at various times and places, networks are under threat. Protect network access with virtual private networks (VPNs) and firewalls.

(4) Remove access to the network once employment is terminated
It may sound obvious, but it’s not always top of the list when an employee leaves. Blocking access immediately will prevent past employees from having access to valuable and confidential company data.

Tim Stone, SME director for the EMEA region at security specialist McAfee, urges small business owners to take action now.

“Small businesses have become a prime target for cyber criminals,” said Stone. “The research findings show that mobile malware is the weapon of choice. One incident is enough to potentially obliterate businesses and reverberate through the supply chain, causing further damage. It’s critical that SMEs do not gamble their reputation and their customers’ details and put into place basic steps that will deter attackers and boost defences.”

To find out more about the mobile threat download the McAfee Mobile Security report

Leave a comment

Filed under IFSECGlobal.com News