ONVIF, the global standardization initiative for IP-based physical security products, has announced that it will end its support for Profile Q early next year since it contains certain specifications that are no longer consistent with current cyber security best practices.
Profile Q was developed to provide an easy setup of a conformant device on an IP network. It requires a Profile Q conformant device to allow anonymous access to all ONVIF commands, during the setup process in the factory default state.
This does not follow current cyber security best practices, which recommend, among other things, that a network device require users to set passwords and other access rights before the device can be used. Since the specifications of a profile cannot be changed as it would impact interoperability between products that conform to a specific profile, Profile Q will be deprecated on March 31, 2022.
ONVIF conformant products
ONVIF conformant products are used in a wide variety of industries and geographies"
“ONVIF conformant products are used in a wide variety of industries and geographies, with different requirements when it comes to cyber security policies or best practices,” said Leo Levit, Chairman of the ONVIF Steering Committee.
Leo adds, “As these cyber threats evolve quickly, it’s important that users are aware of these best practices to ensure they are implementing cyber security measures that are appropriate for their organization.”
ONVIF Network Interface Specifications
ONVIF recommends following industry best practices and local regulations, and staying informed about technology changes from the market.
The ONVIF Network Interface Specifications have defined network protocols that include security elements, such as TLS (Transport Layer Security), which allows ONVIF devices with that feature to communicate with clients across a network, in a way that protects against eavesdropping and tampering.
ONVIF Default Access Policy
ONVIF specifications also cover the ONVIF Default Access Policy, which specifies that there should be different access classes to services based on different user roles. Manufacturers can implement these ONVIF specifications regardless of whether the specifications are included in a profile or not.
Founded in 2008, ONVIF is a well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system, and access control companies, and more than 20,000 profile conformant products.
IP interoperability solutions expansion
ONVIF offers Profile S for streaming video, Profile G for video recording and storage, Profile C for physical access control, Profile A for broader access control configuration, Profile T for advanced video streaming, Profile M for metadata and events for analytics applications, and Profile D for access control peripherals.
ONVIF continues to work with its members to expand the number of IP interoperability solutions that ONVIF conformant products can provide.
Aqua Security, the pure-play cloud-native security solutions company, has announced the availability of its new Aqua Platform, with a unified console to ease the journey from scanning and visibility to workload protection in cloud-native environments.
The new Aqua platform reduces administrative burden and allows security teams to start with scanning and cloud security posture management (CSPM) capabilities, then add in sandboxing capabilities and workload protection as needed. The experience is streamlined regardless of scale and is available as a SaaS or self-hosted deployment.
“Scaling our cloud-native security needs is a priority for us,” said Thomas Ornell, Senior Systems Engineer at ABAX, adding “We have been working with Aqua to secure our cloud-based Kubernetes environments and improve visibility of our current risk. The tooling provided by Aqua is making it a lot easier to navigate our way through our cloud-native security strategy.”
Cloud Workload Protection Platform capabilities
The unified approach lowers management overhead for advanced run time features
The unified approach lowers management overhead for advanced run time features, in an industry where scanning during development and CSPM are easier for teams to understand and deploy as a first step, but critical Cloud Workload Protection Platform (CWPP) capabilities are sometimes left behind.
It also enables customers to benefit from better context and prioritization in identifying risks and threats, adopting a full-lifecycle approach to securing cloud-native applications. In a recent survey of cloud-native security practitioners, only 32% of respondents were confident in protecting against attacks in-progress in their cloud-native environments.
CNAPP integrates cloud security tools
In a recent report, Gartner notes that CNAPP is an emerging capability that brings together cloud security tools, including CWPP and CSPM. CNAPP tools will integrate information from both CWPP and CSPM, in order to provide more detailed insights into security behaviors in CIPS (cloud infrastructure and platform services) deployments.
Aqua is also seeing a growing trend within its customer base for the adoption of both CWPP and CSPM capabilities in a unified platform. “In the past year, Aqua has seen a 3x increase in CSPM customers who have also purchased Aqua’s CWPP capabilities,” said Amir Jerbi, Co-Founder and Chief Technology Officer (CTO) at Aqua Security.
Protecting workloads at run time
Amir Jerbi adds, “Organizations recognize the need to protect workloads at run time, and Aqua is keeping pace with that demand, bringing more unification without compromising scalability. While other solutions require multiple screens and consoles, or just provide visibility without options for workload protection, Aqua offers the industry’s only comprehensive unified platform.”
This recent release of the Aqua Platform also includes dozens of new features and capabilities, including:
Automatic discovery and onboarding of CSPM within GCP environments.
Scanning Google Cloud Functions for vulnerabilities and sensitive data, extending prior support for AWS Lambda and Microsoft Azure
Migrating from the now deprecated Kubernetes PSP (Pod Security Policy) to the new PSS (Pod Security Standard) using new assurance policies and Aqua’s open-source Rego
Enhancing run time protection with file integrity monitoring for containers, and threat response policies that specifically block reverse shell attempts and crypto-mining.
Defining custom severities for specific vulnerabilities to conform with the customers’ internal standards.
Finding, provisioning, and managing Aqua within AWS environments using AWS CloudFormation templates.
New certified RedHat OpenShift Operator to automate Aqua deployments and upgrades.
CloudSense, the renowned provider of the world's most powerful Configure, Price, Quote, (CPQ) engine, has announced the appointment of Brian McCann as the new Chief Product Officer (CPO). Brian's addition to the team underlines the company's focus on product innovation across end-to-end revenue operations.
AI, security and core network expert
Brian McCann joins from Nokia Software, where he worked as the Chief Product Officer and Chief Technology Officer
Brian McCann joins from Nokia Software, where he worked as the Chief Product Officer and Chief Technology Officer (CTO), responsible for a wide software product portfolio, including monetization, AI/analytics, operations, security and core network.
Brian has shaped product strategy within market renowned technology companies, such as Oracle, Motorola and Portal Software, for more than 25 years, winning the recognition of industry analysts and commentators within the telecommunications industry.
Innovator in product development
“CloudSense has a tradition of leading the market in terms of product innovation and we are excited to be bringing Brian on board to extend our product vision further. His experience and leadership will play a critical role in driving business growth in our focus vertical markets and positioning us to enter new segments,” said CloudSense’s Chief Executive Officer (CEO), Jonathan English.
Brian McCann, the Chief Product Officer at CloudSense, said “I am proud and excited to join the very talented CloudSense team. Digital Commerce, CPQ, and Order Management are critical, business-enabling capabilities that allow enterprises to drive successful digital transformation strategies and CloudSense has demonstrated that its platform delivers concrete value to customers in the telecommunications, media and utilities industries.
Brian adds, “I am now looking forward to working closely with those customers to drive new innovations into the CloudSense portfolio that will give them the competitive edge they need.”
Secure Logiq is joining forces with 360 Vision Technology, AMG Systems, Cortech Developments, Harper Chalice and Suprema, to present a free webinar dedicated to Critical National Infrastructure (CNI) security technologies.
CNI security technologies webinar
The 1-hour session will take place on Wednesday 28th July at 10am BST (05.00 EDT, 09.00 UTC, 11.00 CEST, 13.00 GST 17.00 SGT) and has been created to offer practical support for those responsible for safety and/or security in the utilities, power, prisons and nuclear CNI sectors, including consultants and installers.
The security of Critical National Infrastructure has never been more important or more under threat"
“The security of Critical National Infrastructure has never been more important or more under threat,” said Secure Logiq’s Robin Hughes, adding “By partnering with these like-minded manufacturers who offer complementing solutions in the CNI space we will use this webinar to deliver a complete system overview. Our hope is to provide an informative and entertaining discussion around the subject with expert insights from across the solutions space.”
Covering asset protection and risk management
Named CNI Security Technologies - Optimising Risk Management and Asset Protection in the CNI sector, the webinar will cover how effective risk management and mitigation, asset protection, regulatory compliance and cost reduction can be achieved, via the use of innovative technologies.
Thanks to the combined expertise of the manufacturers involved, a state-of-the-art, end-to-end solution, which is specifically designed for CNI security applications, will be presented to attendees.
cyber secure optical, thermal, and radar camera systems
Topics being covered will include cyber secure optical, thermal, and radar camera systems, effective and innovative perimeter detection (PIDS), secure network backbone design for large infrastructures, flexible biometric access control with multi-factor and differentiating authentication, and optimized server and storage solutions that can provide a modular and scalable core platform for unrivaled interoperability of third-party security systems, via a centralized single platform hub.
“Our aim is for this webinar to be an educational experience for professionals in the CNI sector,” concludes Robin Hughes, adding “We want to create an open discussion around cutting edge technology for Critical National Infrastructure rather than just a dry presentation, and with the additional Q&A session, we want to make this as interactive as possible.”
Have you ever stopped to consider the volume of new data created daily on social media? It’s staggering. Take Twitter, for instance. Approximately 500 million tweets are published every day, adding up to more than 200 billion posts per year. On Facebook, users upload an additional 350 million photos per day, and on YouTube, nearly 720,000 hours of new video content is added every 24 hours.
While this overwhelming volume of information may be of no concern to your average social media user posting updates to keep up with family and friends, it’s of particular interest to corporate security and safety professionals who are increasingly using it to monitor current events and detect potential risks around their people and locations—all in real-time. Meet the fast-paced and oft-confusing world of open-source intelligence (OSINT).
What is Open Source Intelligence (OSINT)?
The U.S. Department of State defines OSINT as, “intelligence that is produced from publicly available information and is collected, exploited, and disseminated promptly to an appropriate audience to address a specific intelligence requirement.”
The concept of monitoring and leveraging publicly available information sources for intelligence purposes dates back to the 1930s. The British Broadcast Corporation (BBC) was approached by the British government and asked to develop a new service that would capture and analyze print journalism from around the world.
Monitoring and identifying potential threats
Originally named the “Digest of Foreign Broadcast, the service (later renamed BBC Monitoring which still exists today) captured and analyzed nearly 1.25 million broadcast words every day to help British intelligence officials keep tabs on conversations taking place abroad and what foreign governments were saying to their constituents.
OSINT encompasses any publicly accessible information that can be used to monitor and identify potential threats
Today, OSINT broadly encompasses any publicly accessible information that can be used to monitor and identify potential threats and/or relevant events with the potential to impact safety or business operations.
The potential of OSINT data is extraordinary. Not only can it enable security and safety teams to quickly identify pertinent information that may pose a material risk to their business or people, but it can also be captured by anyone with the right set of tools and training.
OSINT for cybersecurity and physical threat detection
Whether it be a significant weather event, supply chain disruptions, or a world health crisis few saw coming, the threats facing organizations continue to increase in size and scale.
Luckily, OSINT has been able to accelerate how organizations detect, validate, and respond to these threats, and it has proved invaluable in reducing risk and informing decision-making – especially during emergencies.
OSINT is typically shared in real-time, so once a situation is reported, security teams can then work on verifying critical details such as the location or time an incident occurred or provide the most up-to-date information about rapidly developing events on the ground. They can then continue to monitor online chatter about the crisis, increasing their situational awareness and speeding up their incident response times.
OSINT can help detect when sensitive company information may have been accessed by hackers
Severe weather offers a good example of OSINT in action. Say an organization is located in the Great Plains. They could use OSINT from sources like the National Weather Service or National Oceanic and Atmospheric Administration (NOAA) to initiate emergency communications to employees about tornado warnings, high winds, or other dangerous conditions as they are reported.
Another common use case for OSINT involves data breaches and cyber-attacks. OSINT can help detect when sensitive company information may have been accessed by hackers by monitoring dark web messaging boards and forums. In 2019, T-Cellphone suffered a data breach that affected more than a million customers, but it was able to quickly alert affected users after finding their personal data online.
OSINT is a well-established field with countless applications. Unfortunately, in an ever-changing digital world, it’s not always enough to help organizations weather a crisis.
Why OSINT alone isn’t enough?
One of the core challenges with leveraging OSINT data, especially social media intelligence (SOCMINT), is that much of it is unstructured and spread across many disparate sources, making it difficult to sort through, manage, and organize.
Consider the social media statistics above. Assuming a business wanted to monitor all conversations on Twitter to ensure all relevant information was captured, it would need to both capture and analyze 500 million individual posts every day. Assuming a trained analyst spent just three seconds analyzing each post, that would amount to 1.5 billion seconds of labor—equivalent to 416,666 hours—just to keep pace.
While technology and filters can greatly reduce the burden and help organizations narrow the scope of their analysis, it’s easy to see how quickly human capital constraints can limit the utility of OSINT data—even for the largest companies.
Challenges with OSINT
OSINT data collection includes both passive and active techniques, each requiring a different level of effort and skill
Additionally, collecting OSINT data is time-consuming and resource-intensive. Making sense of it remains a highly specialized skill set requiring years of training. In an emergency where every second count, the time required to sift through copious amounts of information takes far longer than the time in which an organization must take meaningful action to alter the outcome.
Compounding the issue, OSINT data is noisy and difficult to filter. Even trained analysts find the need to constantly monitor, search, and filter voluminous troves of unstructured data tedious. Artificial intelligence and machine learning have helped weed through some of this data faster, but for organizations with multiple locations tasked with monitoring hundreds or thousands of employees, it’s still a challenging task.
Adding to the complexity, collecting OSINT data isn’t easy. OSINT data collection includes both passive and active techniques, each requiring a different level of effort and skill.
Passive vs Active OSINT
Passive OSINT is typically anonymous and meant to avoid drawing attention to the person requesting the information. Scrolling user posts on public social media profiles is a good example of passive OSINT. Active OSINT refers to information proactively sought out, but it often requires a more purposeful effort to retrieve it. That may mean specific login details are needed to access a website where information is stored.
Lastly, unverified OSINT data can’t always be trusted. Analysts often encounter false positives or fake reports, which not only take time to confirm accuracy, but if they act on misinformation, the result could be damage to their organization’s reputation or worse.
So, how can companies take advantage of it without staffing an army of analysts or creating operational headaches?
A new path for OSINT
Organisations can leverage the benefits of OSINT to improve situational awareness and aid decision-making
Fortunately, organizations can leverage the benefits of OSINT to improve situational awareness and aid decision-making without hiring a dedicated team of analysts to comb through the data. By combining OSINT data with third-party threat intelligence solutions, organizations can get a cleaner, more actionable view of what’s happening in the world.
Threat intelligence solutions not only offer speed by monitoring for only the most relevant events 24/7/365, but they also offer more comprehensive coverage of a wide range of threat types. What’s more, the data is often verified and married with location intelligence to help organizations better understand if, how, and to what extent each threat poses a risk to their people, facilities, and assets.
In a world with a never-ending stream of information available, learning how to parse and interpret it becomes all the more important. OSINT is a necessary piece to any organization’s threat intelligence and monitoring system, but it can’t be the only solution. Paired with external threat intelligence tools, OSINT can help reduce risk and keep employees safe during emergencies and critical events.
Prices and delivery times for essential components in video surveillance systems are being driven up as demand soars from other industries. Secure Logiq’s Robin Hughes explains the current state of the market.
Component shortages and supply chain challenges are a hot topic in just about every industry based on semi-conductors and silicon chips right now, and security is no exception.
It’s common knowledge that the global Covid lockdown caused a shutdown in the mining of silicon and spherites as large industries such as motor manufacturing canceled or postponed their chip orders – this has caused a supply gap that every industry is feeling.
However, there is a second challenge that is hitting the security sector particularly hard, and it may not be one you are expecting – cryptocurrencies.
Cryptocurrencies and security
When people discuss cryptocurrencies and security, thoughts often turn to cybersecurity and ransomware payment tracking. But the issue for the majority of the security industry comes from crypto mining.
When it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining
GPUs (Graphics Processing Units) are a key component in video surveillance, they decode images and display them onto screens. With the increase of video analytics, these have also become key to running the complicated algorithms required for creating the metadata and presenting it in a meaningful way for end-users. However, when it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining.
Demand for GPUs
When Bitcoin prices were relatively low, it was hard to justify the cost of a GPU and the associated power consumption for Bitcoin mining applications.
But as the price of Bitcoin has increased exponentially, demand for GPUs to do the number-crunching has grown dramatically causing a major shortage and huge price hikes. This rise in prices is not correlated with an increase in technological performance on the new GPUs, it is entirely a case of demand outstripping supply and a resulting bidding war.
To put this in context, cards are currently going new for around twice the original price and manufacturers simply cannot keep up with the demand.
On top of this, there is a new cryptocurrency creating a new threat to a different part of the video surveillance industry.
A new ‘environmental’ cryptocurrency called Chia has dispensed with the processing power and electricity demands of traditional GPU mining, instead of utilizing the spare storage space on hard drives (HDD) to verify blockchain transactions (‘proof of space’).
The demand for this particular cryptocurrency has to date called on 30 Exabytes of storage since May this year – that’s 30 Billion Gigabytes of data, and it’s not just HDDs, high-capacity SSDs are also in demand. This is causing massive hard drive supply issues globally, thus rocketing prices for those that are available.
The security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days to 6 months
Of course, this has a particularly large knock-on for the video surveillance market. There is nothing more data-intensive than video, other than multiple streams of HD video.
With this in mind, the security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days typically up to 6 months and longer in some regions/applications, the video surveillance market consumes more HDDs than many other markets.
Growth of data centers
While you would think that this would make security an important area for HDD manufacturers, our market is a relatively small player.
IT vendors will always focus on their core customers, and the rise of the gaming market, as well as the growth of data centers due to remote working in the pandemic, has created a more important sector to serve – and these customers will always come first. Imagine the daily storage space required if 5 Billion people uploaded just one image a day to ‘the cloud’!
These factors combined with the lack of raw materials leading to longer lead times for component manufacturers mean that the prices for hard drives and GPUs are likely to remain inflated well into 2022 while factories play catch up on the backlog.
The market for IT hardware is currently strong enough to continue even with the increase in component prices and the extended lead times for products. If you can get your hands on any HDDs, the delivery times from most distributors are around 6-8 weeks.
Increased delivery times
All of this has had a serious impact on the security industry. Video surveillance projects are now facing the combined issue of increased delivery times and higher costs. Many manufacturers, integrators, and distributors are doing their best to absorb the price increases where they can, but this is unsustainable over the long term. So what can be done?
Some people are getting more creative by purchasing from the second-hand market
Some people are getting more creative by purchasing from the second-hand market. However, it is unlikely that commercial applications will be willing to risk potential downtime or data losses by using second-hand components that have been pushed hard for months on end mining cryptocurrencies.
Making early purchases
While I can’t comment on what other manufacturers have done, at Secure Logiq we have been watching this market trend closely.
We always try to keep a close eye on anything that has the potential to significantly impact our manufacturing capabilities and try to offset any potential challenges with early purchases before the impact is fully felt.
As such, we have been able to secure enough products to continue manufacturing as normal for more than six months.
Increased demand as a challenge
While we have this existing stock to meet current and anticipated orders, we continue to scour the market for any available stock to make sure we are at the top of the list when any fresh products come on the market. This has meant that throughout our 10-year history we have never failed to deliver a customer order within 7-10 working days.
The delays with component manufacture and the ongoing increased demand will continue to present a huge challenge to the video surveillance and wider security industry. However, good planning and intelligent design will allow projects to remain on track.
Security technology manufacturers are not alone in this challenge, but the dual-threat is perhaps unique. It will take a while for this threat to be overcome, but with robust planning and by paying close attention to the market forward-thinking video surveillance manufacturers can still deliver projects for their clients.
Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption.
Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalization bringing multiple business benefits, which would simply not be possible using traditional models.
While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment.
Yet, with more organizations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximize the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge.
Improved access control in smart environments
These urban constructs are capable of reducing waste, driving efficiencies and optimising resources
The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimizing resources and increasing citizen engagement.
Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors.
Frictionless access control
During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity.
Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimizing the risk of infection, by removing the need to touch shared surfaces. Such systems can be customized and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful.
Barriers to adoption
Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant.
Many are now beginning to realize that connected network-enabled solutions are here to stay
Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space.
Time will not stand still, and many are now beginning to realize that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature.
The importance of cyber hygiene
Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks.
Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT).
While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited.
Cyber security considerations
Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognized cyber security principles, incident reporting and best practices.
It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security.
The future of access control
There is a natural dispensation towards purchasing low-cost solutions
There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organizations by their association.
The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world.
Cyber security key to keeping businesses safe
In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies.
As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor.
The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex.
Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’.
CV5S and CV52S AI-powered SoCs
The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond.
The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing.
Faster and ubiquitous AI capabilities
Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions"
“Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm.
John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.”
Edge AI vision processors
Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive.
By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing.
4K multi-imager cameras
“However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot.
In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation.
The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022.
Reference boards for camera manufacturers
The software on these new SoCs is an evolution of our unified Linux SDK"
As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families.
“The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot.
Better crime detection
Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address.
“Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot.
Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution.
4K AI processing on-camera
The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras.
This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot.
The advent of on-camera AI at 4K changes the paradigm
Enhanced video analytics and wider coverage
“Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot.
He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.”
Deployment in retail applications
Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once
Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement.
The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out.
This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics.
Use in cashier-less stores
Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item.
In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking.
Updating on-camera AI networks
Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames.
So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle.
If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene.
Efficient traffic management
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself
Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.).
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server.
Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video.
On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy.
In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level.
Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas.
“With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.”
Physical security in parking lots
With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot
One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred.
With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners.
If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go.
Advantages of using edge AI vision SoCs
Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.”
He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.”
He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM.
Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process.
Incorporating BIM systems
For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems.
Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants.
BIM information relating to doors, hardware, and security solutions is available in the cloud
BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualization and enables customers to focus on the design, installation, and management of openings.
“If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region.
“It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.)
Centralized data in BIM 3D model
Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx.
Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building.
For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralized data file.
Revit and ArchiCAD
A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects.
Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit.
Tailor-made information security solutions
We provide tailor-made information security solutions with various hardware on projects with more doors"
“We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.”
For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu.
Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world.
Data addition to Opening Suites site
ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections.
Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations.
Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A cellphone app is in development).
More details and more data
Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors.
Data will be more and more important, and there will be more data inside BIM models
Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx.
The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry).
The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market.
The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg.
Tesla amongst those impacted
The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012.
In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.”
Hacking was possible due to built-in feature
The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature.
Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking."
"Connected cameras are supposed to provide an additional layer of security to organizations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.”
Super Admin account had access to all cameras
Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada
The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.”
Impact on broader video surveillance industry
The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.”
Widespread government and healthcare use
The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously
Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organization to find relevant footage.
The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organizations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
HID Global, a pioneer in trusted identity solutions announced that the Arcos Bosques Torre 1 (Tower 1) has deployed its access control solutions to heighten security and better manage visitor entry.
Located in the Bosques de las Lomas neighborhood of Mexico City, the center is comprised of six buildings. The complex includes two skyscrapers and is home to high-profile law firms, industrial, mining, media, and technology companies, and one of the city’s most recognized shopping centers.
HID readers and smart card technologies
With the help of system integrator Logen, Arcos Bosques Corporate Center chose HID Mobile Access® solutions as well as HID readers and smart card technologies for tenants and visitors to securely pass through its 16 turnstiles and use the 32 elevators that lead to their offices.
The HID solutions also give tenants the choice of using their mobiledevices or physical smart cards for entry.
Touchless and safe entry
HID’s mobile access solution enables administrators to remotely manage credentials by cloud-based infrastructure “Accessing the building by simply presenting a mobile phone makes a lot of sense as we look for ways to eliminate touching things during the global pandemic,” said Santiago Morett, Project Manager at Servicon, facilities manager for Arcos Bosques.
“HID Mobile Access has given us touchless entry and safer building security, which is more important than ever for our tenants.”
Mobile access solution
HID’s mobile access solution also enables administrators to remotely create, issue, manage and revoke credentials through the cloud-based infrastructure.
Servicon, the facility management company for Arcos Bosques, now has continuous building access visibility through a unified, up-to-the-minute database of the tower’s tenant names, affiliated companies, and work locations.
"Building security today extends not only to who has access but also to how individuals are able to enter a facility,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. “HID’s access control solutions provide the foundation for optimal oversight and control while also keeping people healthy and safe.”
Genetec Inc, a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that Seagate Technology Holdings plc, a provider of data storage and enterprise storage systems, has deployed Genetec™ Security Center to secure their global campuses and regional offices.
At the heart of this large-scale global deployment is the Genetec unified security platform which includes Security Center, Genetec Omnicast™ IP video management system (VMS) to manage more than 1,150 cameras, Genetec Synergis™ IP access control system (ACS) to manage more than 22,000 card holders, Sipelia to manage communications between intercoms and security operation, and Seagate’s own high-efficiency, high-performance Exos™ X 5U84 mass capacity storage system.
Unified security platform
All sites are connected using the Genetec Security Center Federation feature to centralize monitoring, reporting, and alarm management across the entire organization. The solution enables Seagate to pull in up to 1.3 petabytes of high-definition video in a single disk enclosure from hundreds of cameras and other IoT devices without losing a single frame or data packet.
The solution enables Seagate to pull in up to 1.3 petabytes of high-definition video
“Video, and especially multi-source, high-definition video, provides a stringent performance test for any storage solution,” said Ken Claffey, Senior Vice President and General Manager of enterprise storage systems at Seagate. “Likewise, the data availability expectation of a robust, unified security platform like Genetec™ Security Center is formidable. The sheer volume of high-definition video streams, frames and metadata coupled with increasingly long retention periods, represent one of the most challenging IT infrastructures to deploy.”
Physical security environment
This enterprise scale deployment provides a clear blueprint for a state-of-the-art, unified, high performance physical security environment for modern, large scale facilities. “Enterprises with global campuses and data center environments have mission critical requirements, and securing a growing number of assets across huge facilities, while staying ahead of emerging threats is increasingly challenging,” said Christian Morin, Vice President of Product Groups at Genetec Inc.
“Through our partnership with Seagate, this enterprise scale deployment provides a great example of how enterprises can implement a holistic approach to security, that encompasses physical and cyber security, while ensuring compliance with fast-changing regulatory mandates.”
London’s renowned landmark skyscraper, 30 St Mary Axe, more famously known as The Gherkin, has selected Forge, powered by Yardi, to provide an enhanced and efficient visitor management solution for the building.
The Gherkin, located in London’s primary financial district, welcomes over 2,000 visitors per week, including restaurant-goers who dine at the noted top-floor situated Helix Restaurant, which is managed by Searcy’s.
Cloud-based software solution, Forge Bluepoint also provides real-time data on visitors expected
To manage the experience of the visitors, The Gherkin will adopt Forge Bluepoint to provide fast check-in and check-out, and the ability to scan access cards or mobile QR codes in speed lanes for secure admission, to their designated meeting floor.
Cloud-based software solution, Forge Bluepoint also provides real-time data on visitors expected and allows for seamless integration with other building management technology solutions.
Efficient visitor management
“30 St Mary Axe has a number of different tenants who require a journey for their visitors that fits their needs and culture,” said Clare Jackaman, the Operations Manager at The Gherkin.
Clare Jackaman adds, “The Forge Bluepoint technology will provide our reception and security staff with an efficient solution, to provide the right level of service and ensure people in the building are visiting safely.”
Enhanced security of visitors
“We’re excited to add The Gherkin to the growing list of Forge Bluepoint buildings across London,” said Paul Speariett, the Regional Director at Yardi, adding “Working in partnership with The Gherkin team, we have built visitor journeys that provide them with the experience, security and efficiency they need.”
Corero Network Security plc, a provider of real-time, automatic Distributed Denial of Service (DDoS) cyber defense solutions, and Juniper Networks, a pioneer in secure, AI-driven networks, team up to provide Plusnet, an organization offering communications and network services to 25,000 businesses in Germany, with their joint DDoS Protection Solution to protect its infrastructure, business, and customers within seconds of a DDoS attack.
DDoS protection solution
Over the past 20+ years, DDoS attacks have always been a part of the threat landscape, but their frequency, magnitude, and sophistication are constantly increasing.
Plusnet, which serves 200 cities and regions of Germany, previously relied on an internal data filtering solution to analyze anomalies in traffic patterns. Plusnet needed DDoS mitigation with effective, and dynamic protection to defend its network from attack-driven outages
However, this in-house solution required manual intervention, which was neither practical nor effective as attacks mounted and evolved. Plusnet needed to automate DDoS mitigation with effective, dynamic, and scalable protection to defend its national network from attack-driven outages.
Impact on network performance
“During the testing phase of the Juniper-Corero solution, we could immediately see a manageable stream of DDoS attacks. With the Juniper-Corero solution, Plusnet can further improve network protection without any significant impact on network performance,” said Ralf Weber, Head of Competence Center Network & Security, Plusnet.
The joint solution removes malicious traffic at the network edge, as close to the source as possible, delivering fast and effective protection cost-effectively.
Plusnet took an active approach to thwart DDoS attacks with Juniper Networks and Corero Joint DDoS Protection, delivering real-time detection and line-rate mitigation of DDoS attacks, which can identify and block very significant attacks in seconds.
Juniper Networks MX Series Universal Routing Platformswork together with Corero SmartWall Threat Defense Director to rapidly identify, precisely detect and automate mitigation of attacks. Analytics and continuous monitoring provide comprehensive visibility of data patterns and anomalies for network security professionals.
As DDoS attacks continue to increase, the protection capacity provided by this solution can be expanded to tens of terabits per second.
24/7 protection from threats
“More than ever before, providers need to ensure that their infrastructure and business operations are always available to deliver an exceptional user experience. This can only be achieved when security is built into the same network infrastructure that provides connectivity and extended across every point of connection.”
Plusnet is a great example that leverages Juniper Connected Security to enable the threat-aware network "
“Plusnet is a great example that leverages Juniper Connected Security to enable the threat-aware network, ensuring its operations are comprehensively protected 24/7 against the growing risk of DDoS attacks,” said Samantha Madrid, Vice President, Security Business & Strategy, Juniper Networks.
SmartWall TDD solution
“We are very pleased to continue partnering with Juniper Networks to provide a superior DDoS solution that is now protecting thousands of customers around the globe.”
“The SmartWall TDD solution couples Corero’s surgically accurate, real-time automatic DDoS protection with the high-performance packet filtering of Juniper MX Series routers."
"This, along with the comprehensive visibility into attacks, enabled Plusnet to implement a cutting-edge solution that can detect and mitigate DDoS attacks in seconds to protect its network and the ones of its customers,” said Lionel Chmilewsky, Chief Executive Officer at Corero Network Security.
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day.
We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
Adoption of General Data Protection Regulation (GDPR) by the European Union in 2016 set a new standard for data privacy. But adherence to GDPR is only one element, among many privacy concerns sweeping the global security community and leaving almost no product category untouched, from access control to video to biometrics.
Because privacy concerns are more prevalent than ever, we asked this week’s Expert Panel Roundtable: What is the impact on the physical security market?
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerized systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks.
The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?