Tag Archives: cyber security

WatchGuard report finds two-thirds of malware to be encrypted

WatchGuard Technologies’ latest Internet Security Report shows that 67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections and that 72% of encrypted malware was classified as zero day, so on that basis would have evaded signature-based anti-virus protection.

These findings show that, without HTTPS inspection of encrypted traffic and advanced behaviour-based threat detection and response, organisations are missing up to two-thirds of incoming threats. The report also highlights the finding that the UK was a top target for cyber criminals in Q1, earning a spot in the Top Three countries for the five most widespread network attacks.

“Some organisations are reluctant to set up HTTPS inspection due to the extra work involved, but our threat data clearly shows that a majority of malware is delivered through encrypted connections and that letting traffic go uninspected is simply no longer an option,” said Corey Nachreiner, chief technology officer at WatchGuard. “As malware continues to become more advanced and evasive, the only reliable approach towards defence is implementing a set of layered security services, including advanced threat detection methods and HTTPS inspection.”

Malware

Key findings

Other key findings from WatchGuard’s latest Internet Security Report include:

Monero cryptominers surge in popularity Five of the Top Ten domains distributing malware in Q1 (identified by WatchGuard’s DNS filtering service DNSWatch) either hosted or controlled Monero cryptominers. This sudden jump in cryptominer popularity could simply be due to its utility. Adding a cryptomining module to malware is an easy way for online criminals to generate passive income

Flawed-Ammyy and Cryxos malware variants join top lists The Cryxos trojan was third on WatchGuard’s Top Five encrypted malware list and also third on its Top Five most widespread malware detections list, primarily targeting Hong Kong. It’s delivered as an e-mail attachment disguised as an invoice and will ask the user to enter their e-mail and password which it stores. Flawed-Ammyy is a support scam where the attacker uses the Ammyy Admin support software to gain remote access to the victim’s computer

Three-year-old Adobe vulnerability appears in top network attacks An Adobe Acrobat Reader exploit that was patched in August 2017 appeared in WatchGuard’s top network attacks list for the first time in Q1 of this year. This vulnerability resurfacing several years after being discovered and resolved illustrates the importance of regularly patching and updating systems

Mapp Engage, AT&T and Bet365 targeted with spear phishing campaigns Three new domains hosting phishing campaigns appeared on WatchGuard’s Top Ten list in Q1 2020. They impersonated digital marketing and analytics product Mapp Engage, online betting platform Bet365 (this campaign was in Chinese) and an AT&T login page (this campaign is no longer active at the time of the report’s publication)

COVID-19 impact Q1 2020 was only the start of the massive changes to the cyber threat landscape brought on by the COVID-19 pandemic. Even in the first three months of 2020, WatchGuard still saw a massive rise in remote workers and attacks targeting individuals

Malware hits and network attacks decline Overall, there were 6.9% fewer malware hits and 11.6% fewer network attacks in Q1, despite a 9% increase in the number of Fireboxes contributing data. This could be attributed to fewer potential targets operating within the traditional network perimeter with worldwide work-from-home policies in full force during the COVID-19 pandemic

Malware2

Anonymised data

The findings in WatchGuard’s Internet Security Reports are drawn from anonymised Firebox Feed data from active WatchGuard appliances whose owners have opted in to share data to support the Threat Lab’s research efforts. Over 44,000 appliances worldwide contribute threat intelligence data to the report. In Q1 2020, they blocked over 32,148,519 malware variants in total (730 samples per device) and more than 1,660,000 network attacks (38 attacks per device).

The complete report includes key defensive Best Practices that organisations of all sizes can use to protect themselves in today’s threat landscape and a detailed analysis of how the COVID-19 pandemic and associated shift to working from home affected the cyber security landscape.

*To view the full report visit Internet Security Report for Q1 2020

Leave a comment

Filed under Security Matters

2020 edition of Security Essen cancelled by Messe Essen due to ongoing COVID-19 pandemic

The 2020 edition of popular international trade fair Security Essen, which was scheduled to run from 22-25 September, has been cancelled due to the ongoing Coronavirus pandemic. According to Messe Essen, customer expectations and the performance promise of the exhibition cannot be fulfilled under the present circumstances. The decision to cancel was taken by Messe Essen in the wake of close consultations with partner associations. The next Security Essen will now run at Messe Essen from 20-23 September 2022.

As a respected international platform for the security industry, Security Essen is always a showcase highlighting the latest innovations. Numerous market leaders in the security industry had already confirmed their participation for this year.

Messe Essen GmbH, Norbertstraße, 45001 Essen, Germany
http://www.messe-essen.de

Security Essen covers everything from cyber security through to innovations in building security and new solutions for the protection of valuables. Every other year, circa 1,000 exhibitors from upwards of 40 countries show their innovations to no less than 36,000 trade visitors from 125 different nations.

“Anticipation around the 2020 edition and the new concept we had put in place for Security Essen was so high among all those involved,” explained Oliver Kuhrt, managing director of Messe Essen, “which made the decision to cancel all the more difficult. The fact is that the current situation, as well as the continuing global travel restrictions, will not allow adequate preparation for the trade fair.”

Careful evaluation

Norbert Schaaf, chairman of the Management Board of the Federal Association of Safety Engineering and chairman of the Security Essen Advisory Board, observed: “The cancellation of Security Essen 2020 is the result of a careful evaluation of the current situation which we have undertaken together. Since the majority of our participants come to Essen from abroad, we had to act with prudence. Due to the unclear worldwide development of the Coronavirus pandemic and the associated uncertain travel planning we were left with no alternative.” 

Dr Christian Endreß, managing director of the Federal Association for Security in Industry and Commerce and a member of the Security Essen Advisory Board, added: “Security Essen as an important international event in the security industry’s calendar and a particular highlight for the Federal Association. The cancellation is hitting the industry and the security associations pretty hard. We regret the decision, but we also fully understand it and look forward to 2022 with confidence.”

Dr Harald Olschok, general manager of the Federal Association of the Security Industry and also a member of the Security Essen Advisory Board, concluded: “From the perspective of our member companies, the decision to cancel Security Essen is fully understandable. Personally, I regret this very much, because it would have been my fifteenth and last Security Essen as CEO of the BDSW and the BDGW. The Coronavirus crisis represents an enormous economic challenge for security solutions providers. I’m sure that the management and the entire team of the BDSW and the BDGW with their affiliated member companies are looking forward to Security Essen 2022 when, hopefully, there will be better economic conditions for all.”

Leave a comment

Filed under Security Matters

CIP partners with ISARA in bid to offer crypto-agile technology

Cybersec Innovation Partners Limited (CIP) and the ISARA Corporation, the provider of crypto-agile and quantum-safe security, have announced the detail underpinning a strategic partnership which will allow CIP to offer bespoke solutions and services to enable a seamless migration of digital trust infrastructures to post-quantum security.

The onset of large-scale quantum computing will challenge the security of current public key cryptography and create widespread vulnerabilities. The rigidity of today’s infrastructure makes cryptographic migrations complex and costly. Establishing crypto agility in existing systems is the first step towards seamless migrations.

The partnership allows CIP to offer quantum-safe, crypto-agile and hybrid certificate offerings from ISARA. This ground-breaking technology enables systems to be quantum-safe without disruption of operations, while also maintaining the availability and integrity of existing security systems.

PostQuantumSecurity

The new agile certificates will be recognisable by CIP’s Whitethorn Platform: a digital certificate, key discovery and lifecycle management solution that allows for discovery, management and automation.

Andy Jenkinson, Group CEO at CIP, said: “Quantum computing is the next major development within the global technology area. The biggest challenge to cyber security is the lack of understanding of cryptography and PKI in today’s classical computing, let alone in a post-quantum world. The partnership with ISARA will enable all of our clients to realise full discovery, management and automation of their crypto-agile PKI.”

Scott Totzke, CEO and co-founder of ISARA, added: “We’re excited to partner with CIP to ensure its clients’ migration to quantum-safe cryptography starts with integrating crypto-agility, an essential first step towards cryptographic resilience and long-term security. This is welcome news in these turbulent times.”

Leave a comment

Filed under Security Matters

360 Vision Technology “leads the way” in high security, CAPSS-approved cyber security

360 Vision Technology has announced that its ruggedised PTZ surveillance cameras are now the only camera product in the sector to be Cyber Assurance of Physical Security Systems (CAPSS) approved by way of the Centre for the Protection of National Infrastructure (CPNI), as well as being ISO 27001 compliant.

In addition to advanced built-in cyber security capable of protection against the very real threats faced by surveillance system operators, 360 Vision Technology boasts an enviable track record in delivering specialist camera solutions designed to meet with specific customer and application-driven requirements.

This product engineering flexibility, coupled with high security protection, has paid real dividends, with significant sales and specification of the firm’s cameras for high-profile Critical National Infrastructure (CNI) projects.

CAPSSCyberSecurity

“360 Vision has worked very hard to be ahead of the game in the vital area of system security,” said Mark Rees, managing director at 360 Vision Technology. “We recognised some time ago that robust cyber security would become a determining factor in the selection of camera technology for CNI and other high-security applications, so our team of software developers was briefed to ensure that these threats can be averted.”

Rees added: “As a UK-based surveillance camera manufacturer, we’re extremely adept at responding to customer requirements, which has resulted in some very exciting product deployments. Today, 360 Vision finds itself in an enviable position in the security camera market, whereby system designers and end users looking to fulfil product performance flexibility and high security applications are choosing the company as their ‘go to’ camera technology partner.”

Leave a comment

Filed under Security Matters, Uncategorized

“Cyber attack fears delaying business innovation” reveals HackerOne survey

A survey conducted by HackerOne has revealed that IT projects are being stifled due to security concerns. More than 80% of UK CISOs and CTOs who were interviewed revealed software IT projects have been hindered due to concerns over inevitable security issues. 90% also agreed that software vulnerabilities pose a significant risk to their organisation.

“Organisations need to find a balance between driving innovation and keeping data safe,” said Laurie Mercer, security engineer at HackerOne. “It’s not surprising that fear around cyber security is hindering this, but by moving beyond traditional cyber security strategies, businesses can start to feel empowered. When I started writing code, new releases of software would take six months to develop and test. Today, new software is released every hour. This new pace of innovation poses a problem for security teams but, by implementing a strategy that supports continuous security, businesses can ensure they’re on alert for any vulnerabilities that software might have. The key is to ensure that security is constantly evolving.”

CISOCIOCyberAttack

Manpower and budgets are also a key concern for security professionals, with 63% believing security team resources are not able to keep up with the pace of development. Lack of budget and other resources including skill sets were also cited as key barriers to creating a well-rounded cyber security strategy by over a third of respondents.

Despite the significant number of concerns around vulnerabilities and limited resources, the survey highlighted that 62% would rather accept the risk of software vulnerabilities than invite unknown hackers to find them, while 63% say they’re only comfortable accepting bug submissions from vetted hackers.

A HackerOne customer and CISO of an international health and beauty retailer said: “I understand first-hand the nature of remaining cautious. As we all know, though, traditional cyber security methods alone are not sufficient. CISOs find themselves in a tricky position, needing to embrace innovation, but while ultimately remaining responsible for cyber security. The security landscape is ever evolving so we need to approach defensive strategies in the same way. By working with ethical hackers, it gives organisations the freedom to work on new projects, spin-up new applications and try different ways of working, while at the same time there’s peace of mind that continuous and ongoing testing is taking place. With ethical hacking, these vulnerabilities can be fixed immediately.”

The research was conducted by Opinion Matters and included input from 200 UK CISOs and CTOs. The findings revealed what CISOs believe to be the biggest risks to businesses, which areas are hindering growth and what kind of technology respondents are likely to implement in order to overcome these challenges.

Leave a comment

Filed under Risk Xtra

Radware reports increase in companies targeted by nation state hackers

Radware, the provider of cyber security and application delivery solutions, has released its 2019-2020 Global Application and Network Security Report. The report finds that more than one-in-four respondents attribute attacks against their organisation to cyber warfare or nation-state activity. In 2018, 19% of organisations believed they were attacked by a nation state. That figure increased to 27% in 2019. At 36%, companies in North America were more likely to report nation state attribution.

“Nation state intrusions are among the most difficult attacks to thwart because the agencies responsible often have significant resources, knowledge of potential zero day exploits and the patience to plan and execute operations,” said Anna Convery-Pelletier, chief marketing officer at Radware. “These attacks can result in the loss of sensitive trade and technological or other data. Security teams may be at a distinct disadvantage.”

These findings come at a time of heightened anxiety for security managers. Organisations are increasingly turning to microservices, server-less architectures and a mix of multiple cloud environments. Two-in-five managers reported using a hybrid environment that included cloud and on-premises Data Centres. Two-in-five said they relied on more than one public cloud environment. However, only 10% of respondents felt that their data was more secure in public cloud environments.

NationStateHackers

As organisations adapt their network infrastructure to enjoy the benefits of these new paradigms (such as microservices and multi-cloud environments), they increase their attack surface and decrease the overall visibility into their traffic.

For example, 22% of respondents don’t even know if they were attacked, 27% of those who were attacked don’t know the hacker’s motivations, 38% are not sure whether an Internet of Things (IoT) botnet hit their networks and 46% are not sure if they suffered an encrypted DDoS attack.

Convery-Pelletier added: “This report finds that security professionals feel as though the battlefield is shifting under their feet. Companies are increasingly adding and relying upon new paradigms, which means the infrastructure is harder to monitor for attacks. These new technologies force a shift in security implementation into the development teams. Security is often an afterthought as businesses march forward, and there’s a misconception that ‘good enough’ is enough.”

In addition, the report also found the following points of note:

The emergence of 5G networks As the push for 5G grows, there exists an important opportunity to build security into networks at its foundations. Despite the increasing buzz around 5G networks, only 26% of carriers responded that they felt well prepared for 5G deployment, while another 32% stated that they were somewhat prepared

Be careful what you wish for in terms of the IoT 5G promises to advance organisations’ implementation of (and the value they derive from) IoT technologies, but that promise comes with a corresponding increase in the attack surface. When it comes to IoT-connected devices, 44% of respondents said malware propagation was their top concern, while lack of visibility followed at 20% and Denial of Service at 20%

Data loss is top concern About 30% of businesses stated that data theft as a result of a breach was their top concern following an attack, which is down from 35% the previous year, followed by service outages at 23%. Meanwhile, 33% said that financial gain is a leading motivation for attacks

Leave a comment

Filed under Risk Xtra

Hanwha Techwin focuses on Top 5 Video Surveillance Trends for 2020

Hanwha Techwin, the supplier of IP and analogue video surveillance solutions, has put forward its Top 5 key trend predictions for the security industry in 2020. These include Artificial Intelligence end-to-end security solutions, cyber security, cloud-based data insights, privacy protection and vertical specialised solutions.

Artificial Intelligence End-to-End Security Solutions

As Artificial Intelligence becomes more broadly adopted across industries, it’s likely to be more widely incorporated in video surveillance in the upcoming year. Edge-based Artificial Intelligence (which filters and processes data locally on a camera) will be more ubiquitous, enabling end-to-end Artificial Intelligence technology.

Today, most security cameras send the data they collect to servers to be analysed. However, with edge-based Artificial Intelligence, the data is first analysed by the camera and subsequently sent to the server. This reduces the burden of transferring and storing large amounts of data to a server, thereby increasing efficiency, saving time and reducing server costs typically required to analyse data.

HanwhaTechwinSurveillanceTrends2020

In 2020, Hanwha Techwin will introduce edge-based Artificial Intelligence cameras, as well as Artificial Intelligence-powered NVRs and VMS so as to bring to market end-to-end (camera to storage server and VMS) Artificial Intelligence security solutions.

Cyber Security

With Internet of Things (IoT) devices becoming ubiquitous, the importance of cyber security has never been more prominent that it is today. Today’s cyber attacks are more intelligent and advanced than ever before, so building cyber-resilient security systems is no longer an option, but an imperative.

Smart Cities, factories, financial institutions and retailers require scaleable video surveillance solutions which are closely interconnected with other devices and networks, making the importance of cyber security paramount.

Strong cyber security has always been Hanwha Techwin’s priority and the company has been refining its technology to suit ince the beginning. The soon-to-be released Wisenet 7, the newest version of Hanwha Techwin’s own System on Chip, has been designed with the strongest cyber security features including a secure booting function and signed firmware for both software and hardware. Validated by the UL Cyber Security Assurance Program certification, Wisenet 7 ensures that end users have access to the industry’s most advanced cyber security features.

Cloud–Based Data Insight

According to IDC, the provider of IT-focused market intelligence, there will be about 175 zettabytes of data in the world by the year 2025, with much of it stored in the cloud and Data Centres around the world. At the same time, video surveillance solutions will go far beyond functioning as a simple monitoring tool to become an indispensable aid to organisations by providing useful insights that improve business operations.

The importance of accessible cloud-based servers that can easily store and analyse the accumulated data will also increase. Going beyond being an efficient storage repository, sophisticated analytics will use cloud processing to analyse the stored data and provide practical and timely insights. 

In 2020, Hanwha Techwin will introduce cloud-based solutions beginning with the Device Health Monitoring Cloud, which will monitor and manage video surveillance devices in real-time. The company will also introduce Retail Insight Cloud which is designed to facilitate store management.

Privacy Protection

Together with cyber security, Hanwha Techwin believes that the protection of personal data should be integral to the business ethics of a video surveillance company. By its very nature, the video data that’s collected for security purposes almost always contains private information. Therefore, protecting surveillance data is imperative.

Around the world, privacy protection laws are being introduced, such as the General Data Protection Regulation (GDPR) in Europe and the Federal Information Security Management Act in the US. The California Consumer Privacy Act is also set to come into effect in January 2020.

These laws will force the video surveillance industry to follow ‘privacy by design’ Best Practice and renew all efforts designed to protect personal data from misuse and abuse. Organisations are increasingly aware of the dangers of private data breaches and they’re becoming more discerning when choosing security products and solutions.

Hanwha Techwin provides a solution with Video Privacy Management technology and has released its Smart Cover of Privacy line-up to comply with the GDPR globally.

Vertical Specialised Solutions

Vertical markets in the security industry are increasingly requiring more specialised devices and solutions that meet unique requirements. With the emergence of the fourth industrial revolution, the presence of smart verticals will be more prominent and video surveillance companies must be ready to provide solutions for Smart Cities, factories, transportation and retail organisations.

SoonHongAhnHanwhaTechwin

Soon Hong Ahn

Hanwha Techwin already provides products for these verticals and plans to expand its line-up of specialised solutions in the very near future to include asset management solutions with IoT technology.

“Advancement in technologies such as Artificial Intelligence, the IoT and the cloud will support new use cases in conjunction with existing devices and solutions to meet customers’ needs in various verticals, expanding the horizon of our industry,” said Hanwha Techwin’s president and CEO Soon Hong Ahn. “However, we must also be mindful of the social and ethical responsibility related to areas such as cyber security and private data protection. Sustained interest and investment in these areas must be regarded as an obligation to make sure our industry continues to thrive in the midst of rapid technological advancements.”

Leave a comment

Filed under Risk Xtra

BlackBerry Cylance outlines cyber security predictions for 2020

Josh Lemos, vice-president of research and intelligence at BlackBerry Cylance, has put forward some predictions on cyber security trends for 2020 that will impact Governments and companies across a variety of industry sectors.

(1) Uncommon attack techniques will emerge in common software

Steganography, the process of hiding files in a different format, will grow in popularity as online blogs make it possible for threat actors to grasp the technique. Recent research at BlackBerry found malicious payloads residing in WAV audio files, which have been used for decades and categorised as benign.

Businesses will begin to recalibrate how legacy software is defined and treated and effectively invest in operational security around them. Companies will look for ways in which to secure less commonly weaponised file formats, like JPEG, PNG and GIF, etc without hindering users as they navigate the modern computing platforms.

BlackBerryCylance2020Predictions

(2) Changing network topologies challenge traditional assumptions and require new security models

Network-based threats that can compromise the availability and integrity of 5G networks will push Governments and enterprises alike to adopt cyber security strategies as they implement the 5G spectrum. As cities, towns and Government agencies continue to overhaul their networks, sophisticated attackers will begin to tap into software vulnerabilities as the expansion of bandwidth that 5G requires inevitably creates a larger attack surface.

Governments and enterprises will need to retool their network, device and application security. We will see many lean towards a zero-trust approach for identity and authorisation on a 5G network.

Threat detection and threat intelligence will need to be driven by Artificial Intelligence and machine learning to keep up.

(3) 2020 will see more cyber-physical convergence

As all sectors increasingly rely on smart technology to operate and function, the gap between the cyber and the physical will officially converge. This is evident given the recent software bug in an Ohio power plant that affected hospitals, police departments, subway systems and more in both the US and Canada.

Attacks on Internet of Things (IoT) devices will have a domino effect and leaders will be challenged to think of unified cyber-physical security in a hybrid threat landscape.

Cyber security will begin to be built into advanced technologies by design to keep pace with the speed of IoT convergence and the vulnerabilities that come with it. 

(4) State and state-sponsored cyber groups alike are the new proxy for international relations

Cyber espionage has been going on since the introduction of the Internet, with Russia, China, Iran and North Korea seen as major players. In 2020, we will see a new set of countries using the same tactics, techniques and procedures as these superpowers operate against rivals both inside and outside of national borders.

Mobile cyber espionage will also become a more common threat vector as mobile users are a significant attack vector for organisations that allow employees to use personal devices on company networks.

We will see threat actors perform cross-platform campaigns that leverage both mobile and traditional desktop malware. Recent research discovered nation state-based mobile cyber espionage activity across ‘The Big 4’, as well as in Vietnam. There’s likely to be more attacks coming in the future. This will create more complexity for Governments and enterprises as they try to attribute these attacks, with more actors and more endpoints in play at a larger scale.

Leave a comment

Filed under Risk Xtra

Synectics to highlight value of ethical surveillance tools at Global MSC Security Conference 2019

This year’s Global MSC Security Conference and Exhibition, which runs at The Bristol Hotel in Bristol on 11-12 November, will see Synectics explain how advanced technologies and evolving features can support those practitioners tasked with ensuring that public surveillance is undertaken legally and ethically.  

Over 150 delegates from the fields of security, law enforcement, Government and academia are due to attend the two-day event, which will focus on the ethical challenges presented by the growing use of CCTV, ANPR, drones, facial recognition and Artificial Intelligence (AI) within the public realm. Risk Xtra is the Official Media Partner.

Speakers include Tony Porter, the UK’s Surveillance Camera Commissioner, who’ll be joined by senior representatives from police forces, Fire and Rescue Services and other organisations focused on public safety, crime prevention and national security.

SynecticsSynergy3

‘Building Ethical Capacity into Surveillance Technology’

Synectics’ Martin Bonfield joins the event line-up. His detailed seminar will highlight how public concerns regarding surveillance ‒ especially those around the use of emerging technologies such as facial recognition and AI ‒ are shown to be greatly reduced if robust and demonstrable safeguards are in operation.

Those attending the session will gain a clear understanding of the tools available to help ensure that any public surveillance data can be captured, managed and shared in accordance with existing and evolving demands. 

The session will look specifically at solutions designed to support users in four key areas: the use of facial recognition, regulatory compliance (with, for example, the General Data Protection Regulation), data protection (cyber security) and evidence management.

Under the spotlight

To showcase emerging capabilities, Synectics will be demonstrating how its Synergy 3 Command and Control platform supports a wide range of safeguarding and compliance mechanisms, including comprehensive digital audit trails, automated workflows aligned to standard operating procedures and time-limited data storage.

The role played by highly secure, cloud-based evidence lockers ‒ which support secure, real-time authorised access to data ‒ will also be discussed, specifically in the context of inter-agency data-sharing.

MartinBonfieldSynectics

Martin Bonfield

Bonfield informed Risk Xtra: “Synectics has been at the forefront of global surveillance solutions for over 30 years. We work closely with customers to tackle the complex issue of ethics surrounding CCTV use, data capture and monitoring, as well as the robust management of digital evidence. I’m looking forward to showing delegates examples of the smart technology available to ensure surveillance operations are effective, secure and compliant with legal and ethical frameworks – today, and years from now.”

As a premium sponsor, Synectics (exhibiting on Stand 15) will be showcasing its leading-edge technologies. Live demonstrations will run throughout the event to demonstrate how the tools explored in the seminar can be applied within a range of practical evidence management and incident response scenarios.

Leave a comment

Filed under Risk Xtra

IDIS Global Partners Summit highlights developments in analytics and end-to-end solutions for strategic markets

The latest advances in video analytics – including improved classification, accuracy and speed – were unveiled at a Global Partners Summit of international security and video surveillance professionals hosted by IDIS in Seoul, South Korea.

The three-day event, attended by senior executives from leading security distributors from 23 countries, focused on how IDIS is responding to market trends and needs, developing end-to-end solutions (including specialist technologies for a range of vertical markets) and pushing forward with improvements to the IDIS Deep Learning Engine, the technology which powers the company’s ‘AI in the Box’ and IDIS Deep Learning Analytics solutions for end users.

Earlier this year, IDLA Version 3.0 was introduced as a service module for up to 80 channels within the IDIS Solution Suite VMS and it set new performance benchmarks by achieving an accuracy of 97%-98% while dramatically reducing false alarms. Responding to customer demand for easier, more affordable analytics for smaller applications, IDIS also launched its aforementioned DV-2116 ‘AI in the Box’ solution.

IDISGPS2019

Delegates learned of future enhancements in meta-data searching by class, colour and number, plus the ability to search a specific area of interest. People counting, fall detection and the ability to search by the direction of an object’s movement were also previewed and delegates received advanced notice of a new range of AI-ready 5 MP cameras, featuring deep learning on-the-edge analytics, due for release next year.

Technology roadmap for 2020

The Global Partners Summit also previewed IDIS’ ambitious video product and technology roadmap for 2020, further building out the company’s end-to-end solutions for core vertical market sectors.

Innovations in recording and camera technology, and the growing importance of cyber security, extended warranties and the advantages of delivering lower total cost of ownership and lower total cost to serve for systems integrators and installers were among key topics discussed at the event.

IDIS works closely with its partners and hosts the annual Global Partners Summit as an opportunity to exchange market insights and steer its strategies for product development, technical support and marketing.

Partners shared Best Practice implementations and related Case Studies in core vertical markets including retail, education, logistics and distribution and hotels.

Awards for Best Practice

Joon Jun, president of the IDIS Global Business Division, recognised outstanding project implementations and presented special awards for Best Practice to Alarm Automatika from Croatia and BTCO of Chile.

IDISGPSAwards

This collaborative approach, focusing on long-term partnerships, is a key element in the company’s success. It’s a customer-focused model that has seen IDIS grow continuously since 1997 to become Korea’s largest in-country video surveillance manufacturer, with regional operations now expanding across 50-plus countries.

Concluding the Global Partners Summit, special partner awards were presented by YD Kim, CEO of IDIS, recognising outstanding collaboration and sales growth over the last year. These were given to Alarm Automatica of Croatia, CCTV Center from Spain, EPCOM of Mexico, JES CQTEC of Thailand and Japan’s Secure Inc.

JoonJunIDIS

Joon Jun

“The expertise, energy and commitment from all our partners at this year’s Global Partners Summit demonstrates yet again that collaboration is that the best route to success,” said Joon Jun. “Together, we’re giving our customers the most advanced video surveillance solutions, ease-of-use and installation, scaleability and protection against today’s cyber security risks.”

Leave a comment

Filed under Risk Xtra