COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in...

8
www.securitybuyer.com Volume 24 Edition 6 July/August 2019 THE GLOBAL SECURITY INDUSTRY'S LEADING SOURCE OF COMMENT, ANALYSIS AND OPINION CYBER ONE YEAR AGO GDPR STANDARDS WERE SET PERIMETER PROTECTION BOON EDAM’S CIRCLELOCK REACHES 35TH ANNIVERSARY ACCESS CONTROL QOGNIFY TO FOCUS ON COGNITIVE CITIES FRAUD AND ID THEFT SMARTPHONE IS A REMOTE CONTROL FOR OUR LIVES SECURITY BUYER World respose to ongoing crisis escalates again Tanker crisis in the Gulf COPYRIGHT

Transcript of COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in...

Page 1: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

ww

w.s

ec

urity

bu

ye

r.co

mVolum

e 24 Edition 6 July/August 2019THE GLOBAL SECURITY INDUSTRY'S LEADING

SOURCE OF COMMENT, ANALYSIS AND OPINION

CYBER ONE YEAR AGO GDPR STANDARDS WERE SET

PERIMETER PROTECTION BOON EDAM’S CIRCLELOCK REACHES 35TH ANNIVERSARY

ACCESS CONTROL QOGNIFY TO FOCUS ON COGNITIVE CITIES

FRAUD AND ID THEFT SMARTPHONE IS A REMOTE CONTROL FOR OUR LIVES

SECURITY

BUYER

World respose to ongoing crisis escalates again

Tanker crisis in the Gulf

COPYRIGHT

Page 2: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

Leonardo Da Vinci Airport achieves eGate success

Fiumicino Leonardo Da Vinci airport has hailed been hailed as an example of progress after it

became the first Italian airport to install new digital passport control equipment.

The eGates are the result of the close collaboration between Aeroporti di Roma and the Ministry of the Interior - Central Immigration Directorate and the Border Police - which together conceived the project, reported local media this week.

It is also among the first in Europe both in terms of number of nationalities authorized to use electronic gates, both for the percentage of eGate users on the total number of passengers at passport control.

The Leonardo da Vinci airport has installed 51 machines at the airport, with 23 at arrivals, 24 at departures, 4 for transits. Of these, more than half are authorized for passengers of non-EU nationalities, in particular: United States, Canada, Australia and New Zealand, South Korea, Japan and from 2019 also Israel and Taiwan.Thanks to this innovation, today 44% of passengers check passports at Fiumicino using eGate.

With electronic gates the time for border checks is a total of 20 seconds (against an average of 1 minute for traditional checks).

In 2018, around 5 million passengers used eGates at Fiumicino, of which approx.1.3 million of non-European nationalities. In 2019, to June 16, more than 2.5 million passengers transited, of which one third was of non-European nationality. A real boom that has marked + 48% compared to the same period of the previous year; a continuously improving figure that in 2019 could exceed 6 million passengers who will use electronic control.

An investment in digital technology that was highly appreciated by travellers who were able to use the service.

According to the independent surveys carried out by ACI - Airport Council International, the international association of airports that measures the perceived quality in over 250 airports around the world through interviews with passengers - even in 2018, Fiumicino is confirmed as the number one large EU airports in the view of travellers.

Industry News

Equistone to acquire Heras a leading provider of perimeter protection solutions

Equistone Partners Europe, one of Europe’s leading mid-market private equity firms, has agreed to acquire

Heras from CRH plc. Heras, headquartered in Oirschot in the Netherlands, is a leading provider of perimeter protection solutions.

The company’s management team will also acquire a minority stake in the business. Heras will continue to be led by Gilles Rabot, who joined the business in 2015. The financial terms of the transaction are undisclosed and the acquisition remains subject to clearance from the relevant competition authorities.

Founded in 1952, Heras provides mobile and permanent perimeter protection systems and products including fencing systems, manual and automated gates, hostile vehicle mitigation barriers and electronic perimeter detection products.

The company’s portfolio of medium- to high-security permanent solutions are used in applications ranging from border control, military bases and critical infrastructure through to schools and playgrounds. Its solutions can be tailored and specified to customer needs and supplemented with installation, systems integration, commissioning and maintenance and repair services.

The company’s range of mobile protection products are primarily used to secure construction sites and major events, with customers including construction companies, public authorities, event organisers, rental companies, distributors, wholesalers and installers.

The company has a strong European presence, with sales offices in the Netherlands, United Kingdom, Sweden, Norway, Germany and France. Its production facilities are in the Netherlands, Belgium, France, Sweden and the UK. Heras has over 1,100 employees and generates annual revenues of over €220 million.

Following the carve-out of the company from CRH plc by Equistone, Heras intends to grow as a platform for consolidation by identifying potential add-on opportunities in a fragmented market. The company also plans to grow organically by developing new products and services, building new customer relationships and strengthening its existing network.

Hubert van Wolfswinkel, Director at Equistone, said: “We are very impressed by Heras’ leading position in the market, which it has achieved by having a strong European manufacturing footprint, long-standing customer relationships and a highly experienced management team.” Dirk

Schekerka, Senior Partner at Equistone, added: “In partnership with Heras’ excellent management and employees, we will support the company’s continued growth trajectory and its expansion into new markets and regions.”

Gilles Rabot, Managing Director at Heras, commented: “We are delighted to have Equistone as a reliable and financially strong new partner. Having them on board will support our continued growth and enable us to expand our business. Together we will continue to develop and provide high-quality, innovative mobile and permanent perimeter protection solutions to meet the ever-evolving safety and security needs of the market.”

Dirk Schekerka, Hubert van Wolfswinkel and Moritz Treude led the transaction on behalf of Equistone. The firm was advised by Munich Strategy (Commercial), EY (Financial, IT, Operations & Tax), Clifford Chance (Legal), ERM (Environmental, Health & Safety) and Houlihan Lokey (M&A, Financing).

012 ISB www.securitybuyer.com

July

Aug

“IN PARTNERSHIP WITH HERAS’ EXCELLENT MANAGEMENT AND

EMPLOYEES, WE WILL SUPPORT THE COMPANY’S

CONTINUED GROWTH TRAJECTORY AND ITS EXPANSION INTO NEW

MARKETS AND REGIONS”

COPYRIGHT

Page 3: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

Global Cyber Security Market Analysis 2019-2026: Market is

Expected to Reach $345.42billion

The Global Cyber Security Market Analysis 2019 report has been added to Research AndMarkets.com’s offering.

The Global Cyber Security market is expected to reach $345.42bn by 2026 growing at a CAGR of 12.3% during 2018 to 2026

Cyber security also referred to as Information Technology (IT) security, emphasize on safeguarding computers, programs, networks, and data from unlicensed or spontaneous access.

As cyber threats have gained importance, security solutions have progressed as well. Factors such as rise in malware and phishing threats, and growth in adoption of IoT and BYOD trend among organizations, are driving the cyber security industry growth. However, the Limited security budget among SMEs is restraining the market.

Hikvision announces half-year financial results

(January – June 2019)

Hikvision, the world’s leading provider of innovative security products and solutions, has reported a total operating revenue of RMB 23.92 billion for the first half of 2019, representing a year-over-year (YoY) growth of 14.60%.

Net profits attributable to shareholders of the Company amounted to RMB 4.22 billion, a growth of 1.67% YoY. The Company also reported strong financial performance during the second quarter of 2019, with 21.46% growth YoY in total operating revenue and 14.98% growth YoY in net profits.

The Company maintained strong investment in R&D and accelerated development of trending technologies.

Newsin Brief

A10 Networks Hosts SSL Security Event in Saudi Arabia in Collaboration with Splunk and SBM

A10 Networks co-hosted a security workshop with the theme ‘Embrace

data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business Machines (SBM). The event took place at the Ritz Carlton hotel in Riyadh on 23 July, 2019.

Abdulmajeed Alobailan, country manager for Saudi Arabia at A10 Networks says, “Today data breaches are causing more damage than ever. Two-thirds of all internet traffic is encrypted. Almost half of all cyber-attacks use encryption to evade security, leaving organisations vulnerable to the SSL blind spot. Traditional security defences are ineffective for SSL. This combined with an ever-increasing amount of cyber-crime means the need for companies to deploy comprehensive protection is greater than ever.”

At the event, executives from A10 Networks, Splunk and SBM teams educated attendees on how regional organizations can learn to embrace their data and use it to better protect enterprise networks in order to maintain business as usual.

A big spotlight at the event was turned on SSL decryption, which is no longer a ‘nice to have,’ but a ‘must have’ as it eliminates blind

spots introduced by SSL encryption and thus prevents cyber-crime. A10 Networks has the most comprehensive decryption solution, A10 Thunder® SSLi® (SSL Insight) that decrypts traffic across all ports, enabling third-party security devices to analyse all enterprise traffic without compromising performance. SBM are high-level consultants with system integration services to take the joint solution to the market and add additional value for customers.

“SBM is proud to partner with A10 Networks and Splunk, joining forces on this key event to present our services and how, as a leading tech firm in Saudi Arabia, we can add value to our customers. This strategic partnership is a fantastic opportunity for our clients who, by using our services alongside Splunk and A10 Networks’ key products, could benefit hugely and embrace data chaos to drive their company forward,” concludes Ayman Alissa, Cyber Security Director, SBM.

News powered by:

ISB 013www.securitybuyer.com

Cybersecurity Start-up Defendify Raises $1.6million in Pre-Seed Funding to Grow Channel Partners

Defendify, an all-in-one, SaaS-delivered cybersecurity platform developer, have announced $1.6m in pre-seed

funding. Led by private investors with participation from Maine Technology Institute (MTI) and early stage cybersecurity industry investor 3dot6 Ventures.

Jonathan Dambrot, Investment Partner at 3dot6 Ventures, said: “SMBs are under immense pressure to find cybersecurity solutions that help meet regulatory needs and satisfy requirements coming from their customers. Finding a way to do that holistically and at a reasonable price point has been very challenging, until now. Defendify solves a critical problem in a massive market that is largely ignored.”

Rob Simopoulos, Co-Founder of Defendify, said: “The channel brings expertise, dedication and cost-savings to SMBs, but this only works if the cybersecurity solution is easy enough to

manage. That’s why we remain committed to the Defendify platform, which is comprehensive enough that our channel partners don’t need to build a technology stack, simple enough that they can onboard their customers in minutes and cost-effective enough that they have a competitive advantage.”

“FINDING A WAY TO DO THAT HOLISTICALLY

AND AT A REASONABLE PRICE

POINT HAS BEEN VERY CHALLENGING”COPYRIG

HT

Page 4: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

Before we can discuss the top five challenges to Counter Terrorism in the future, it is important to briefly touch on the outline of

current UK policing in order to put the future challenges faced into context.

Developments with technology poses an ever-evolving threat. The UK Counter Terrorism network and its partners continue to strive to maintain its worldwide-recognised high standards. Policing in the UK is going through a metamorphosis; with the loss en-masse of years of experience and reduced numbers, this is all very problematic. Further challenges faced include some seeing policing not seen as a career any longer, but merely a stepping stone to greater roles or income from the security industry. This makes the challenges facing UK Counter Terrorism policing even greater.

Placing all that to one side, let’s now look at the top five challenges to the future of counter terrorism. To place them in any order would not only be controversial among professionals, but also foolish in the context of the varied and ever-evolving threats.

Far-Right Extremism

Over the last three years the UK has seen a significant rise in both the profile and activities of the far-right. Whether this is a direct result of Brexit, or merely a response to the outrage and degree of depravity which IS have instilled in their followers, this is a discussion in itself.

As this article is being written, weare a few months post the Christchurch New Zealand attacks by an Australian national. On this fateful Friday worshippers at two mosques were targeted and 50 Muslims were murdered in cold blood. A large number of others are currently fighting for their lives - victims from as young as three up to 83. The far-right influence of this individual in both his manifesto and actions on that day are indisputable. To live-stream the attack is again, another evolving challenge that the police and Internet providers are currently faced with in combatting the propaganda campaigns.

Counter-terrorism police in the West Midlands are currently investigating after five mosques were attacked with sledge-

hammers in Birmingham. The motive behind the attacks remains unknown but West Midlands Police said it is believed they are linked.

The growth in far-right extremism could be fuelled by Brexit and the government and Parliament’s perceived reluctance and resistance to fulfilling the ‘will of the people.’ Potential civil unrest within the UK could also lead to further opportunities for the far-right to recruit others.

IS returning fighters and people trafficking

The almost-destruction and last stand of the Caliphate does not signal an end to IS as an ideology. There is no doubt that during the last few months foreign fighters have slipped through the net and been deployed across parts of Africa and Europe. The migrant crisis and immigration policies of certain countries have allowed opportunities for foreign fighters to slip into Europe and surrounding countries.

The risk posed by the battle-hardened fighters brings a real and clear danger,

032 ISB www.securitybuyer.com

COUNTER TERROR

Top five challenges police forces face to tackle Counter Terrorism in the future

Blackstone Consultancy was recognised by the Spear’s 500 guide 2019 as one of the very best security and intelligence providers for private clients

Sponsored by

COPYRIGHT

Page 5: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

initially to the people of Europe, but ultimately could result in martyrdom operations reaching the UK.

One of the biggest threats to our national security is the people-smuggling crisis which has hit the UK coastline in the last few months. In the past we have relied heavily on our small island and the Channel providing us with a last-line of defence. No more. Organised criminals and terrorists now have an opportunity to breach our borders and enter the UK under cover of darkness. With a clear supply and demand chain and the potential for financial gain, it’s a no-lose situation for organised high-level criminal organisations.

This threat requires a joined-up and resource-intensive response in order to shore up our UK coastlines. Failure to do so could provide terrorists with an opportunity to smuggle both themselves and weapons into the UK. We can no longer rely on a Royal Navy fleet to patrol our borders and complete other necessary commitments elsewhere. Ten years of austerity and a clear move to combat worldwide threats may come back to bite us.

Al Qaeda and their convicted terrorists due for release

Since the emergence of IS and the demise of Osama Bin Laden, Al Qaeda has taken a back seat in the global Jihad. They have taken a number of years to regroup and consolidate both their numbers and financial position. The recent announcements by Saudi Arabia to strip Hamza Bin Laden of his citizenship comes after the US State department issued a $1 million-dollar reward for information leading to his arrest.

Hamza has in the last couple of years publicly threatened attacks against the US and its allies. It is believed that Hamza was to be groomed as a potential figure head of Al Qaeda by Osama Bin Laden. Given the history of Al Qaeda it is only

a matter of time before they emerge out of the shadows with a large-scale attack.

In the UK the release of former convicted Al Qaeda terror suspects brings another real threat. A number of those convicted between 2004-2008 for Al Qaeda inspired plots are due to be or have been released. These individuals pose a serious threat, which among the several thousand individuals the UK Police and Security Services already have to monitor, will cause them further concern.

Commercial Technology

As users of the Internet and smart phones, terrorists have a vast array of assets at their disposal. IS were very effective at using the Internet for propaganda and recruitment purposes. In the UK alone, roughly nine-hundred citizens left to join IS. The Internet offers a vast array of other assets to terror groups, such as reconnaissance on potential targets using programs such as Google Maps, access to websites which provide instructions on the construction of home-made bombs and ways to fundraise for their organisations.

On the Internet, and in particular in the cybercriminal underground, there are many black markets where it is possible to acquire any kind of illegal product and services, including fake documents. Pseudo-anonymity offered by the dark net makes the dark web an ideal environment for various activities such as purchasing weapons, purchasing stolen card data, counterfeit documents and purchasing of malicious code.

Drones and unmanned aircraft are a cause for concern. The incident at Gatwick airport in December 2018 highlighted the fear of how a drone could damage a moving aircraft, were they to collide. It is also worth noting that should someone have the knowledge to build and IED, then once they have bought a drone, they have a flying bomb at their disposal. An airplane would make an easy target for such a device, should the national airports not install adequate jam drone technology. In Syria footage provided to news agencies showed a remote-controlled car that could be used in attacks without a driver.

Cyber threat

Many have argued that cyber terrorism, that inflicts violence on a mass scale, is far too sophisticated for terror groups to achieve its use for terror. For the foreseeable future, it appears that terrorists are likely to exploit the internet for propaganda and information purposes.

“POLICING IN THE UK IS GOING

THROUGH A META-

MORPHOSIS; WITH THE LOSS EN-MASSE OF

YEARS OF EXPERIENCE

AND REDUCED NUMBERS, THIS

IS ALL VERY PROBLEMATIC”

Simon Giddins, Managing Director, Blackstone

ISB 033www.securitybuyer.com

COUNTER TERROR

Sponsored by

COPYRIGHT

Page 6: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

Tourlock 180+90 revolving door prevents tailgating and piggybacking and provides maximum security while controlling traffic flow

Dallas Police HQ chooses Boon Edam security doors to secure its lobby

There is a saying that “Everything is Bigger in Texas,” and the Dallas, Texas police department is no exception. The city of Dallas

is ranked in the top 10 cities in the US in terms of population, at 1.2 million people. The Dallas Police Department is the ninth largest municipal police force in the US, based on 3,012 sworn officers. It is led by Chief of Police, U. Reneé Hall. Security a concern when designing HQ building

The department is located in the Jack Evans Police Headquarters building, which was built in 2003. It is 358,000 square feet, has six floors, is spread over a three-acre site, has a separate 1,200 car parking garage and a two-acre, open parking lot for additional visitor parking. Prior to 2003, the department was housed in the circa 1914 former City Hall Building.

The Jack Evans Police Headquarters building was under construction when 9/11 terrorists flew airplanes into the World Trade Buildings in New York. That event was preceded by the Oklahoma City Murrah Federal Building bombing in April 1995. Therefore, security was a concern in its design. Police officials worked with a Police Design Consultant – McClaren, Wilson, and Lawrie Architects of Phoenix – to help design the building to resist a terrorist attack and isolate potential hazards.

The building also needed to control visitor traffic and access. On an average month, there are 5,000 public visitors to the Jack Evans building. In addition, shots fired at police buildings nationally are not uncommon, says Paul M. Schuster, Senior Corporal/Facilities Management for the Dallas Police Department. “For the most part they are random, single shot drive-by shootings. Often, the officers are unaware that the building has been shot at, until they find a bullet hole in the brick or glass. Increasingly, police tend to be a symbol of government and some citizens see that as a visible target to lash out at. Police officers are trained to expect the routine types of calls, such as domestic violence, traffic accidents, and other crimes. Yet they must be flexible to anticipate the non-routine that can be dangerous and change in a heartbeat.” An active shooter incident led to an increase in security

On June 13, 2015, after midnight, a 35-year-old male placed a duffle bag with a remote-controlled bomb to detonate later between cars in the parking lot of the headquarters building. The suspect then began shooting continuously at the lobby windows. Officers responded to the scene, a vehicle chase began, and the incident ended outside the city. Luckily officers in the lobby took cover and were not injured. Following that incident, the Dallas Police Department conducted a security assessment of the building and also at seven patrol stations throughout the city. The assessment included testing various construction materials for bullet resistance to various types of weapons. Gensler Architects and Guidepost Solutions, LLC developed the solutions and plans.

042 ISB www.securitybuyer.com

ACCESS CONTROL

“THE POLICE OFFICERS AND POLICE STAFF ONLY WANT A PLACE THAT IS SAFE

AND WHERE THEY CAN DO THEIR GOOD WORK”

COPYRIGHT

Page 7: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

“Yesterday we were concerned about handguns, today we are worried about rifles, and the idea of terrorism is always present with outright attack or bombs,” Schuster notes. “The police officers and police staff only want a place that is safe and where they can do their good work.” Funding of $1.3 million was approved to upgrade the lobbies of the seven patrol stations to withstand rifle rounds, and $1.9 million to improve headquarters lobby security, and to upgrade an aging security system. Turner Construction Company and Convergint Technologies, LLC conducted the renovations and security technology integration. Challenges to the security design

The headquarter’s lobby was initially designed as a two-story glass-walled structure, with an information desk and public records service windows. Visitors were allowed free entry into the lobby and were only screened in an open area to the side if going to other floors.

“The challenge in upgrading lobby security was the two-story lobby entrance glass. The glass was not bullet rated, due to budget constraints. Changing the front of the building to support ballistic rifle-rated glass would have caused extensive time, exposed the inside of the lobby to weather, and would not have solved all of the security issues,” Schuster says. “In addition, there were concerns about keeping an ‘open’ and friendly service concept in mind and ensuring that the lobby would not resemble a ‘fortress’,” Schuster notes. Screening room with security revolving doors to contain incidents

The solution was to keep the existing exterior unchanged and focus on adding a layer of security once a person enters the lobby. Visitors now enter the headquarters and immediately proceed to a side room where security screening is conducted. A new secondary wall with bullet-rated glass and solid bullet resistant wall materials was

constructed inside the lobby to channel visitors to the room. Once inside the screening room, which also has bullet resistant walls, the visitor has belongings x-rayed, and they walk through a metal detector. In the event that anyone was to produce a gun and begin shooting, the incident could be contained inside that room. Once a visitor has been cleared, they proceed into the main lobby via a Boon Edam Tourlock 180+90 security revolving door. This automatic, four-wing door is the most advanced, security revolving door in the Boon Edam product range that offers maximum throughput, allowing users to enter and leave the building simultaneously. In the event that a large number of persons try to force their way into the facility, the Tourlock 180+90 will determine that more than one person is trying to enter and will reject the person and lock out any others from entering. Once a visitor is ready to leave the lobby and exit the building, they pass through another Boon Edam Tourlock 180+90 that leads to a vestibule with exterior swinging doors. In the event that someone tries to go back into the lobby from the front vestibule area, without going through the security screening room, the Tourlock security revolving door will reject their entry.

Balancing security with aesthetics

The Jack Evans Headquarters security upgrades for the lobby improved security and still kept the best aspects of the lobby design, including the antique police car, and the overhead police helicopter. The Boon Edam security revolving doors accurately prevent both tailgating and piggybacking and provide the department with maximum security while controlling traffic flow. “While it would be great to have a building totally open to the public and then add security as needed, such is not the world we live in anymore,” Schuster adds. Future security plans include exterior site security upgrades to the patrol stations and the headquarters to include security fencing with card access controls for fleet and employee vehicles at each of the sites.

ISB 043www.securitybuyer.com

ACCESS CONTROL

COPYRIGHT

Page 8: COPYRIGHT...a security workshop with the theme ‘Embrace data chaos by inspecting your SSL’ in collaboration with technology alliance partner Splunk and channel partner, Saudi Business

Terrorism StudiesLeading online course

www.terrorismstudies.comTel: +44 (0)20 7017 4483 | Email: [email protected] VIP code: Security Buyer

Individual Modules | 4 WeeksCertificate | 16 WeeksAdvanced Certificate | 32 Weeks

Start dates:February, June, October

Study the characteristics of terrorism, terrorism tactics and counterterrorism online and at your own pace.

• Join over 4,700 professionals that have already benefited from this course;

• Delivered by renowned staff at the Handa Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St Andrews;

• Explore the most relevant subjects in today’s international environment by tailoring the 17 modules addressing terrorism characteristics, tactics and counter-terrorism to your requirements;

• 100% Online: fit learning around your life and study anytime online.

COPYRIGHT