Tag Archives: Software

Global Security Exchange accepting applications for 2018 Innovative Product Awards

ASIS International is now inviting exhibiting companies to enter the 2018 Innovative Product Awards: a competition designed to recognise “the most groundbreaking offerings” on the Global Security Exchange (GSX) expo floor. Winners will be announced and recognised at the 2018 GSX, which takes place from 23-27 September at the Las Vegas Convention Centre and is expected to attract more than 20,000 security professionals from over 100 countries.

“While there are many awards programmes out there, the Innovative Product Awards stand apart because the judges are security practitioners,” said Howard Belfor CPP, co-chair of the awards programme and a member of the ASIS Board of Directors. “They are the individuals who use these products every day. They bring tremendous expertise to the judging process. For attendees, this means that award winners offer peer-distinguished products that address industry trends and are well worth exploring on the GSX expo floor.”

ASISGSX2018

Formerly the ASIS Accolade Competition, the revamped Innovative Product Awards will spotlight the leading products (encompassing hardware, software, testing materials, practices and thought leadership) designed to tackle current and emerging global security risks and threats. A team of judges representing security practitioners, thought leaders and industry experts will select up to ten winners based on their level of innovation, unique attributes and specific benefits offered to the security industry. In addition, one product will be named ‘The Judges’ Choice’.

The Innovative Product Awards provide an opportunity for companies to demonstrate new products and services at the show and across the security marketplace.

The deadline for submissions is Friday 3 August. Winners will be honoured at the GSX and given time to showcase how their product addresses market needs on the new X Stage. This is a learning theatre located on the GSX expo floor where esteemed industry experts will present future-forward sessions on topics such as Artificial Intelligence, robotics and drones.

*For complete entry details visit the Innovative Product Awards web page at https://www.gsx.org/highlights-events/awards/ or e-mail exhibits@asisonline.org

Advertisements

Leave a comment

Filed under Risk Xtra, Uncategorized

Biometric credentials added to Inner Range’s access control solutions

Inner Range’s access control customers can now benefit from biometric credentials thanks to a new partnership initiated with biometric technology company Zwipe. The new service, which uses clients’ existing card readers, is one of several intelligent integrations that Inner Range will be demonstrating at a free Integration Showcase on April 24 at its European headquarters near Reading.

Other integrators at the event include Morse Watchmans, which combines key locker control and asset management systems with Inner Range’s security solutions, as well as Stentofon (which offers intelligent intercom solutions via Inner Range software).

Tim Northwood, general manager of Inner Range Europe, said: “Integration is at the heart of what we do. Our products allow clients to control access to all manner of places, spaces, systems and products at the local, national and even global levels. Our new partnership with Zwipe is the latest in a long and ever-increasing line of integrations designed to help our customers better control their buildings and systems and streamline their processes. We very much hope that our Integration Showcase will highlight the options and sophistication available with our products and afford potential new clients the opportunity to see them in action.”

InnerRangeZwipePartnership

The new partnership with Zwipe means that Inner Range’s clients can add fingerprint data to credentials and, crucially, continue to use their existing card readers. They don’t need to buy costly new readers. The system can employ Inner Range’s encrypted Sifer readers and only stores the biometric data on the card rather than in a central database.

Morse Watchmans will be demonstrating how its key control system can integrate with Inner Range products to strengthen security, ensure personnel safety and restrict movement if necessary, as well as improve reporting compliance and reducing damage and resulting lost productivity.

Stentofon will showcase how its intercom solutions integrate with Inner Range products to enable clients ‘to hear, be heard and understood, every time’ by providing interactive graphical representations, status and controls across multiple sites.

 

Leave a comment

Filed under Risk UK News

ISM introduces Enterprise version of proven integrated security management system

Intergrated Security Manufacturing (ISM), a leader in the design, development and manufacture of ISMS technology, has just launched an Enterprise version of the company’s proven Genesys integrated security management system (ISMS).

Already deployed within the Critical National Infrastructure sector, the new ISMS offers end users “unparalleled scale, redundancy and ease of use”.

As an enhancement of the existing Genesys2, the Enterprise version has been developed with the largest organisations in mind. Genesys is fully-scalable to manage and control multiple sites from a single Control Room (or even a single workstation) across a country, or even across continents. It features the most advanced levels of encryption to ensure network security, and is accredited to the highest standards of Government national infrastructure security.

Stephen Smith, managing director of ISM, believes that the extension of the Genesys range gives customers greater choice. “There have been a number of articles in the security press talking about PSIM companies starting to develop systems that go beyond the current solutions and moving to a federated architecture. With Genesys, we’re already there. Genesys Enterprise resolves those issues associated with the increasing geographical scope of clients, corporations, Governments and institutions, while also adhering to a multi-tiered hierarchy or ‘federated’ system here total control is centralised, but allows individual sites to maintain local control.”

ISMGenesysEnterprise

Smith added: “This new addition is ideally suited to those large organisations with multiple sites across multiple regions who might also want to ‘flex’ to accommodate further sites and geographies as their needs evolve. As this comes from the Genesys stable, existing users only have to upgrade from their existing version to Enterprise without the expense of a complete technology refresh.”

Multiple systems, multiple manufacturers

Crucially, the new development allows the integration of multiple systems from multiple manufacturers – all from one holistic integrated security system. Every electronic security or fire safety device from CCTV and intruder alarms through to electronic locking and Public Address can be monitored and controlled from a single platform, regardless of who made them.

Most importantly, this solution includes the existing Migrating 3+ technology, a patented automatic fail-over technology that adds higher levels of automatic configurable redundancy and power. Control is effectively distributed across multiple workstations.

“We take power to your PC and multiple it by the number of PCs on your network,” added Smith. “What this means is that, if one PC fails, control is migrated to another PC on a seamless basis with no interruption or downtime. Our system isn’t restricted in its performance by the size or capability of a server, and nor does it require the expense of moving to server farms or using clustering software. It means we deliver the most extreme redundancy characteristics for the threats you’ve thought of, not to mention those that you haven’t.”

Continuing this theme, Smith observed: “The Enterprise development within the existing Genesys isn’t a development waiting for a trial site, but rather it has already been installed within a high-security Critical National Infrastructure project. It is tested and proven at the highest level and under the most demanding of conditions and has been very successful.”

‘True’ ISMS

Genesys is a ‘true’ ISMS built around intuitive software that combines a range of industry-leading features and benefits including an enhanced graphical user experience, 3D modelling and a comprehensive event management database. Events and alarms are presented to the operator clearly as and when they happen.

“Operators can be quickly trained to gain maximum advantage,” highlighted Smith. “The system also enables end users to make better use of their staff and resources since they don’t have to have all of their Control Rooms working on a 24-hour basis. Genesys is a truly unique solution offering advanced system architecture, unparalleled ease of use for the operators and the very low lifecycle costs.”

The ISMS software operates as a standalone platform over LAN or WAN networks for remote and local sites with workstations that can be transferred to any operating Security Control Room on the network. This offers the end user flexibility when closing down sites or buildings for off-peak or out of normal working hours or in the unlikely event of any system failures.

Leave a comment

Filed under Risk UK News

Traka UK launches V Touch solution for limited space key management

Traka UK has launched a new intelligent key cabinet specifically designed to offer controlled access management for critical keys at locations where space is limited and only a few credentials need to be managed.

The company has unveiled its new V Touch as a secure unit with a seven-inch touch display to accommodate up to five sets of keys.

Powered by Traka’s exclusive electronics system, the V Touch presents full audit control capability such that administrators know exactly what keys have been taken, and by whom, together with the ability to instantly access usage reports.

TrakaVTouch

Traka’s V Touch is recommended as part of a networked solution using Traka’s specialist Traka Web software to enable central control of critical keys.

Steve Bumphrey, UK sales director at Traka, stated: “We’ve created the V Touch as an intelligent key management system to help ensure keys and credentials can be securely managed, even where space is at an absolute premium. This could include on board ships or for remote locations requiring maintenance. We hope the launch of the V Touch, which comes equipped with all the traditional management benefits you would expect from a Traka Touch system, demonstrates our commitment to listening and continually evolving our product range to meet both new and existing customer requirements.”

With further features including a solid locking door, built-in power supply and full battery back-up in the event of a power failure, Traka’s V Touch is available with card reader or biometric access options to enable customer preference and accommodation of individual site requirements.

Traka provides intelligent key and equipment management control to better protect essential assets resulting in improved efficiency, reduced downtime, less damage, fewer losses, lower operating costs and significantly less administration, allied with transparency and greater accountability and responsibility.

Leave a comment

Filed under Uncategorized

Cyber criminals “exploiting human weaknesses” to make their gains

Cyber attackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials or confidential information and transfer funds. A study by Proofpoint found that more than 90% of malicious e-mail messages featuring nefarious URLs led users to credential phishing pages, while almost all (99%) email-based financial fraud attacks relied on human clicks rather than automated exploits to install malware.

The Human Factor Report found that business e-mail compromise (BEC) attack message volumes rose from 1% in 2015 to 42% by the end of 2016 relative to e-mails bearing banking Trojans. BEC attacks, which have cost organisations more than $5 billion worldwide, use malware-free messages to trick recipients into sending confidential information or funds to cyber criminals.

BEC is now the fastest-growing category of email-based attacks.

Clicking

“Accelerating a shift that began in 2015, cyber criminals are aggressively using attacks that depend on clicks by humans rather than vulnerable software exploits, tricking victims into carrying out the attack themselves,” said Kevin Epstein, vice-president of Proofpoint’s Threat Operations Centre.

“It’s critical for organisations to deploy advanced protection that stops attackers before they have a chance to reach potential victims. The earlier in the attack chain you can detect malicious content, the easier it is to block, contain and resolve.”

Nearly 90% of clicks on malicious URLs occur within the first 24 hours of delivery, with 25% of those clicks occurring in just ten minutes and nearly 50% within an hour. The median time-to-click (the time between arrival and click) is shortest during business hours from 8.00 am to 3.00 pm EDT in the US and Canada, a pattern that generally holds for the UK and Europe as well.

Watch your inbox closely on Thursdays. Malicious e-mail attachment message volume spikes more than 38% on Thursdays over the average weekday volume. Ransomware attackers in particular favour sending malicious messages from Tuesday through until Thursday. On the other hand, Wednesday is the peak day for banking Trojans. Point-of-Sale campaigns are sent almost exclusively on Thursday and Friday, while keyloggers and backdoors favour Mondays.

Attackers understand e-mail habits and send most e-mail messages in the four-to-five hours after the start of the business day, peaking around lunchtime. Users in the US, Canada and Australia tend to do most of their clicking during this time period, while French clicking peaks around 1.00 pm.

Swiss and German users don’t wait for lunch to click. Their clicks peak in the first hours of the working day.

UK workers pace their clicking evenly over the course of the day, with a clear drop in activity after 2.00 pm.

Leave a comment

Filed under Risk UK News

“It’s time to bury hardware-based security solutions” argues VoipSec’s CEO

Paul German, CEO at VoipSec, believes now is the time for organisations to “bury” dedicated hardware-based security solutions.

“Recent years have seen a fundamental transformation in IT strategy, with networks being more agile and swiftly deployed and applications now deliverable quickly, in any location and scaled to meet an organisation’s requirements,” said German. “From virtualised hardware to network function virtualisation and software defined networking, the hardware and network infrastructure has become decoupled from the application and the application itself is increasingly located anywhere across the cloud.”

According to German, this decoupled approach itself demands a different approach to security. It can no longer be defined by network controls because those networks are virtual, disparate and remote. “When organisations access applications via an Internet address,” commented German, “the physical location is increasingly unknown. Security, therefore, needs to be elastic and flexible.”

German explained that the hardware-based, dedicated Session Border Controller (SBC) doesn’t fit into this model. As an approach to securing the VoIP network, German feels it’s “fundamentally flawed” on many levels.

PaulGerman

Paul German

“It constrains an organisation’s virtualisation strategy. How can a company quickly spin up new cloud-based voice applications, for example? As organisations look to gain the cost, agility and scalability offered by hardware and network virtualisation, the hardware SBC is clearly a problem.”

German added: “Perhaps the most concerning issue is that this approach is flawed from a pure security perspective. Hardware SBCs are considered both one off investments and one off deployments. As every security Best Practice model will attest, with a constantly changing threat landscape any failure to undertake routine updates will leave the organisation vulnerable.”

To be effective, as far as German’s concerned, security solutions must reflect the emerging risk and the current deployment trend.

“A software only model that’s continually updated to mitigate the evolving threat landscape is essential. Software-based SBCs, either on premise or in the cloud, also explore community-led intelligence about threats and risk experiences to rapidly disseminate new threat information and Best Practice. This combination of routine product updates with shared intelligence ensures an attack on a single organisation can be quickly transformed into a patch or update that protects every business from the new risk.”

Despite the widespread adoption of VoIP, the majority of SBC vendors are simply failing to respond and still advise an implement once model. “They fail to update customers on the evolving threat landscape and they cannot support the agile, decoupled infrastructures now required. It begs the question: ‘Just what is the value of the hardware-based SBC?'”

Leave a comment

Filed under Risk UK News

Ideagen launches enterprise safety management and incident reporting software dubbed Ideagen Coruson

Software firm Ideagen has launched Ideagen Coruson – a “definitive and visionary” re-brand of its enterprise safety management and incident reporting software. Gael Enlighten, a cloud-based software solution used by some of the world’s leading brands including Virgin Trains, Telefonica and Haeco Group, will now be known as Ideagen Coruson.

The re-brand project comes as Ideagen seeks to align its product portfolio following several successful acquisitions in recent years. The Gael Enlighten software was part of the Intellectual Property purchased in the £18 million acquisition of Gael Ltd back in December 2014.

Ideagen CEO David Hornsby said the time had come to ‘retire’ the Gael brand. “We’re delighted to announce the renaming of Gael Enlighten to Ideagen Coruson which will modernise the product brand and bring it into conformity with the rest of our product suite. As an important part of Ideagen’s portfolio of governance, risk and compliance applications, Coruson has matured over the past two years and has many high-profile customers. The application is fully ‘productised’, commercialised and generally available and, given its visionary nature, the time has come to retire the Gael brand name and launch the definitive version of the product brand.”

ideagencorusonlogo

Hornsby added: “These are exciting times for Ideagen as an organisation and we’re looking forward to Ideagen Coruson playing an integral role in the company’s future success.”

Ideagen Coruson is currently used by some of the world’s leading brands as well as organisations with extensive global reach including the UK Rail Safety and Standards Board, Haeco, Virgin Trains, Johnson Matthey, Air Transat, Telefonica and A2 Milk.

Ben Dorks, Ideagen’s chief customer officer, explained to Risk UK: “This is an exciting announcement and an ambitiously significant re-brand of one of our most prominent, market-leading products. We’re delighted that the re-branding project has been welcomed by our customers. Ideagen Coruson comes with a fresh new colour palette and appearance, but the popular architecture and roadmap of the software remains entirely the same. This cements its place as the most user-friendly enterprise cloud safety and incident reporting software on the market.”

Leave a comment

Filed under Risk UK News, Uncategorized