CCTV Buyers Guide and News
CCTV Buyers Guide and News
CCTV News
New intelligent Bosch IP cameras revolutionize how video data can be used for smarter business decisions
Bosch introduces a complete new lineup of intelligent cameras...
B-CAM Compact Packs Power into Small Frame
UK Manufacturer of Body Worn Cameras Unveils The Latest...
Raytec Goes on Safari!
Raytec VARIO2 illuminators have been installed in the greater...
D-Link ANZ Launches New Full HD 180-Degree Wi-Fi Camera
D-Link ANZ has launched its newest mydlink-enabled Wi-Fi Camera, the Full...
ViRDI develops biometric integration with Avigilon access control system
Virdi International has developed a total access control solution,...
Edesix launch new head and torso mounted body worn cameras
Edesix, a market leader in the provision of Body...
Raytec Expands Range of Network Illuminators
Raytec have launched two new product lines as they...
D-Link launches world’s first Apple HomeKit-enabled camera – Omna 180 Cam HD
Available now at apple.com.au, apple.co.nz and in Apple stores...
Live Earth Geospatial Visualization is Now Integrated with Milestone Video
Real-time situational awareness is achieved with a cloud API...
Sony expands its line-up with eight new cameras that provide cutting-edge image capture technology with minimum illumination of 0.006 lux
Sony has announced the release of eight new Full-HD...
Sony enhances video security line-up with new high sensitivity network cameras with Exmor R CMOS sensors
The eight new cameras provide cutting-edge image capture technology...
VIVOTEK Adds New Multiple-Sensor Vandal Dome, MS8392-EV with Aesthetic Design
VIVOTEK has introduced the new vandal dome, MS8392-EV to upgrade...
Honeywell puts building controls in occupant’s hands
Mobile software application enables building occupants to tap into...
OnSSI’s Ocularis Propels VMS Beyond Traditional Applications
Versatility, Security and Mobility among the Many Innovations of...
Synectics to launch ‘gesture-based’ control for intuitive surveillance management
Global surveillance business Synectics is launching a new ‘gesture-based’...
Artesyn Announces New Series of 25W High Density DC-DC Converters for Industrial and Rugged Applications
Artesyn Embedded Technologies has announced the new AXA 25W...
Topeka School District Creates Safer Learning Environment with IP Video Management
Milestone IP VMS provided a significant upgrade to the...
D-Link launches 180˚ wireless AC wide eye camera
Groundbreaking home security camera technology offers instant 180-degree view without...
Facial recognition technology puts SAPOL a step ahead
SA Police (SAPOL) has awarded a $780,000 contract to...
Panasonic releases enterprise-class, integrated open platform security solution with lower total cost of ownership
Video Insight Video Management Software integrates powerful features, hardware...
Transitioning CCTV systems from analogue to IP camera technology: how making the change can benefit business
In today’s fast moving world, many businesses struggle to...
New major release of MxManagementCenter 1.2
MxManagementCenter (MxMC) is a MOBOTIX application for PC/MAC systems with...
Axis introduces the industry’s first IP cameras with i-CS lens
The intelligent i-CS lens featured in the new AXIS...
Cognitec Adds Advanced Video Investigation Tools to its FaceVACS-VideoScan Technology
Latest product release offers intuitive features to recognize and...
D-Link ANZ Launches Full 180-Degree Field of View HD Wi-Fi Camera
180-degree ‘Wide Eye’ camera sees an entire room from a...
MOBOTIX News
The new 6MP mini dome camera v25 with optional...
Artesyn Introduces New High Performance Packet and Server Processing Blade
Artesyn Embedded Technologies has launched a powerful new packet...
Sony Introduces Industry’s Highest Sensitivity 4K Network Camera, SNC-VB770
New SNC-VB770 Combines Sensitivity, Color and Resolution for Range...
Genetec Announces New Version of SV-32 Network Security Appliance Designed to Ease the Transition from Analog to IP
New Hybrid Network Appliance Accommodates Analog and IP Camera...
VIVOTEK Extend H.265 IP Surveillance Portfolio With Launch of Ten New Products
After announcing their H.265/HEVC surveillance solutions at the end...
Sony launches new SRG-120DS full-HD pan/tilt/zoom (PTZ) cameras
Superb picture quality for broadcast, security, healthcare, education and judicial applications with latest...
Illustra Launches New Micro Camera with Exceptional Video Quality
Discreet, low profile IP camera offers solution for tight,...
New Illustra IP Camera Finder
Illustra introduces the new IP Camera Finder website tool....
Illustra Advances Pro Series PTZ to 30x Improving Forensic Searching & Identification at Greater Distances
Improved PTZ IP cameras offer powerful optical zoom with...
exacqVision Now Supports ImmerVision Enables 2.0
exacqVision certification with ImmerVision Enables 2.0 gives users the...
Canon developing high-sensitivity network camera that realises high visibility even for long-range extreme low light surveillance
Canon Inc. has announced that the Company is developing...
HONEYWELL DIGITAL VIDEO MANAGER HELPS IMPROVE OPERATOR EFFICIENCY AND MITIGATE BUSINESS RISK
Latest Release of Smart Surveillance Software Helps Boost Reliability...
ITS – Canon corner adaptor for safe custodial detention
SAFE CUSTODIAL DETENTION WITH MINI DOME CAMERA ADAPTOR ITS...
FLIR and Night Vision Australia continue Australian expansion with launch of New Thermal Monoculars for Law Enforcement
Editor’s Product Review FLIR SCOUT II Night Vision Viewer “These...
Sony’s 4K Security Camera Has 1.0 type Exmor R™ CMOS sensor for Advanced Imaging Capabilities
Sony is adding 4K imaging to its line of...
FLIR and Night Vision Australia launch new Scout II Thermal Cameras in Australia
Released at the recent SHOT Show, held in Las...
CCTV and the Offender Perspective
By Professor Martin Gill. CCTV is now common place...
Public CCTV Surveillance
ASM Editor, Chris Cubbage reports. Special security technology events...
The Many Languages of CCTV
By Dr. Dave Brooks and Jeff Corkhill. Closed circuit...
Police Chief says catch your own burglars
Stark message for householders as Police budget cuts leave...
Fortinet Launches New Rugged, Industrial-grade Devices to Connect and Secure Critical Infrastructure
Fortinet, a global leader in high-performance network security –...
Inmarsat partners with Australian aviation industry to boost global flight tracking
Inmarsat, the leading provider of global mobile satellite communications...
2015 CIO Leaders Summit Australia
Media Corp International was proud to conclude the 2015...
Security Threat Landscape Still Plagued by Known Issues, says HP
HP have published the 2015 edition of its annual Cyber...
Gallagher introduces new technology to the security market
The latest product developments from leading security technology manufacturer,...
Scallop Imaging unveils new camera platforms that deliver superior surveillance performance
Scallop Imaging, the pioneer in distributed imaging technology platforms,...
DDoS-for-Hire Preys Upon SaaS Apps such as Joomla
Akamai Technologies, the leading provider of cloud services for...
Minister for Defence opens new Lockheed Martin Facilities in Newcastle
Minister for Defence Kevin Andrews MP has formally opened Lockheed...
Micron, Seagate Announce Strategic Alliance
Micron Technology, and Seagate Technology have announced a strategic agreement that...
Milestone certifies BCDVideo Nova Series on XProtect
Milestone Systems, the open platform company in IP video...
Valentine’s Day: Avoid the heartbreak of Cyber Crime
After analysing a wave of scams spreading worldwide before...
Call for launch of South Pacific airspace safety initiative to aid integration of unmanned aircraft systems as part of Defence regional aid
The association of Australian Certified UAV Operators (ACUO) is...
An Australian Counter Unmanned Aircraft System – ‘Drone’ – Security Initiative
The association of Australian Certified UAV Operators Inc. (ACUO)...
Safer Internet Day brings reminder to protect your privacy online
“Today is Safer Internet Day and it reminds us...
New Cyber Security Campaign Focuses on Everyday Australians
The Australian Cyber Security Centre (ACSC) has released a video...
WatchGuard and Frost & Sullivan Offer Three Simple Steps to Help Future-Proof Network
Combatting enterprise-grade threats, without the resources to deploy enterprise-grade...
Submission for Senate Inquiry into Aviation and Airport Security
2015 Senate Rural and Regional Affairs and Transport References...
Trend Micro Researchers Discover New Adobe Zero Day Attacks
Security software vendor Trend Micro has identified yet another...
Akamai PLXsert’s Q4 2014 State of the Internet – Security Report Released
Akamai Technologies, the leading provider of cloud services for...
BAE Systems Applied Intelligence named a Financial Crime Risk Management Systems category leader
BAE Systems Applied Intelligence recently announced that the NetReveal® product...
Indago Small Unmanned Quad Copter Aids Australian Firefighters
Western Australia’s Emergency Services Commissioner called upon Lockheed Martin’s...
Trend Micro: New “Zero-day” in Adobe Flash: What You Need to Know
By Christopher Budd Recently, we learned of a new...
New lockers allow round the clock access for Hills’ customers
Hills Limited will trial new secure lockers to allow...
Gartner positions Sophos in the “Leaders” Quadrant of the Magic Quadrant for Endpoint Protection Platforms
Sophos recently announced it has been positioned by Gartner, Inc.,...
Lockheed Martin Australia announced as major sponsor of National Youth Science Forum
The National Youth Science Forum (NYSF) held a launch...
Honeywell Starts Full-Scale Production Of Low-Global-Warming Propellant, Insulating Agent, And Refrigerant
Honeywell announced that it has started full-scale commercial production...
Akamai Assists Bangkok Bank in Strengthening Global Reach
Akamai Technologies, the leading provider of cloud services for...
Two ways businesses must protect against APTs
As advanced persistent threats (APTs) evolve, they are becoming...
Ethernet Australia introduces BrickCom Bullet series network cameras
Ethernet Australia has added Brickcom’s high grade network Bullet...
Organisations should conduct regular IT Security ‘Fire Drills’
IT security ‘fire drills’, supported by executive management and...
BAE Systems Applied Intelligence reveals top five predictions for 2015
Based on its work in the fields of cyber...
SATO Group Launches SATO International to Advance Global Growth Strategy, Targets Overseas Sales Ratio of 40% By 2020
SATO, a global leader in barcode printing, labelling, and...
Akamai Releases Third Quarter 2014 ‘State of the Internet’ Report
Akamai Technologies, the leading provider of cloud services for...
Hills launches new Professional IP CCTV series
Hills has announced the introduction of the Hills Video Security...
ONVIF Connects with International Audiences at Security Industry’s Largest Trade Shows
ONVIF, the leading global standardization initiative for IP-based physical security...
UL receives confirmation from Visa for simulating the latest version of ADVT
UL is pleased to announce that its Collis Brand...
VIVOTEK launches enhanced fisheye fixed dome network cameras
VIVOTEK is pleased to announce the launch of its...
Sundance DSP signs iSTAR® distribution agreement
Sundance, a worldwide supplier and manufacturer of advanced digital signal...
AXIS launches nitrogen-pressurised stainless steel HDTV PTZ dome cameras
The new top-of-the-line AXIS Q60-S PTZ Dome Network Cameras...
Axis upgrades top-of-the-line pan/tilt/zoom series with launch of nine new cameras
The top-of-the-line AXIS Q60 PTZ Dome Network Camera Series...
New camera line from MOBOTIX is more light Sensitive and shows more detail than ever before
The new D25, M25 and Q25 5-megapixel IP camera...
Sony introduces new W series Rapid Dome IP Cameras to harness IPELA ENGINE™ PRO technology
Sony Electronics continues its commitment to advance the security...
All new Fisheye Dome cameras
ACTi delivers a new level of resolution and functionality...
ACTi’s latest PTZ
ACTi is proud to launch the very first product...
Canon presents world’s smallest Full HD PTZ surveillance camera
Canon unveils the world’s smallest full high definition (HD)...
World’s first Raytec lighting integration with Milestone VMS
Raytec is delighted to announce its integration with Milestone’s...
MOBOTIX launches lowlight exposure optimization – MxLEO
MOBOTIX AG has launched the new Lowlight Exposure Optimisation...
Integrated Milestone IP video surveillance monitors all district campuses
Milestone XProtect® open platform video management software (VMS) is...
Raytec protects critical infrastructure in Oman
The Oman Water and Electrical Board have chosen Infra-Red...
Arecont Vision’s New MegaView® 2 and MegaBall® 2 combine high performance, great aesthetics and ease of installation
Arecont Vision, the industry leader in IP-based megapixel camera...
UXC Connect secures $4.1 million contract to deliver IP surveillance and security solution for LNG project in Western Australia
UXC Connect has announced that it has secured a...
Arecont Vision unveils new SurroundVideo® 12 Megapixel 360° panoramic camera with true wide dynamic range (WDR)
Arecont Vision, the industry leader in IP megapixel camera...
FLIR and VideoIQ join forces for new site protection solution
  FLIR Systems is proud to announce the launch...
Imaging chips and pixels
Everything started with the discovery of the Charge Coupled...
The Past Present and Future of Video Analytics
Author:  Dr Rustom Kanga –  iOmniscient This article was...
HID Global Introduces Best-in-Class Features to the Industry’s Leading Retransfer ID Card Printer
HID Global has launched its enhanced FARGO® HDP5000 High...
SightLogix Smart Thermal Camera Solution Integrates With ViconNet VMS for Perimeter Security
SightLogix® a leading smart thermal camera manufacturer for perimeter...
Gallagher launch Command Centre v7.10
Gallagher Security has announced one of its most important...
PUBLIC CCTV SURVEILLANCE : NETWORKS & AWARENESS
As at 2011, living in modern Australia, and indeed...

Dimension Data LogoIT security ‘fire drills’, supported by executive management and the risk committee should be conducted regularly in organisations, in order to understand the appropriate course of action in advance of a security breach.  So says Neil Campbell, Group General Manager for Dimension Data’s Security Business Unit who points out that technologies and services focused on incident response – rather than just incident prevention – should be one of the trends high on the agendas of security professionals in 2015.

This is the top trend on the list of Dimension Data’s team of security experts, following daily interactions with clients. Data breaches such as the March 2014 ¹Target hack, the biggest retail hack in US history, as well as allegations of state-sponsored hacking, are a strong warning that organisations need to move beyond focusing purely on the prevention of security incidents, and start to concentrate on what they will do when an incident occurs.

“It’s inevitable that security incidents will occur. It’s therefore critical that organisations begin to focus on identifying what we call ‘indicators of compromise’, putting a comprehensive incident response plan in place, and performing regular IT security ‘fire drills’”, explains Campbell. He points out the regular fire drills – or rehearsals – will ensure that, in the event of an incident, IT and management teams are clear about what needs to be done, and the business is less at risk.  This includes recovering evidence, identifying and resolving the root cause of the incident (not just the symptoms), and undertaking a forensic investigation.

So what other issues are on the watch-list in 2015 for IT security professionals?

Matt Gyde, Dimension Data Group Executive – Security Business Unit says, “We’ve identified what we believe to be five of the most significant trends in our industry for 2015. These are not the only areas where change is occurring. However, they certainly warrant discussion.”

He points out that a trend that did not make the top five list, but which is closely linked to each is the use of data and machine learning, which, when coupled with human interaction can create actionable and contextualised intelligence. “This enables organisations to make rapid decisions on how to protect themselves against a pending attack, how to respond during the attack, and what action to take post-attack.”

¹In the Target hacking incident, signs of the hack showed up in their event monitoring systems but had too many alerts overall and the importance of these signs were missed. Important to note that the CIO and then CEO were dismissed over this incident.

Trend # 2 – Managed security services move front and centre

For most businesses, identifying IT security incidents swiftly requires 24/7 coverage of the network environment. This can be costly; IT security professionals are scarce, and require regular training to keep abreast of ever-evolving technologies.  However, there’s a drawback to the insourcing model, explains Campbell. To become truly proactive about incident response, organisations need visibility of other networks and to be kept abreast of attacks occurring elsewhere.

Gyde agrees and says in recent years, security management and monitoring have become more complex and time-consuming. Today, you need to prevent what you can, and manage the inevitable compromises. This means optimising your detection, and response capabilities. Many businesses lack the skills required to detect and effectively respond to threats in this manner.

“Managed security services providers have teams of security professionals focused exclusively on identifying potential malware and monitoring thousands of clients’ networks for precursors to denial-of-service attacks. Incidents don’t happen out of the blue: usually there’s ‘chatter’ on the popular ‘dark Web’ channels beforehand. Dimension Data, for example, monitors these channels very closely which significantly increases the likelihood that we can forewarn our clients ahead of impending attacks.”

Trend # 3 – IT security gets cloudy

Both Campbell and Gyde predict a continued increase in the adoption of cloud services for security in 2015.  “This holds true for software-as-a-service solutions, such as secure Web proxy, and secure email in the cloud. These solutions are particularly attractive as the implementation effort is negligible – you’re simply redirecting traffic to take advantage of the service through a consumption-based model. And the services are highly scalable. If you need to support 20,000 users today and you acquire a company and your headcount suddenly increases to 30,000 in six months, you simply amend your licence agreement, and your new employees will be up and running immediately.”

Application security in the cloud and cloud-based, distributed denial-of-service controls such as those offered by Akamai are other areas of growing interest.

According to Campbell, security of the cloud will become increasingly important as more organisations move their workloads to the cloud. “It’s no good adopting this model only to be told by your auditors a year later that your cloud provider’s security protocols aren’t up to scratch. I believe we’ll see cloud providers investing heavily in building rich network architectures that support the gamut of security controls, so that they can assure their clients that enterprise-grade security technologies are being applied to their workloads.”

Gyde agrees and says that there’s still some work to be done within the cloud industry and security. “The most secure platforms in the world can still be compromised by human error or poor management,” he adds and points out that another area that needs attention is integration with existing organisational policies and processes. ”It’s very easy for start-up companies to transition to the cloud as they have no legacy physical infrastructure, and can implement “greenfield” security controls. Larger, more established businesses find the prospect of cloud more daunting, as they’re unsure of how to adapt their security controls, policies, and processes to this model.”

Trend # 4 – From security technologies to secure platforms

2015 will also see the notion of security being a secure platform − rather than a series of point products or devices on the network – gaining traction. The expectation on security professionals will be to deliver a secure platform that allows the business to confidently run multiple applications, in a secure environment.

Gyde says for many years, organisations typically bought multiple security products from different vendors. While this helped create ‘defence in depth’, it also introduced complexity and potential risk. After all, 95 per cent of successful attacks may be attributed to human error, rather than technology. “Increasingly, organisations are weighing up their risks and making buying decisions that aren’t necessarily based on best-of-breed technology and are instead adopting a pragmatic, risk-based approach where they work with their existing infrastructure and partners to manage their risks to an acceptable level, rather than aiming for, but never achieving, ‘perfect’ security.”

The concept of cloud and its pay-per-use model is also relevant to this discussion. Organisations want to replicate the consumption-based approach of cloud in an on-premise model, either independently owned, or owned by a trusted service provider or vendor. Increasingly, organisations prefer security partners that are prepared to take on some of the financial risk, while also offering a flexible service construct, for example, one that allows them to turn on a firewall at short notice to deal with a specific event, and the spin it down when the requirement has passed.

The notion of a secure platform directly relates to organisations’ desire for a ‘single pane of glass’ through which to manage their security assets, delivered on-premise, hosted, or as cloud infrastructure. Essentially, this enables robust security to ‘follow’ an organisation’s applications, data, and workloads without any compromises or changes in technology or management being required. This approach also supports and aligns with enterprise mobility requirements for corporate data to be accessible to users anytime, anywhere, and from anyplace.

Trend # 5 – Endpoint security back in vogue

Campbell predicts a resurgence in interest in endpoint security in the industry. “This is closely tied to the first trend we discussed − incident response − and the fact that some traditional network-based security controls aren’t as effective as they used to be. Security professionals will be looking at devices – whether they’re PCs, Macs, or smartphones – for indicators of compromise, and then enabling some form of incident response process. They’ll deploy technologies to endpoints to make incident response easier,” he says.

Application control is also expected to re-emerge as a key focus area for 2015. However, emphasis will be on identifying malicious activity on the endpoint, rather than malicious code. “While user awareness of information security best practices is a key priority, at some point someone is going to click on something they shouldn’t, so organisations must be proactive about managing the impact of such events,” Campbell concludes.

Comments are closed.

Subscribe to our newsletter