SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

PSA invites security enthusiasts to submit presentations for the PSA TEC 2020 security event
PSA invites security enthusiasts to submit presentations for the PSA TEC 2020 security event

PSA, the security and systems integrator consortium, announces the call for presentations for PSA TEC 2020 is open. Sessions will be selected that serve a variety of disciplines and focus on emerging technologies, critical issues in the industry and tool development to augment attendees’ knowledge base needed to drive the industry forward. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets....

Digital Defense, Inc. partners with Attivo Networks on the industry’s first integrated risk and deception-based security platform
Digital Defense, Inc. partners with Attivo Networks on the industry’s first integrated risk and deception-based security platform

Digital Defense, Inc. has announced the availability of its Frontline.Cloud integration with Attivo Networks, the award-winning leader in deception for cybersecurity threat detection. Digital Defense’s Frontline.Cloud vulnerability management and threat assessment platform identifies high-risk/critical assets with business context that are highly vulnerable to exploits, remain unpatched, are unpatchable or have already been infected in real-time. Integration with Attivo Networks Frontlin...

Point3 Security invited by DoD to join the Persistent Cyber Training Environment (PCTE)
Point3 Security invited by DoD to join the Persistent Cyber Training Environment (PCTE)

The Department of Defense (DoD) recently invited Point3 Security to join the Persistent Cyber Training Environment (PCTE) after learning of Point3’s success in the private sector in cultivating, assessing, and identifying cybersecurity talent. For the United States military, it is imperative to have a strategic and comprehensive cybersecurity talent cultivation plan. Producing qualified personnel to meet the workforce needs of mission commanders is a top priority for the DoD. To meet the...

Ixia’s BreakingPoint QuickTest enables organisations to quickly assess cybersecurity readiness
Ixia’s BreakingPoint QuickTest enables organisations to quickly assess cybersecurity readiness

Keysight, the test and measurement vendor, has announced that Ixia, its cybersecurity and visibility business, has announced BreakingPoint QuickTest, which enables organisations to quickly evaluate the performance and security of devices and networks to assess their cybersecurity readiness. Today’s IT departments struggle against increasing network security threats while suffering from a cybersecurity skills shortage. According to Jon Oltsik, principal analyst, Enterprise Strategy Group,...

Gradiant’s identity verification and forensics solutions on display at Identity Week London 2019
Gradiant’s identity verification and forensics solutions on display at Identity Week London 2019

From June 11th to 13th Gradiant has an important appointment in London. For a few days, the city is becoming the capital of identity recognition technologies to transact in a seamless, yet secure manner. Identity Week is the largest technology fair focused on the concept of identity in Europe and this year brings together more than 3,000 international industry actors in three world-class events: Digital:ID, Planet Biometrics and Security Document Week. Forensic and face recognition solutions I...

Check Point’s 16000 and 26000 series Security Gateways deliver Tera-bps of Gen V Threat Prevention
Check Point’s 16000 and 26000 series Security Gateways deliver Tera-bps of Gen V Threat Prevention

Check Point has announced a new suite of network security products for large enterprises and data centres, which deliver an industry-leading Tera-bps (bits per second) of Gen V Threat Prevention without compromising on network performance, up time, or scalability. Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award-winning SandBlast Zero-Day Protection. These modular gateways come in base, plus and turbo m...

CNL to collaborate with MOBOTIX on exhibiting latest enhancements to its IPSecurityCenter PSIM solution at IFSEC 2019
CNL to collaborate with MOBOTIX on exhibiting latest enhancements to its IPSecurityCenter PSIM solution at IFSEC 2019

CNL Software, globally renowned Physical Security Information Management (PSIM) software firm, is pleased to announce that it will be showcasing the latest enhancements to its IPSecurityCenter PSIM solution as an ecosystem partner on the MOBOTIX stand IF1330 at IFSEC International 2019. MOBOTIX is a global manufacturer of high-quality intelligent IP video systems and sets standards for innovative camera technologies and decentralised security solutions with the highest level of cybersecurity. I...

More than 2,300 professionals from Security, Fire and Safety industry gather at Securex West Africa 2019
More than 2,300 professionals from Security, Fire and Safety industry gather at Securex West Africa 2019

This year from the 16th – 17th of April, the Landmark Centre in Lagos, Nigeria hosted the ninth edition of Securex West Africa. Over two bustling days of business, more than 2,300 professionals from across the Security, Fire and Safety industry crossed the threshold to witness key technology advancements, market trends and do business. Among the dignitaries to open the exhibition and conference this year was ACP Gbolahan Odugbemi, Assistant Commissioner of Police for Lagos State represent...

Ping Identity announces guidelines and capabilities framework for adoption of its Zero Trust security strategy
Ping Identity announces guidelines and capabilities framework for adoption of its Zero Trust security strategy

Ping Identity, global provider of identity-defined security solutions, has announced its capabilities framework and practical guidance for adopting a Zero Trust security strategy. This framework provides reliable direction to companies in any stage of the Zero Trust maturity process to help enable a broad range of use cases and technology integrations. It also includes innovative ways to support secure access to anything, by anyone, from anywhere on any device. Zero Trust security strategy The...

Radiflow unveils partner program for MSSPs to provide OT cybersecurity services
Radiflow unveils partner program for MSSPs to provide OT cybersecurity services

Radiflow, global provider of industrial cybersecurity solutions for industrial automation networks, has announced that the company has launched a partner program for MSSPs to offer OT cybersecurity services. OT MSSP partner program Radiflow’s new OT MSSP partner program provides the framework for MSSPs to offer new cybersecurity services dedicated to ICS/SCADA networks to their industrial enterprise and critical infrastructure customers. Radiflow is aiming this offering at MSSPs that alr...

Hikvision releases its product security white paper featuring security challenges of IoT products
Hikvision releases its product security white paper featuring security challenges of IoT products

Hikvision, the provider of security products and solutions, releases the first version of its product security white paper, introducing the security challenges of IoT products and sharing Hikvision’s practices to continuously improve the security throughout the whole product lifecycle. The product security white paper outlines Hikvision’s comprehensive approach to product security covering device security, data security, application security, network security, privacy protection, an...

Tech Data announces RECON Security Suite to provide consultation-based security solutions
Tech Data announces RECON Security Suite to provide consultation-based security solutions

Tech Data announces the launch of the RECON Security Suite in Europe. RECON offers a targeted and simplified range of multi-vendor subscription and consultation-based security solutions that help to protect against the most common cybersecurity threats. Built by Tech Data security experts from the company’s portfolio of vendor solutions, RECON enables resellers to rapidly accelerate their security offerings without investing in developing their own in-house skills, resources and tools. Th...

Digital Defense announces the availability of Frontline.Cloud app on Cortex by Palo Alto Networks
Digital Defense announces the availability of Frontline.Cloud app on Cortex by Palo Alto Networks

Digital Defense, Inc. announced the availability of its Frontline.Cloud app on Cortex by Palo Alto Networks – the industry’s only open and integrated AI-based continuous security platform. Building on Cortex allows partners to use normalised and stitched together data from customers’ entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to joint customers.   Frontline.Cloud is the industry's only true on-demand vul...

Sepio Systems collaborates with Johnson Controls on efficient mitigation of hardware-based attacks in US companies
Sepio Systems collaborates with Johnson Controls on efficient mitigation of hardware-based attacks in US companies

Sepio Systems, which is disrupting the cyber-security industry by uncovering hidden hardware attacks, is gaining momentum in the U.S. after adding an important new customer and channel partner – the Integrated Security Solutions business unit of Johnson Controls, and strengthening its advisory board. Mitigating hardware-based attacks Sepio offers the world's first end-to-end solution that detects and mitigates hardware-based attacks, including rogue peripherals, invisible network devices...

Fire safety and security experts meet at Euralarm Symposium 2019 to discuss new strategies and product standardisation policies
Fire safety and security experts meet at Euralarm Symposium 2019 to discuss new strategies and product standardisation policies

Many Euralarm members and other interested people gathered on May 13th, 2019 in Madrid for the annual Euralarm Symposium. It was the moment that Euralarm presented its priorities and challenges for the upcoming years. General Director Paul van der Zanden introduced Euralarm’s new strategy document for 2019 to 2024 to the audience by putting it into perspective with the developments within Brussels. Fire safety and security industry There is so much going on in Brussels that is not commun...

VIVOTEK to showcase its comprehensive surveillance solutions and Cybersecurity solutions at IFSEC 2019
VIVOTEK to showcase its comprehensive surveillance solutions and Cybersecurity solutions at IFSEC 2019

VIVOTEK, an IP surveillance provider, will be showcasing its latest comprehensive surveillance solutions at IFSEC 2019, taking place from June 18 to 20 at ExCel London. During IFSEC 2019, VIVOTEK will present Deep Learning Smart VCA, Cybersecurity Management Solution, and a brand new license plate recognition camera. As one of the founding members of the Open Security & Safety Alliance (OSSA), VIVOTEK, in its shared pursuit of a common standardised platform, will also reveal an innovative A...

Radiflow’s iSID Industrial Cybersecurity App now available on Cortex by Palo Alto Networks
Radiflow’s iSID Industrial Cybersecurity App now available on Cortex by Palo Alto Networks

Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, announced the availability of its iSID Industrial Cybersecurity App on Cortex by Palo Alto Networks – the industry’s only open and integrated AI-based continuous security platform. Building on Cortex allows partners to use normalised and stitched together data from customers’ entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to...

Johnson Controls C•CURE 9000 now supports IaaS which provides customers with benefits of cloud computing
Johnson Controls C•CURE 9000 now supports IaaS which provides customers with benefits of cloud computing

Johnson Controls announces that its flagship access control and event management system Tyco Software House C•CURE 9000 is supported on Infrastructure as a Service (IaaS), enabling customers to take advantage of the many benefits of cloud computing with the choice of best-suited service providers. With C•CURE 9000 deployable in the cloud, integrators and end users can leverage cloud service providers such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform, to reduce se...

barox promotes video network hygiene and cyber security to safeguard sensitive data
barox promotes video network hygiene and cyber security to safeguard sensitive data

barox, the manufacturer of professional standard switches, media converters and IP extenders specifically designed for video applications, is promoting the need for awareness not only in selecting video transmission products that utilise sophisticated measures to protect against cyber attacks, but also for all network users to proactively safeguard their own sphere of operation. barox has built important safeguards for protecting sensitive data networks. Extending the scope for consideration wi...

IDIS highlights need for strengthening network security and countering cyber-threats at IFSEC 2019
IDIS highlights need for strengthening network security and countering cyber-threats at IFSEC 2019

Network security and the threat of cyber-loopholes should be a top priority for video surveillance users, IDIS will tell visitors at IFSEC International. Launching a cybersecurity advisory video ahead of the show, the IDIS team will also be on hand to demonstrate and explain how IDIS technology goes a step further to strengthen the resilience of traditional surveillance network processes. Korea’s largest surveillance manufacturer will be highlighting the dangers of cyber-attacks and the c...

MOBOTIX demonstrates innovative cybersecurity and IoT solutions at Spring Splash 2019
MOBOTIX demonstrates innovative cybersecurity and IoT solutions at Spring Splash 2019

After the Innovation Summits in Athens and Langmeil and the company’s attendance at the ISC West in Las Vegas, where MOBOTIX presented the latest research and R&D successes and trends to customers and partners, ‘Spring Splash’ marks the market launch of the latest innovations. MOBOTIX is demonstrating the company’s innovative strength to both its partners and customers. “We want to exploit the potential of MOBOTIX technology and DNA and focus on quality from Ge...

Reposify’s External Surface Security app now Available on Cortex by Palo Alto Networks
Reposify’s External Surface Security app now Available on Cortex by Palo Alto Networks

Reposify announced the availability of its app on Cortex by Palo Alto Networks – the industry's only open and integrated AI-based continuous security platform. Building on Cortex allows Cortex partners to use normalised and stitched-together data from customers' entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to joint customers. Reposify's External Surface Security app allows enterprises to become aware of their blind spots, preve...

Eagle Eye Networks unveils open, public domain for manufacturers to seamlessly connect video cameras, recorders to the Cloud
Eagle Eye Networks unveils open, public domain for manufacturers to seamlessly connect video cameras, recorders to the Cloud

Eagle Eye Networks, globally renowned cloud video surveillance solutions company, has announced the introduction of an open, public domain, secure, plug and play communications framework that enables video manufacturers to connect cameras, DVRs and encoders to the cloud. Eagle Eye Networks’ Cloud Camera Specification has been developed with 10 years’ experience gained from practical integrations with camera manufacturers and cloud technology partnerships. Eagle Eye is providing an op...

ExtraHop for IBM QRadar app integrated with IBM Security Intelligence technology
ExtraHop for IBM QRadar app integrated with IBM Security Intelligence technology

ExtraHop, provider of enterprise cyber analytics from the inside out, launched the ExtraHop for IBM QRadar app, which integrates with IBM Security Intelligence technology to stream accurate, contextual network behavioural detections into the QRadar SIEM. With Reveal(x) detections in QRadar, organisations have a complete picture of suspicious or anomalous behaviour on their network, as well as the ability to perform rapid, guided investigations. This bi-directional integration lets analysts move...

Johnson Controls launches the Pro 2MP Micro camera for high-performance surveillance
Johnson Controls launches the Pro 2MP Micro camera for high-performance surveillance

Johnson Controls has launched the Pro 2MP Micro camera for installations where a low-profile, high-performance surveillance camera is required. The Pro 2MP Micro includes a lens that can be placed up to 20 feet away from the power supply as well as wide dynamic range to balance scenes where bright backlighting can be a challenge. The Micro also operates at a minimum illumination of 0.01 Lux and thus facilitates excellent low light performance without the need for IR illumination. The discrete...

KnowBe4 takes over CLTRe as a measure to expand security portfolio
KnowBe4 takes over CLTRe as a measure to expand security portfolio

KnowBe4, a provider of security awareness training (SAT) and simulated phishing platform, has announced the acquisition of CLTRe - pronounced “Culture”- a Norwegian company focused on helping organisations assess, build, maintain and measure a strong security posture. CLTRe will continue to operate as an independent subsidiary of KnowBe4, and service customers globally. CLTRe’s Toolkit and Security Culture Framework will be available to all KnowBe4 customers later this year. C...

Cryptomathic announces takeover of transaction and PIN management firm, Aconite Technology
Cryptomathic announces takeover of transaction and PIN management firm, Aconite Technology

Cryptomathic, the global specialist in secure server and payments solutions, has announced the strategic acquisition of end-to-end EMV card lifecycle, transaction processing and PIN management provider, Aconite Technology. Both Cryptomathic and Aconite Technology are widely respected for their long standing and deep expertise in the provisioning of secure infrastructure for EMV payments. The acquisition will enable the two firms to leverage their combined expertise to drive innovation in the sp...

Pulse Secure highlights key findings and research outcome of its ‘2019 State of Enterprise Secure Access’ report
Pulse Secure highlights key findings and research outcome of its ‘2019 State of Enterprise Secure Access’ report

Pulse Secure, the provider of software-defined Secure Access solutions, announces that it has published its ‘2019 State of Enterprise Secure Access’ report. The findings quantify threats, gaps and investment as organisations face increasing hybrid IT access challenges. The survey of large enterprises in the US, UK and DACH uncovers business risk and impact resulting in a pivot towards extending Zero Trust capabilities to enable productivity and stem exposures to multi-cloud resource...

Tavcom Training reveals details of the education sessions for the Future of Security Theatre at IFSEC 2019
Tavcom Training reveals details of the education sessions for the Future of Security Theatre at IFSEC 2019

Tavcom Training, part of Linx International Group and IFSEC’s education partner, revealed details of the 24 free-to-attend and CPD-accredited education sessions, which will be presented at the Future of Security Theatre (Stand: IF3140), this year at IFSEC International in London. Tavcom Training has compiled an education programme that addresses many of the most talked about trends and issues amongst security practitioners. Topics being presented by Tavcom Training’s expert tutors i...

Cloud Security Alliance and AlgoSec highlight major security challenges in native cloud, hybrid and multi-cloud environments
Cloud Security Alliance and AlgoSec highlight major security challenges in native cloud, hybrid and multi-cloud environments

Cloud Security Alliance (CSA), globally renowned organisation dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and AlgoSec, global provider of business-driven network and cloud security management solutions, has announced the results of a new study titled, ‘Cloud Security Complexity: Challenges in Managing Security in Native Cloud, Hybrid and Multi-Cloud Environments.’ Complexities of cloud securityThe survey of secur...

View more
  • «
  • 1
  • 2
  • ...
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec