Tag Archives: Network Security

IDIS uses latest Surveillance Summit in Seoul as platform to sharpen strategic vision for “ambitious video surveillance tech future”

The recent Surveillance Summit of international security and video surveillance specialists, hosted by IDIS in Seoul, South Korea, focused on some of the key drivers that will shape the global video market over the next three years.

The growing importance of upcoming innovations in Artificial Intelligence, recording and camera technology, network security, extended warranties and the need for increasingly powerful VMS capabilities were among those topics discussed at the event.

Delegates from around the world had their first opportunity to see the second iteration of IDIS’ Deep Learning Analytics (IDLA). Version 2.0 IDLA sets new market benchmarks with accuracy of 96% and a speed of up to 200 fps permitting analysis of 32 channels on a simultaneous basis.

Further, IDLA doesn’t need additional processing power, meaning that end users will not have to upgrade existing hardware. When IDLA becomes commercially available early next year, IDIS will remain committed to its promise of a low total cost of ownership by affording users access to both standard and advanced analytical functionality, such as appearance searching, through just one simple and affordable license.

IDISDeepLearningAnalyticsPeople

Secure design and manufacturing

The Summit also focused on the importance of secure design and manufacturing to dispel common market concerns around ‘back doors’ and assert how the use of IDIS proprietary protocols hardens network security.

The agenda also covered sector-specific application developments in key markets where IDIS solutions are increasingly being adopted, including large-scale projects in the Asian region, Europe, the Middle East and the United States.

Held over two days, the annual Surveillance Summit has grown in scope over the last three years and is now an important diary date for those attending. It’s seen as a chance to network with leading market specialists from around the world to share lessons from projects which are frequently at the cutting edge of surveillance development.

IDISDeepLearningAnalyticsBicyclesVehiclesPeople

The Summit is also used as an opportunity to focus on business development, whereby IDIS works closely with its partners to refine its marketing and media strategy for the coming year, share the latest information about market trends and insights and drive product development and continual improvements in technical support.

Long-term collaboration

This long-term, collaborative approach between IDIS and its business partners is a key element of the company’s growth strategy. It’s this customer-focused drive that has seen IDIS grow continuously since 1997 to become Korea’s largest video surveillance manufacturer, with regional operations now expanding across 50-plus countries.

IDIS2018PartnerAwards

Concluding the Summit, IDIS CEO Y.D. Kim (pictured above, far right in each image) presented 2018 Business Partner Awards to three companies – namely Avix (Russia), Trinet (Singapore) and Red Office (Bangladesh) – in recognition of their commitment to a close partnership and their outstanding performance over the last year.

Collecting the awards were (pictured above, left to right): Aleksander Khrakov (CEO of Avix), Tex Tan (CEO) and Jason Tan (managing director) of Trinet and Naeem Uddin Mahmood of Red Office.

“Our three award winners, and indeed all of our partners attending this Summit, demonstrate that the surest route to success is always through collaboration,” said Joon Jun, president of the IDIS Global Business Division. “Gathered at this Summit we have a level of expertise that’s unrivalled in our sector, and we share a commitment to giving our customers the very best in video surveillance solutions. Knowing this, we can all look forward with great confidence to the year ahead.”

Leave a comment

Filed under Risk Xtra

360 Vision Technology and Visual Management Systems guard against cyber attacks

As more and more security systems and devices become IP networked, it’s important for security installers and end users alike to consider how their systems will be protected against the possibility of cyber attacks. Providing a solution to the concerns around cyber security and hacking, CCTV specialist 360 Vision Technology has partnered with software control provider Visual Management Systems to provide security operators with an effective solution designed to guard against IP surveillance system cyber attacks.

Without the right level of network security measures in place, system users can be left vulnerable, resulting in exposure to the type of hacking and malware attacks that have recently hit the news headlines.

A serious security breach of an IP network can lead to system inoperability and network downtime and, at worst, direct access to corporate networks for the cyber criminals.

To provide IP surveillance system installers and operators with peace of mind, when used together both 360 Vision Technology cameras and Visual Management Systems’ TITAN SECURE Physical Security Information Management system can exceed 802.1x authentication protocols and encryption to provide “the ultimate protection” for surveillance networks via the latest patent pending technology.

360VisionTechnologySSL8022C5A19E

Designed to Centre for the Protection of National Infrastructure standards, this advanced protocol and encryption technology is said to offer a “far higher level” of hacking protection.

Advanced cyber attack protection

Ultimately, security and IT managers have much to gain by implementing the security advantages of a 802.1x authenticated network. Conversely, they also have a lot to lose should they ignore the security risks involved.

“As part of our ongoing development of products and deep integration techniques, we looked closely at the vulnerabilities of current camera systems and found that expert hackers could easily take control of standard network cameras, and even those models with HTTPS certification,” explained John Downie, sales director at Visual Management Systems. “Employing 802.1x authentication at both the camera and control end using 360 Vision Technology cameras and TITAN SECURE in combination is the most effective way in which to fully secure an IP camera network.”

Mark Rees, business development director at 360 Vision Technology, added: “Designed to protect organisations against hacking and ransomware attacks, the latest 360 Vision Technology IP surveillance cameras include advanced 802.1x encryption protection. Designed and built in the UK, our high-performance camera technology offers customers proven reliability, advanced imaging performance and effective cyber security for use within any high or general level camera surveillance application.”

Leave a comment

Filed under Risk UK News

“‘Clean’ Microsoft Office documents deliver cyber threat” warns Bitdefender

Bitdefender, the anti-virus solutions specialist, is warning Microsoft Office users about the emergence of a new spam campaign that’s looking to trick anti-spam filters in order to allow spam to pass freely into mailboxes. The campaign’s success is elevated due to the attachment of what appears to be a ‘clean’ Microsoft document alongside the spam e-mails.

“For a few days, cyber criminals have been sending targeted e-mails to management departments,” explained Catalin Cosoi, chief security strategist at Bitdefender. “The e-mails look like a tax return, a remittance or some kind of bill from a bank and carry a Microsoft Word or Excel attachment. If you’ve recently received an odd tax return or a similar request via e-mail then you may not want to open the file.”

The e-mail isn’t stopped by anti-spam filters because the file itself is clean. The trap lies in the use of macros within the document. Those lines of code, adopted in Microsoft Office, are generally used to create formulas or a repetitive task, but they can also interact with the whole Windows environment and have an impact on an entire system.

A new cyber campaign is designed to trick anti-spam filters such that they allow spam communications to access mailboxes

A new cyber campaign is designed to trick anti-spam filters such that they allow spam communications to access mailboxes

The code in these ‘clean’ documents is a command for the victim’s computer to download a piece of malware from a remote server that will execute automatically, with the macro code disguised to bypass traditional anti-viruses.

Cosoi continued: “The malware on the remote server is either a ransomware or an industrial espionage tool. Both are as dangerous as they look. The effect of the ransomware is immediate as it can encrypt a company’s important files and ask for a ransom. The espionage tool can be even more vicious depending on what kind of files it’s able to access.”

In order to prevent the threat, a company’s network needs security from end to end. There cannot be any reliance on a single defence.

Bitdefender recommends using an anti-virus solution that proactively protects against threats in order to block the danger before it even has the opportunity to send a command – in this case, to prevent the macro from downloading the malware.

Leave a comment

Filed under Risk UK News

AT&T and IBM simplify cyber security management through new joint venture

AT&T* and IBM have announced a new strategic relationship to give businesses a simplified, single-source for network security and threat management.

The two companies will offer business customers a new joint service combining security network infrastructure with advanced threat monitoring and analytics. The new service is initilly available in the US with plans for global expansion.

Cyber threats have become a Boardroom agenda with the potential to bring down an organisation’s network, create compliance issues, damage bottom lines and impact brand reputation.

Additionally, disparate security technologies create ‘security silos’ and can increase the cost and complexity of security management, making it almost impossible to uniformly monitor security threats across IT environments.

The new service from AT&T and IBM will help businesses address these challenges with a highly secure network infrastructure, analytics and the optimal blend of on-premise and next generation cloud-managed security capabilities.

AT&T and IBM will improve the management of these capabilities with the following customer benefits:
• Reduced costs and minimised complexities
• Advanced visibility with intelligence and control across diverse IT environments
• Simplified infrastructure with less need for security hardware, licenses and maintenance

Specifics of the joint offer

Individually, AT&T and IBM boast world class IT security data monitoring operations, each generating advanced security threat intelligence from the billions of security events they track each day.

Together, the companies will create a combined security intelligence source and analytics capability that will be “unmatched” in the industry.

The new offering is comprised of proven solutions from AT&T and IBM. Specific elements of the new offering include Network Security Infrastructure and Managed Security Services from AT&T, including network-based firewall, IDS/IPS, web filtering, secure e-mail gateway and distributed denial of service (DDoS) protection services for security devices managed on premise or in the AT&T cloud.

IBM capabilities include IBM Network Security Consulting to assess and transform network security, IBM Security Monitoring and Threat Intelligence for faster threat detection and response and IBM Emergency Response Services for around-the-clock security expert support in responding to sophisticated attacks and helping remediate them.

“With today’s constantly changing threat environment, companies need cost-effective solutions that provide end-to-end protection alongside real-time monitoring and response operations,” said Andy Daudelin, vice-president (security services) at AT&T Business Solutions. “We’ve created an unparalleled solution with the combined strength, reliability and agility of AT&T network-based security services and IBM threat intelligence and analytics.”

Kris Lovejoy – general manager for IBM Security Services – added: “Organizations are finding great benefits with hybrid IT strategies that blend mobile, cloud-based and on-premise IT resources. However, securing these infrastructures can be complicated without a single, integrated management system that avoids creating silos of security data making it almost impossible to uniformly monitor security threats across environments. IBM and AT&T have come together to offer unprecedented security services designed to break down those silos and better secure data no matter where it resides.”

“This is an advantageous combination of industry-leading network-based security, consulting, and analytics,” commented Christina Richmond, program director for infrastructure security at IDC.

“AT&T and IBM are meeting a real market need with a robust end-to-end security solution that provides enterprise customers with both integration and simplicity.”

Note: *AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.

Leave a comment

Filed under IFSECGlobal.com News