news

Wisenet WAVE VMS pre-loaded on BCDVideo servers

HANWHA TECHWIN

System integrators are now able to order Wisenet WAVE video management software (VMS) pre-loaded on selected BCDVideo servers (see inset image).

Hanwha Techwin Europe's Wisenet WAVE is available on BCDVideo's latest Apollo and Neptune series, powered by Dell EMC. Both feature newest-generation Intel Xeon processors, dual RAID capabilities, redundant power supplies, worldwide remote secured system management, and a five-year on-site warranty. For enhanced data security, the warranty also includes data media retention, keeping any replaced hard drive on the premises for proper customer disposal.

Each of the pre-loaded servers are equipped with high-performance Intel quad-core processors to ensure fast, powerful and reliable processing of video for mission-critical applications, say Hanwha Techwin and BCDVideo. A full list, which includes rack-mounted, tower and small form factor options, can be seen here. Wisenet WAVE allows users to monitor up to 64 high-definition video streams.

An auto-discover feature ensures connected cameras and a wide range of third-party IP network devices can be addressed and set up in just minutes. An intuitive 'drag and drop' tool makes setting up a display of live and recorded images on a single screen or video wall simple, according to the companies, with layouts and sizes that can be customised. Other key features include a virtual PTZ which - at the click of the mouse - enables operators to zoom in on any suspicious activity, while motion detection and video analytics support can be configured to generate alerts when user-defined incidents occur.

"BCDVideo servers are specifically designed for video processing and storage purposes, enabling users to gain maximum value from our Wisenet WAVE VMS," said Tim Biddulph, Head of Product and Solutions at Hanwha Techwin Europe. "While possible to run Wisenet WAVE on virtually any manufacturer's servers subject to a minimum specification, the pre-loaded servers we are offering will minimise installation time and ensure the highest level of reliability, performance, and compatibility." Gary Sykes, BCDVideo's territory manager for UK and Ireland, added: "The collaboration between Hanwha Techwin Europe and BCDVideo delivers the ultimate performance in a turnkey IP surveillance solution.

"Today's security projects demand best-in-breed technology and Hanwha's Wisenet WAVE certainly fits the bill. We are thrilled that Hanwha chose BCDVideo as the platform to best deliver this technology."

Hanwha Techwin is exhibiting at IFSEC International, 19-21 June 2018, ExCeL London. You can find them on stand D100. Register now.

Wisenet WAVE VMS pre-loaded on BCDVideo servers

Free download: Fire safety guides from FIREX International The consequences of neglecting your responsibilities are potentially unthinkable. Punitive fines and even prison sentences can be handed down for serious breaches of fire-safety laws and, of course, lives can be lost. This selection of guides is your one stop shop to ensure you are on top of your fire safety responsibilities.

Click here to download now.

Related Topics

Hanwha Techwin Q&A on Wisenet WAVE, latest tech partnerships and AI R&D

Hanwha Techwin wins iF Design Awards for Wisenet Circle and BabyView eco

Hanwha Techwin Europe enters European marketing and training tie-up with ADI

Axis Communications is awarded Cyber Essentials accreditation

CCTV cybersecurity

Network video technology supplier Axis Communications has been awarded Cyber Essentials accreditation, a UK government scheme for mitigating cyber security risks within an organisation.

The scheme, launched in 2014, encourages organisations of all sizes in any industry to adhere to best practice in IT security. It sets out to address the most common threats to cyber security including:

  • hacking -- exploiting known vulnerabilities in internet-connected devices, using widely available tools and techniques
  • phishing -- and other ways of tricking users into installing or executing a malicious application
  • Password guessing -- manual or automated attempts to log on from the internet, by guessing passwords

The Cyber Essentials scheme is a cyber security standard that identifies the security controls that an organisation must have in place within their IT systems, explains Axis Communications, giving them the confidence that they are addressing cyber security effectively and mitigating the risk of internet-based threats. It is important that, as a supplier of innovative physical security and analytical technology, Axis' customers are reassured they are working with a company that takes cybersecurity seriously.

But accreditation is about more than securing a firm's own IT systems, says Axis. As the use of networked technologies such as IP surveillance and access control continues to increase in the UK, more data than ever is being processed and stored. In light of the impending EU General Data Protection Regulation (GDPR), businesses are paying more attention to the security credentials of their suppliers, making schemes such as Cyber Essentials that much more important for manufacturers and vendors, says the company.

"At Axis, we have always had a 100% focus on cybersecurity," said Atul Rajput, regional director, Northern Europe at Axis Communications. "That's why we are constantly working hard to mitigate cyber risks within our company and in the solutions we develop. "Receiving accreditation from the UK government-backed Cyber Essentials scheme highlights our commitment to continuing to support our customers in adopting a best practice approach to all areas of cybersecurity. "Openness, trust and transparency are core to fighting the threat of cybercrime, and we welcome schemes such as Cyber Essentials, which help give clarity and assurance to all those within the supply chain."

Axis Communications is exhibiting at IFSEC International, 19-21 June 2018, ExCeL London.

You can find them on stand D340. Register now.

Free Download: Security sector insights in the age of terror and the cyber-attack

This round-up of articles, which distills several presentations from IFSEC 2017 to their key tips and insights, focuses on counter-terror and cybersecurity - especially regarding physical security
systems - as well as drones, access control trends and CCTV procurement.

Click here to download now

Related Topics

AXIS T61 Series adds audio and I/O functionality to existing Axis cameras

Xtralis VCA security software made available for licensing by OEMs

UK transport infrastructure lags rest of Europe in replacing analogue CCTV with real-time IP video

Ransomware and social attacks are top threats to cybersecurity

VERIZON CYBER REPORT

Ransomware attacks are the top cybersecurity threat to organisations and are now targeting business-critical systems, according to a new report from Verizon.

The 2018 Data Breach Investigations Report (DBIR) finds that ransomware makes up 39% of malware-related data braches, double the rate of the previous year. More worrying perhaps is that these attacks are now moving into business-critical systems which encrypt file servers or databases, inflicting more damage and commanding bigger ransom requests. The findings go some way to confirm that ransomware attacks can cause financial harm, downtime and reputational damage.

Meanwhile social attacks, such as financial pretexting and phishing, as well as being infiltrated via employees are now increasingly being aimed at departments such as HR and finance, in a bid to extract wage and tax data in order to commit tax fraud. The report also finds that:

  • The human factor continues to be a key weakness with employees still falling victim to social attacks. Financial pretexting and phishing represent 98% of social incidents and 93% of all breaches investigated, with email continuing to be the main entry point.

    Companies are nearly three times more likely to get breached by social attacks than via actual vulnerabilities, emphasising the need for ongoing employee cyber security education.

  • Pretexting incidents have more than doubled since 2017, with many incidents specifically targeting HR staff to obtain personal data for the filing of fraudulent tax returns.
  • While on average 78% of people did not fail a phishing test, 4% do for any given phishing campaign. A cybercriminal only needs one victim to get access into an organisation.
  • DDoS (distributed denial of service) attacks are everywhere - they can impact anyone and can be used as camouflage, often being started, stopped and restarted to hide other breaches in progress. They are powerful, but also manageable if the correct DDoS mitigation strategy is in place.
  • 72% of attacks were perpetrated by outsiders, while 27% were driven internally.

    Organised crime groups still account for 50% of the attacks analysed.

  • Simple errors - such as failing to shred confidential information, sending emails to the wrong person or misconfiguring web services - were at the heart of nearly one in five breaches. More than 20% of people still click on at least one phishing campaign during a year.

"Businesses are still not investing in appropriate security strategies to combat ransomware, meaning they end up with no option but to pay the ransom." Bryan Sartin, executive director, Security Professional services, Verizon

"Ransomware remains a significant threat for companies of all sizes," said Bryan Sartin, Executive Director, Security Professional services at Verizon. "It is now the most prevalent form of malware and its use has increased significantly over recent years. What is interesting to us is that businesses are still not investing in appropriate security strategies to combat ransomware, meaning they end up with no option but to pay the ransom.

"As an industry, we have to help our customers take a more proactive approach to their security. Helping them to understand the threats they face is the first step to putting in place solutions to protect themselves." The report highlights the biggest threats faced by individual industries, and also offers guidance on what companies can do to mitigate these risks.

Key findings include:

  • Education: Social engineering targeting personal information is high, which is then used for identity fraud. Highly sensitive research is also at risk, with 20% of attacks motivated by espionage.

    11% of attacks also have 'fun' as the motive rather than financial gain.

  • Financial and insurance: Payment card skimmers installed on ATMs are still big business, but we're also now seeing a rise in ATM 'jackpotting,' where fraudulently installed software or hardware instructs the ATMs to release large amounts of cash. DDoS attacks are also a threat.
  • Healthcare: This is the only industry where insider threats are greater than threats from the outside.

    Human error remains a major contributor to healthcare risks.

  • Information services: DDoS attacks account for over half (56%) of the incidents within this sector.
  • Public sector: Cyber espionage remains a major concern, with 43% of breaches being espionage motivated.

Other industries examined within the report include accommodation and food services, professional, technical and scientific services, and manufacturing and retail. Echoing previous reports of slow detection of breaches, 68% of them took months or longer to discover, even though 87% of those examined had data compromised within minutes or less of the attack taking place. The following seven steps should reduce the risk of data compromise, says Verizon:

  1. Stay vigilant: log files and change management systems can give you early warning of a breach.
  2. Make people your first line of defence - train staff to spot the warning signs.
  3. Keep data on a need-to-know basis - only employees that need access to systems to do their jobs should have it.
  4. Patch promptly - this could guard against many attacks.
  5. Encrypt sensitive data to make it next to useless if it is stolen.
  6. Use two-factor authentication - this can limit the damage that can be done with lost or stolen credentials.
  7. Don't forget physical security - not all data theft happens online.

You can read the full 2018 Data Breach Investigations Report here.

Free Download: Security sector insights in the age of terror and the cyber-attack

This round-up of articles, which distills several presentations from IFSEC 2017 to their key tips and insights, focuses on counter-terror and cybersecurity - especially regarding physical security
systems - as well as drones, access control trends and CCTV procurement.

Click here to download now

Related Topics

Vanderbilt SPC intrusion system now integrates with Aperium platform

Mobotix Mx6 cameras now supported by Genetec Security Center

Biometric credentials added to Inner Range access control solutions