Cloud security - Security beat

5G will expand flexibility and choice in networks, decrease latency

The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms,...

Identiv unveils cloud access control and frictionless mobile solution

Even though ISC West 2020 was cancelled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of auto...

CES 2020 to focus on security’s intersection with consumer electronics

Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The imp...

Q&A: New Arcules CRO Nigel Waterton reflects on the cloud, RMR and their impact

Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how indust...

STANLEY drives IT-centric solutions for security and greater business value

As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyse a security event, machine learning can analyse the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with d...

Honeywell is enhancing its product line, working towards proactive security

Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational...

Qumulex seeks to simplify the integrator community’s transition to the cloud

Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cl...

CrowdStrike highlights cybersecurity trends in first half of 2019

A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attack...

GSX 2019 Review: Emphasising integration, focusing on customer outcomes

Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a l...

GSX 2019 Day Two Review: From individual products to the ‘big picture’

One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a...

GSX 2019 Day One Review: Lots of ‘newish’ products to see on the show's busy first day

GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market ...

Verint addresses need to analyse more data in a video-centric environment

Video is a more common feature of security systems than ever before, driven by implementation of Internet Protocol (IP) networks. In addition, various computer analytics systems are now being implemented as a matter of course. The combination of the two trends is changing – and expanding – the operation of security operations centers (SOCs). Intelligent security operations "Intelligence is central to the next evolution of security", says Alan Stoddard, Vice President and General Ma...