Pulse Secure, the provider of Secure Access solutions, announced its designation as a Distinguished Vendor in this year’s ‘2019 TAG Cyber Security Annual’. Pulse Secure recently became a member of the world’s leading cybersecurity vendors as selected by Dr. Edward Amoroso, CEO of TAG Cyber, and added to this year’s report. Each year TAG Cyber publishes its three-volume report to the IT community for download at no cost. Volume Two of the report also includes an inf...
Eyecloud Cam, smart home security camera, is now available via a Kickstarter campaign. Aimed at keeping house, family and belongings safe, Eyecloud Cam ensures affordable security with a single Eyecloud Cam costing less than $100. Eyecloud Cam Home Security Camera Eyecloud Cam is a home security camera that constantly monitors the safety of the family and home by putting one of the most advanced computer vision AI technology right inside the camera. After positively identifying a threat, Eyec...
GlobalPlatform, the standard for secure digital services and devices, has published two configurations to simplify and expedite the implementation of its Trusted Execution Environment Management Framework (TMF). The configurations offer guidance on the specific parts of the framework that need to be implemented to remotely manage Trusted Execution Environments (TEEs) and their trusted applications (TAs) on particular device types. “The original TMF specification is extensive, covering a w...
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, provider of residential security, announces the availability of the contemporary versions of the company’s popular traditional deadbolts: the SmartCode 914 Deadbolt Lock and SmartCode 916 Touchscreen Electronic Deadbolt. With their updated, modern designs, these new stylish versions of the industry’s leading wireless, access control locks continue to utilize Kwikset’s Home Connect technolo...
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...
Pulse Secure, global provider of enterprise Secure Access solutions has announced the release of Pulse Policy Secure 9.0 to enable organizations an easier, flexible and VPN-integrated path to next-generation Network Access Control (NAC). The latest release incorporates more than 36 new features and enhancements; advancing visibility, usability, endpoint and IoT security, and threat response capabilities. As a result, enterprises can strengthen their security posture and mitigate malware, data breaches and compliance risks. “With growing attacks, BYOD and data privacy issues, enterprises must get a handle on users, endpoints and IoT devices accessing their network resources,” said Tony Massimini, senior industry analyst at Frost & Sullivan. “Pulse Secure is distinguished by offering the benefits of both pure-play and infrastructure NAC providers. Unlike infrastructure NAC, Pulse Secure is integrated and works with popular switches, wireless, and security infrastructure to facilitate deployment and threat response. Unlike pure-play NAC offerings, Pulse Secure offers VPN and NAC solutions that amalgamate mobile, cloud and network oversight. The combination delivers enterprise value for user, endpoint and IoT visibility, as well as threat response.” Pulse Policy Secure Pulse Policy Secure (PPS) is an enterprise-class NAC solution that delivers network visibility, “comply to connect” policy enforcement and security orchestration Pulse Policy Secure (PPS) is an enterprise-class NAC solution that delivers network visibility, “comply to connect” policy enforcement and security orchestration with popular switch, wireless controller, NGFW, SIEM, EMM and endpoint security solutions. PPS tackles the challenges of securing corporate networks, which are being redefined by Hybrid IT, mobile devices and IoT. Frost & Sullivan predicts that IoT connections will reach 45.4 billion by 2023. IoT brings new exposures as mobile, wearables, medical and other IP-enabled devices are introduced to the corporate network. Policy Secure 9.0 boosts compliance enforcement with broader endpoint discovery mechanisms, vulnerability assessment to prevent malware attacks such as WannaCry, as well as OS and patch management verification to safeguard Windows and macOS devices. Beyond supporting TACACS+ for role-based network device support, the release also streamlines user experience by incorporating host checking caching, directory, authentication and firewall integration techniques to reduce login prompts, authorization and device compliance time. Pule Profiler and Secure 9.0 Pulse Profiler, sold separately or integrated within PPS, automatically identifies managed and unmanaged devices Pulse Profiler, sold separately or integrated within PPS, automatically identifies managed and unmanaged devices (e.g. printers, VOIP phones, cameras) that are connecting to the corporate network. The system dynamically monitors for device profile and security state changes. The new version further extends IoT device discovery, classification and management features with added means to ascertain new and custom IoT devices, and to apply policy for conditional access. Policy Secure 9.0 further enables threat response orchestration. PPS can share identity and endpoint information with popular network and security infrastructure, as well as receive network policy enforcement requests from external solutions. The release extends integration with Palo Alto Networks, Checkpoint, Juniper and Fortinet firewalls to enrich their operational context, as well as to allow the firewall to invoke NAC endpoint network segregation or blocking. IoT Security and Threat Mitigation Organizations understand NAC advantages for visibility, IoT security and threat mitigation" "Organizations understand NAC advantages for visibility, IoT security and threat mitigation, but perceive the technology to be cumbersome. The latest release of Pulse Secure NAC continues to advance our deployment, usability and integration capabilities while delivering enterprise-class functionality,” said Scott Gordon, chief marketing officer at Pulse Secure. “With our unique means to offer a simple, unified NAC and VPN solution, we allow enterprises to gain essential intelligence, compliance and protection for remote, cloud and data center access.” Pulse Secure offers organizations an easy, flexible and scalable path to next generation NAC: Start with the Pulse Profiler for dynamic endpoint and IoT device visibility, assessment, inventory and monitoring Deploy Pulse Policy Secure for automated guest management, mobile on-boarding, endpoint remediation, network enforcement and threat response Streamline implementation with wizard templates and the means to phase in access enforcement, network coverage, and core integrations Scale cost-effectively with the PPS appliance, which includes a high-performance RADIUS server supporting up to 50,000 concurrent devices Centrally manage appliances and over a million endpoints though the Pulse One console Simplify and expedite NAC deployment for Pulse Secure VPN customers by leveraging the same user client, policy framework and centralized management console Network Access Control Solutions The evolution of Network Access Control solutions is critical to the security industry" "We are seeing more IoT deployments especially within our larger clients in healthcare and manufacturing and we welcome the enhancements to Pulse Policy Secure that help to discover and protect a wider array of devices,” said David Hood, MD of ANSecurity, “The evolution of Network Access Control solutions is critical to the security industry and deeper support for next generation firewalls and other security platforms offered by the new 9.0 release will go a long way towards helping organizations to simplify security in what is an increasingly complex infrastructure landscape.”
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting eventsThe IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis And Application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyze data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant Access To Connected Devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyze this data is of imperative importance. Real Time Data Storage Availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing Stored Data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilize surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
DMP is excited to announce its ESX TECHVISION Challenge, now two years in a row. This year’s award goes to DMP’s Virtual Keypad Access. In addition, DMP received ESX Innovation Awards in two other categories. In the Installation/Service Tools category is DMP’s Dealer Admin 2.0, and in the Mobile Apps for Consumers category is DMP’s Virtual Keypad 6.0. DMP’s Virtual Keypad Access Receiving the awards at the ESX show this month in Nashville, Tennessee, are DMP’s Director of Product Management & Support, Brad Tucker, and Product Manager for Access Control, Adam Kinder. “It’s an honor to see Virtual Keypad Access win an ESX Innovation Award and then the TECHVISION Challenge Best-of-Show,” Tucker says. “We’re excited that others see the value in our program.” DMP’s Virtual Keypad Access is the natural progression of DMP’s Virtual Keypad app that manages intrusion systems. For users who don’t want to spend the money to have a dedicated server for their access control systems, Virtual Keypad Access provides the flexibility to remotely manage system users, schedules, and profiles, plus control public doors. It also allows users to view and record video. In fact, at its booth during the show, DMP announced the addition of multiple commercial video options, which are coming soon, including Open Eye, Digital Watchdog, Hikvision, I-View Now, and SecureCom video cameras and NVRs. In combination with its other access control features, DMP now has an even more comprehensive platform to offer businesses of all sizes. Because Virtual Keypad Access is maintained via the Cloud, it allows consumers to remotely manage their own systems Cloud Management Because Virtual Keypad Access is maintained via the Cloud, it allows consumers to remotely manage their own systems, or it can be managed for them by their dealers. Either way, the combination of intrusion and access control in one platform makes for a powerful and economic package for security companies and their customers. “Security companies can grow their businesses by helping their customers drive down costs, not only in personnel requirements to manage access control, but also in the cost of the systems,” Kinder explains. “Likewise, dealers have less installation time and monthly costs, so they have lower overhead expenses. They can secure more recurring revenue by charging a premium for services like intrusion, managed access control, and video all in a single web-based or mobile app. Their customers benefit by not having to take care of it themselves.” DMP’s ESX Innovation Award Recipients: Virtual Keypad 6.0 and Dealer Admin 2.0 Virtual Keypad 6.0 and Dealer Admin 2.0 Also winning judges’ favor as Innovation Award recipients were DMP’s feature-rich mobile app, Virtual Keypad 6.0, and Dealer Admin 2.0, which is an administrative portal giving DMP dealers and their staff easy access to their customers’ information. “All three of these award-winning programs give our dealers the tools they need to reinforce value and brand loyalty among their existing customers and grow with new ones,” Tucker says. “We’re honored to be among this year’s award recipients and equally honored to partner with our dealers in providing the services their customers want.”
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Pulse Secure, global provider of enterprise secure access solutions announced that John Pescatore, director of emerging security trends at SANS Institute, and Dave Cullen, manager of information technology and chief security officer (CSO) at Entegrus, will participate in a new webinar to discuss what works when implementing network access control (NAC). Pulse Secure NAC Integration Hosted by the SANS Institute, the online seminar will feature an interview with Cullen on integrating Pulse Secure NAC at Entegrus. Topics include why he chose Pulse Secure; how NAC advances security, visibility, endpoint compliance and IoT risk mitigation; and future plans to further unify Secure Access with Pulse Secure technology by combining NAC and virtual private network (VPN) across on- and off-premise resources from any BYOD device. We considered NAC as an effective way to improve our security posture without dramatically altering how we operate" “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure’s secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” Secure Remote Access “The SANS What Works program highlights real security professionals who have used real security products to demonstrate measurable business value,” said John Pescatore, director of Emerging Security Trends at the SANS Institute. “Implementing network access control and enabling both secure remote access and safe use of IoT devices is a shining example of security enabling the business.” The SANS What Works program highlights real security professionals who have used real security products to demonstrate measurable business value" People are invited to register for the June 14th, 2:00 p.m. EDT SANS webinar, “What Works in Visibility, Access Control and IoT Security – Pulse Secure NAC Outcomes at Energy Provider.” Entegrus Entegrus serves over 60,000 customers throughout Ontario, Canada. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square kilometers. They leveraged their existing Pulse Secure VPN implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organization extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. Pulse Secure’s industry-leading NAC solution, Pulse Policy Secure (PPS), is built to protect next generation networks with comprehensive network visibility Pulse Policy Secure Pulse Secure’s industry-leading NAC solution, Pulse Policy Secure (PPS), is built to protect next generation networks with comprehensive network visibility, automatic device onboarding and unified contextual access control across wired and wireless connections, personal and corporate devices, and remote and local access. The PPS deployment provides foundational endpoint intelligence, resource access enforcement and IoT defenses that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. Presented as a webcast interview, the online seminar is a lessons-learned conversation between Pescatore, SANS director and former security industry analyst, and Cullen, an expert in cybersecurity and IT systems. The webinar attempts to answer questions regarding successful implementation of NAC and the benefits that can result from it.
ACT365 is a complete access control and video management solution. Access control and video management are key security systems and ACT365 creates a unified integrated system, delivering a force that gives users far greater visibility and control of their assets. ACT365 Access Control Solution Ease of use and convenience are key ingredients to the product’s strength and depth in the field. Critically, it allows end-users the ability to manage their systems remotely, including viewing live cameras. It is this remote monitoring capability that makes ACT365 ideal for multiple sectors. A Study Abroad University in London that hosts students from the USA wanted a security system to protect their student accommodation. The university wanted a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Monitoring And Recording ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. ACT365 produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident should arise in the student accommodation, ACT365 links events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Campus Security Campus security can provide pin codes, access fobs, and cards to students. These credentials can be easily enabled or disabled remotely if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard.
Security is important for any construction project, but the stakes are higher when the tenants are a team of professional athletes, the parking lot is filled with sports cars and luxury vehicles, the property includes a multi-million-dollar turf field, and a professional training facility where exercises held there must be guarded as corporate secrets. To meet these challenges, Vicon recently completed work with a professional national sports team to install an end-to-end, tightly integrated video management and access control solution that relies exclusively on Vicon software, hardware and cameras. Due to sensitive security demands the team remains anonymous in this piece. The professional team’s Security Director says that he needed a system that would capture footage of everything going on, inside and around the perimeter of the facility, and make sure that access was limited to only authorized personnel. At the same time, the technology needed to make it easy for players and employees to get through security. “It doesn’t do anyone any good if a system is so difficult to use that people just prop the doors open. We had to blend those two things together,” he says. VAX Access Controllers Twenty-six doors, including both exterior exits and interior doors throughout the building, have been secured with VAX access control door controllers. Employee’s permissions are based on their jobs. Administrators can’t enter the locker rooms or training areas and players can’t enter the marketing offices. Many of the players come to the facility wearing athletic apparel and prefer not to carry around a wallet and key card, so Vicon created customized proximity tags embossed with the team’s logo, designed for players and employees to stick on the back of their cell phone cases. This turned out to be a popular solution, as the players always carry their cell phones with them and the tags are attractive and support the team’s branding. VAX Door Panels The panic buttons are wired to open inputs on the nearest VAX door panels In the world of professional sports, athletes must sometimes be protected from overly aggressive fans. This particular training facility is equipped with panic buttons at several spots within the building that allow anyone who notices a problem to immediately instigate a lock down. The panic buttons are wired to open inputs on the nearest VAX door panels, eliminating the need for long electrical runs back to the server room. The player’s practice field is accessible through an external gate that’s used by the media, and VAX provides the ability to control visitors who enter there. As needed, members of the press are given temporary credentials that can unlock the gate only for a designated time period before expiring. Parking Lot Video Surveillance The players’ parking lot also leverages the VAX system The players’ parking lot also leverages the VAX system. The transmitters that players use to open the parking lot gate from their cars are integrated with VAX, providing a record of each time the gate is activated, and by whom. In addition, a 12MP camera captures very high-resolution video of the vehicle entering and exiting, along with the person driving it, and that video is linked to the respective access control event. “Very expensive cars are left in the lot for extended periods, when the team is traveling, and this makes sure that absolutely nobody gets into that parking lot who shouldn’t be there – not even the office staff,” says the Security Director. The facility’s surveillance system includes close to 50 cameras, inside and outside the building, connected to Vicon’s Video Management System, Valerus. They range from 2MP to 12MP, depending on their use, and all are from Vicon. Any doorway equipped with a VAX controller has a dedicated camera mapped to it, so that video verification can be made of anyone entering a restricted area. Valerus VMS and 360-degree Network Cameras Special 360° cameras are mounted high on each of the exterior corners of the building Special 360° cameras are mounted high on each of the exterior corners of the building. Valerus VMS software dewarps their fisheye image and breaks it into four separate views from each camera. Those four cameras provide the security team with 16 different camera views from around the building’s perimeter, providing a very cost-effective way to cover such an expansive area. The same type of cameras is used within the team’s equipment room, where warehouse style racking is filled with valuable inventory. The system is managed by the team’s head of security and head of IT. Valerus’ thin-client web-browser interface provides monitoring access to support staff, including the team’s receptionist. The system’s video search capabilities have made it easy for them to conduct investigations. Video has helped to identify vehicles that were improperly driving on the turf field, document a theft on the property, and trouble-shoot when the parking lot gate had mechanical problems. Motion Activated Cameras Special motion-activated 2MP cameras are positioned at every door that provides access between the players’ area and the field One of the more unusual uses for the system is not related to security at all. The team’s professional athletic league requires team management to retain a full year’s documentation of the time each player spends on the practice field. To do this, special motion-activated 2MP cameras are positioned at every door that provides access between the players’ area and the field. Anyone walking from the field to the building triggers the motion sensor and is recorded in high-definition video. That way, if a player initiates a legal battle saying he practiced too long, there is clear documentation of exactly when he was on and off the field. Vicon’s Valerus delivers powerful, end-to-end security solutions that are easy to manage. Its work with this professional sports team also highlights its ability to deliver convenience to employees and operational efficiencies to management.
Total Ghana, a leading oil and gas company with over 200 service stations in Ghana, is one such business that needs around-the-clock security not only for its premises based in Accra but also for its many service stations. Total is dedicated to delivering quality petroleum products and serving its customers in innovative ways. This means Total’s consumer operations involve a concentration of vehicle and pedestrian activity with people fueling vehicles and moving between the retail outlets. This leads to complex security and safety challenges and keeping track of it all is not possible without an effective security system. Facilities And Workers’ Security With the continuing growth of its business, Total needed a solution that would strengthen security of its premises and new service stations being opened across the country. The safety of Total’s workers is paramount and, in addition to securing its premises and stations, the company wanted to automate the monitoring of its operations to ensure compliance with safety procedures. Total turned to Steehold, a security solutions provider in Ghana renowned for protecting companies across industries including financial services, mining, petrochemicals, and telecommunications. Steehold was tasked with not only installing a new security system but also ongoing security monitoring and management across Total’s operations in Ghana. Steehold’s Video Security System From the moment we engaged with Steehold, we knew they understood the security challenges facing our business" “From the moment we engaged with Steehold, we knew they understood the security challenges facing our business. For example, gas stations operate day and night so video cameras need to provide excellent imagery in variable lighting conditions and we need to monitor areas both inside and outside. If cameras lack certain features, then the images they record may be insufficient for analysis, or for use as evidence, should it be required. Steehold knew how to combat these issues while also providing an effective monitoring tool for operational efficiency and worker safety,” explained Total executive. Steehold needed a video surveillance system that would cover Total’s premises and service stations from all directions and it knew exactly which solution would meet Total’s needs. IP Video Surveillance Solution “We choose Hikvision as we knew its video cameras were grounded in innovation and quality, providing the best video footage in the widest range of conditions to help Total’s business,” said Samuel Tawiah, executive director, Steehold. Following extensive consultation with Total staff, the final design of the surveillance solution at the facility and new services stations consisted of 120 Hikvision IP cameras to enable high quality 24/7 surveillance across the Total’s premises and its new service stations in Ghana. Hikvision Easy IP 3.0 Cameras and NVRs Hikvision Easy IP 3.0 cameras feature a wealth of innovative technologies to combat low-light, bright-light, and extreme weather conditions The Hikvision Easy IP 3.0 cameras feature a wealth of innovative technologies to combat low-light, bright-light, and extreme weather conditions, while still providing superlative image quality. The cameras also include capabilities such as object tracking, line crossing, intrusion detection, and motion detection, with the ability to trigger alerts and make security staff immediately aware of any suspicious behavior. At the heart of the solution lies Hikvision’s NVRs, which store up to 12 terabytes of recorded footage from all cameras. IP Cameras, PoE and Video Encoders While Total wanted to upgrade to an IP system, it had already invested heavily in CCTV cameras and wanted to retain the cameras that were functioning well. Steehold installed Hikvision’s video encoders which convert the existing cameras’ analog signals into digital. These encoders are connected to the NVR, and the system treats them like the other IP cameras. Steehold installed the IP cameras itself as the cameras are PoE (Power over Ethernet) which means that power and data is supplied over a single Ethernet cable, making installation much easier because they don't have to be located next to a plug socket. Hikvision Remote Video Surveillance System Total is already reaping the benefits from the newly installed Hikvision video surveillance system Total is already reaping the benefits from the newly installed Hikvision video surveillance system. It provides the ability for Steehold to monitor Total’s entire facility and new services stations in real-time remotely from its control center located in Accra. “The deployment of Hikvision’s innovative technology into our surveillance solution for Total has proven essential for our security operators to detect intrusion, theft, and damage across Total’s operations. With crystal clear images day and night as well as advanced features that alert security operators of any suspicious behavior, we are confident we can help Total respond quickly to any breaches,” said Mr. Tawiah. Watchful IP Eyes for Operational Safety Hikvision’s video surveillance system also helps Steehold operators to remotely monitor processes across Total’s premises, enabling supervisors to enhance processes to improve workflow and ensure the safety of workers. “At Total, the safety of employees is of utmost importance. Data from Steehold generated by Hikvision’s video surveillance system plays an integral role in helping us keep our employees safe and our operations compliant with safety policies. It provides a definitive way to ensure safety policies are being followed and that there are no hazards presenting a harmful threat to our employees,” said Total executive. Intrusion Detection Hikvision’s security cameras deliver a live and recorded view of the facility which is accessible 24/7 and has helped ensure safety protocols are followed By deploying Steehold’s security solution based on Hikvision’s video surveillance system, Total’s heightened security has kept its facilities and service stations protected against trespassers, theft, and vandalism, and in particular has minimised losses caused by theft in its service stations. In addition, Hikvision’s security cameras deliver a live and recorded view of the facility which is accessible 24/7 and has helped ensure safety protocols are followed. For example, it has significantly increased employee compliance with PPE (Personal Protective Equipment) rules at Total’s sites resulting in a direct and immediate improvement in safety. Easy, Seamless Integration Easy installation and integration with Total’s existing CCTV-enabled Steehold to deliver a cost effective, efficient, high-end video surveillance solution. Steehold is now planning to use Hikvision’s cutting-edge video monitoring systems as part of its security and emergency response solutions for its other customers, helping them minimize security threats and maximize operational safety and efficiency.
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, has announced that, in cooperation with Control Installations of Iowa (Ci3), the two companies have donated a completed video surveillance system for this iconic ball field and movie set located in Dyersville, Iowa. Installations Of Iowa Collaboration “Several weeks ago, there was an act of senseless vandalism that occurred on this high-profile ball field and a lot of damage was done by someone with a very poor sense of judgment,” recalled Carl Bracken, Technical Security Sales for Ci3. “The president of my company shot me a text before I even knew about the vandalism, suggesting we get involved and try to help.” Field of Dreams, released in 1989, is a movie that has inspired millions and became an Academy Award nominee for Best Picture of the Year Field of Dreams, released in 1989, is a movie that has inspired millions and became an Academy Award nominee for Best Picture of the Year. “Nearly thirty years later, we still get more than 110,000 visitors a year,” said Denise Stillman, Manager of the Field of Dreams movie site. “Most folks come to run the bases or explore the corn field. We’re the only ball park open 365 days a year, and we’re the world’s largest pick-up baseball game.” The vandalism to the field was fairly extensive and, unfortunately, also involved destruction of expensive irrigation equipment. Bracken contacted Denise Stillman to explore installing a video surveillance system for the tourist site. After initial discussions, he visited the site on a Saturday, with demo gear in hand, to show Stillman the possibilities. She was keen on what she saw but there was nothing in the budget for such a system. 3xLOGIC V250 NVR and Mini Dome CamerasInstallation comprised of a 3xLOGIC 8-channel V250 NVR; one 3xLOGIC thermal imager, pointed at the bridge leading to the site entrance Working with his company president and reaching out to various vendors, including 3xLOGIC, Bracken came up with a plan to provide the Field of Dreams with the enhanced asset protection and increased security they needed. Recently, Bracken and his team of skilled technicians completed the installation comprised of a 3xLOGIC 8-channel V250 NVR; one 3xLOGIC thermal imager, pointed at the bridge leading to the site entrance; a 3xLOGIC 3 MP mini-dome to cover the retail sales area; and two cameras covering the field itself. The recording equipment is installed on a shelf in the retail store, which is convenient and secure. “We hadn’t really thought much about security, because for 29 years we had no incidents,” said Stillman. “Now that the system is in place, it’s doing a lot of things for us. The gift shop staff feels much more confident now that they have eyes and ears watching over them. For me, I have a sense of comfort that wherever I am in the world I can see what is happening at the field at all times—I can even check if the sod is greening up. I love that, and the 3xLOGIC mobile app, View Lite II, is easy to use and empowering.” This place is important to the fabric of Iowa life and lifestyle" “This place is important to the fabric of Iowa life and lifestyle,” continued Stillman, “and Ci3 really stepped up. Carl (Bracken) was very generous with his time and he gave us a solid comfort level in understanding what we needed, what the system would look like, and how it would function. Other local vendors wanted to help, but no one took the time like Carl and Ci3.” “Along with 3xLOGIC, we were happy to make this donation. We knew Denise didn’t have sufficient budget, and they still needed to find the money to pay for their expensive irrigation system repairs,” said Bracken. “This really gives us piece of mind when no one is on site,” said Stillman, “we now have excellent visibility to areas we must be able to see, and the system provides a great deterrent effect, too.”
STANLEY Security, one of the most trusted names in the world of security, has provided a photography studio in Knowsley, Merseyside, with a top class wireless Ricochet technology-based alarm system financed through STANLEY Assure. Studio Argent is a 5,000 ft. sq. studio that houses and uses state-of-the-art digital equipment to produce creative and commercial photography for numerous large national and international clients, making security of their premises a priority. Ricochet Wireless Networking Technology STANLEY Security installed a modern intruder alarm system based on STANLEY’s Ricochet technology. This next generation wireless networking technology operates by receiving repeated wireless transmissions from devices located throughout the studio building to ensure that even the remotest areas are secured. Furthermore, any weak signals between devices prompt the Ricochet network to self-heal and automatically re-route communication so that the studio is protected at all times. STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure. STANLEY Assure is a finance solution for customers wishing to benefit from up to date security technology without the risks of ownership and with evenly spread, manageable payment terms with no hidden extra costs. Additionally, included is a full monitoring package for total peace of mind. STANLEY Intruder Alarm System STANLEY Assure removes the need to justify and raise significant capital outlay in a depreciating asset. Instead, STANLEY will buy back and take over an existing security system, upgrade it to incorporate the latest security technology, and then hire it back for usage. It provides an affordable means of upgrading a complete security system. Studio Argent not only benefitted from STANLEY Security’s product technology, but also gained access to STANLEY’s NSI Gold accreditation ProtectionNet Customer Service Center (PNC) as a part of the contract. As a result, Studio Argent receives 24/7, 365 days a year monitoring and immediate customer care. The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes Mesh Technology and Reduced False Alarms The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes, while previously the process took approximately 40 minutes. Furthermore, whereas the old system was hypersensitive and would often be set off by mice and moths in the building, the new system, relying on latest mesh technology, ensures no false alarms occur while offering airtight security which is easily scalable, should the studio expand its premises. After repeatedly having to pay additional, hidden costs to the previous security supplier for patch up work to the studio’s 20-year-old alarm system and dealing with subpar service which in one incident breached the national code of conduct for UK Alarm providers, Studio Argent was pleased to make the cut and move to a reliable security provider. John Organ, Owner of Studio Argent, happy with the move to STANLEY’s new alarm system said, “From the knowledgeable and expert representatives who contacted me to the total peace of mind and ease of operation that it offers, I feel that STANLEY Assure has really changed my life. I would not hesitate in recommending STANLEY to anyone.”
ANSecurity, a specialist in advanced network and data security, has announced a successful project with Nottinghamshire Healthcare NHS Foundation Trust to move to the SHA-2 cryptographic standard to help strengthen its security posture. With over 12,000 computing devices and 500 servers under its management, Nottinghamshire Healthcare has maintained an ongoing strategy to continually improve its security controls. Most of its systems are used internally and unconnected to the internet. However, increased use of BYOD and more interconnection has prompted the IT department to instigate a migration of its PKI infrastructure to the newer SHA-2 (Secure Hash Algorithm 2), a set of cryptographic hash functions that is widely used in security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPsec. ANSecurity helped the Trust to overcome the complexity of its legacy PKI, along with dependencies on existing services including mobile device onboarding and remote access control Overcoming The Complexity Of Legacy PKI “SHA-1 has been depreciated in terms of its security capability, however not all our applications or servers natively supported SHA-2 which meant we needed to consider the upgrade with the context of a wider application server upgrade,” explains Andy Spencer, System Team Leader for Nottinghamshire Healthcare, “It is a significant project that we felt could benefit from dedicated security expertise for which we turned to ANSecurity.” ANSecurity helped the Trust to overcome the complexity of its legacy PKI, along with dependencies on existing services including mobile device onboarding and remote access control. As Jason Parry, Network Security Architect for ANSecurity explains, “We discussed at length with Andy and his team the merits of several deployment scenarios to determine the best course of action. Next, we agreed a process with various business groups who consume PKI and once ratified completed our standard scope of works documentation with pre-requisites to streamline the deployment.” The entire migration project including legacy operating systems migration and remediation of weaknesses within the SHA-1 signatures took just 3 days Improved Security Posture The actual project was driven by the Nottinghamshire Healthcare’s IT department under guidance from ANSecurity to ensure high levels of knowledge transfer. The entire migration project including legacy operating systems migration and remediation of weaknesses within the SHA-1 signatures took just 3 days, leading to improved security posture without any disruption to its 24/7 operations. “Any organizations with a legacy windows PKI environment need to perform something similar,” Parry explains, “This may not require a wholesale replacement and in many cases, it might be applicable to perform a simpler migration to new servers along with an upgrade that renews existing PKI infrastructure.” ANSecurity have performed dozens of these projects over the last 24 months and has a significant number planned for the next year. “The NHS with its large number of legacy systems is a sector that is rapidly moving to SHA-2,” says Parry. “Busy IT staff that may have overlooked these types of projects due to the complexity of legacy applications servers should not be overly concerned as the process for migration is relatively straightforward and uses a well understood process.”