Cloud security - Case studies
PostNord needed to ensure that only the right people get access to each of their 1,500 branches. After installing AEOS, they can manage authorisations centrally and have reduced administration time dramatically. In 2009, the Danish and Swedish postal companies merged to become PostNord, which is still owned by both states and also serves the rest of the Nordic region. Before the merger, each of the 1,500 branches had its own building manager who had freedom of choice in purchasing access contro...
In this attack, attackers impersonate a message from the United States government, claiming to provide information on the Paycheck Protection Program in an attempt to steal valuable credentials. Summary of the attack target Platform: Office 365 Mailboxes: Less than 10,000 Bypassed Email Gateway: Proofpoint Victims: Employees Payload: Link Technique: Impersonation What was the attack? 1) Setup: Fraudulent actors continue to capitalise on the ongoing pandemic by intercepting...
Rohde & Schwarz has installed Ireland’s first Quick Personnel Security (QPS) scanner at Kerry Airport, Farranfore, Ireland, delivering state-of-the-art technology that enables a high throughput, enhanced security, and increased safety for airport customers and staff. The airport has chosen the latest model, the latest generation R&S QPS201 launched earlier in 2020, becoming the first Rohde & Schwarz security scanner installation in Ireland. R&S QPS201 security scanner Th...
Pluralsight, Inc., the globally renowned technology workforce development company, has announced that Irish airline - Ryanair has selected Pluralsight as its strategic partner, in order to optimise the speed and workflows of its engineering team, using Pluralsight Flow. Headquartered in Dublin, Ireland, Ryanair has routes to over 40 countries in Europe, Africa and the Middle East and relies on its engineering teams to ensure its technologies deliver the best quality service for its passengers....
In the ‘LinkedIn Identity Theft’ attack, the attacker impersonates a policy change notification from the company, LinkedIn, in order to steal highly confidential information, such as the victim’s social security number. ‘LinkedIn Identity Theft’ attack Cybercriminals constantly search for unique social engineering tactics, in order to dupe their victims. However, in this type of cyber-attack, attackers rely on the reputability and trust bestowed in social media an...
Located in the heart of west London, Ealing Council serves the residents and businesses of the UK capital's fourth largest borough. With a vast housing portfolio and a commitment to keeping residents as safe and secure as possible, Ealing Council benefits from the use of PAC’s innovative cloud-based access control solution, PAC Residential Cloud. The London Borough of Ealing comprises seven major towns, Ealing, Acton, Greenford, Hanwell, Northolt, Perivale and Southall. Ealing Council&rsq...
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process. The IP video security system contract will see Synectics develops and installs an innovative safety-critical...
The first phase in a pioneering smart transport project to transform security, passenger service, and operational management across Berlin’s S-Bahn rail network has officially gone live. Teams based at S-Bahn’s ‘4S’ operational headquarters are now, via the latest developments in Synectics’ Synergy hybrid cloud software platform, able to connect, respond, and collaborate with passengers and staff on-board trains, at stations, and with field personnel working anywhe...
HID Global, the globally renowned company in trusted identity solutions, has announced that Bay State College safely brought its students back to its campuses in Boston and Taunton, Massachusetts using a digitised contact tracing solution that includes HID Bluetooth BEEKs Beacons to provide real-time location services. HID Bluetooth beacon The HID Bluetooth beacon is in the form of a simple badge holder that is used to carry existing ID badges for students, faculty, staff and guests. The beaco...
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authent...
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell&...
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekda...
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to rec...
Super Micro Computer, Inc., a global pioneer in enterprise computing, storage, networking solutions, and green computing technology announced that it has deployed an additional cluster at Lawrence Livermore National Laboratory (LLNL) to augment existing computing capabilities available for national security and to help discover therapeutics for SARS-CoV-2, the virus that causes COVID-19. Called the “Ruby” cluster, Supermicro’s TwinPro 2U 4 node servers leverage advanced 2nd Ge...
In the fast-growing legalised cannabis industry, extensive security measures are a necessity. VIVOTEK, the pioneering IP surveillance provider has collaborated with Existo, a collective of cannabis industry professionals, to establish an IP surveillance solution for a cannabis cultivation facility in Northern Michigan, the United States. The results not only exceeded the state of Michigan’s expectations to allow for licensing at the state level but are also user friendly and add a level o...
In this attack, scammers impersonate the IRS to collect a fraudulent payment from their target. Summary of the attack target Platform: Office 365 Bypassed Email Gateway: Proofpoint Mailboxes: 50,000 to 70,000 Payload: Text Technique: Spoofing / Impersonation What was the attack? 1)Setup: The IRS has long been a popular target for impersonation by attackers. This email highlights a more sophisticated IRS impersonation, where a targeted attack is sent from a spoofed sender domain...
This week, Abnormal Security researchers have been tracking recent well-disguised attacks from a Russian criminal enterprise, which are using the Emotet Trojan to drop Ryuk ransomware and BazarLoader for financial gain. Ryuk ransomware attack The Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS) issued a warning of an impending attack, using Ryuk ransomware, earlier this week, noting that healthcare and the public sector are the intended targets. Abnormal Sec...
Stuart Codack, Information Security Manager and Steve Roberts, Head of IT at West Midlands Trains (WMT), gave an inside look into working with SureCloud’s cyber security team. As an operator of essential services and part of the critical national infrastructure, West Midlands Trains (WMT) are constantly reviewing the service that they provide and the supporting processes to ensure that they are giving customers the very best service. WMT will routinely carry over 200,000 passengers over a...
Allot Communications Ltd., a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has announced that a Tier-1 telecom operator in APAC has selected Allot HomeSecure to provide consumers with zero touch clientless cyber security and parental control services, to protect the CPEs/routers and devices in their homes. HomeSecure solution The HomeSecure solution will be deployed in CPEs provided to...
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, un...
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and str...
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announced that it was selected by NatWest Group to deliver premium cybersecurity security solutions to the bank’s consumer and business banking customers worldwide. NatWest Group customers will now be able get a free license to install Malwarebytes Premium to protect their digital experiences from within their Online Banking portal. “Keeping our customers safe and secure is of paramount importance to...
Gough & Kelly, a provider of security products and services across the north of England, has expanded the use of SmartTask to enhance its patrol monitoring and performance reporting capabilities at a second office in Yorkshire. The company has rolled out the workforce management software to its operation in Leeds, having already achieved significant operational improvements at its York business. “SmartTask has proved to be an invaluable tool across our manned guard, keyholding and ala...
March Networks, a globally renowned company in video security and video-based business intelligence solutions, is proud to announce that one of the world’s largest oil companies will deploy its cloud-based Searchlight solution at more than 300 c-store locations. The Fortune 500 Company is currently rolling out March Networks Searchlight for Retail as a Service at all of its U.S. corporate-owned stores. The company’s branded fuel products are sold at nearly 8,000 service stations in...
IHS Markit is a global information provider that combines data, analytics, and insights to provide solutions for business, finance, and government. Business across the world relies on the company to address strategic and operational challenges and IHS Markit relies on advanced technology to do so. Challenge While IHS Markit consistently delivered insightful information to clients, they found their team did not have the bandwidth to manage, monitor, and secure their own IT systems. The organi...
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, an...
Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. Mobile BankID is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. The integration with ACT365 comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Web API for integration Tobias Olofsson, Proj...
Evolv Technology announced that Hersheypark® is using Evolv’s artificial intelligence (AI)-based, touchless security screening system as part of the much-loved theme park’s robust COVID-19 safety measures. Hersheypark was originally created by businessman and philanthropist Milton S. Hershey more than 110 years ago as leisure grounds for employees of Hershey's Chocolate Factory. Embodying the passion of its namesake, the park is dedicated to its global reputation as a safe, fun...
RCP21, a pioneering Community Interest Company (CIC), has used SmartTask to help set up and manage an in-house security operation at Langthwaite Business Park in South Kirkby, West Yorkshire. The workforce management software was adopted to coordinate a full-time team of officers, tasked with protecting 120 businesses located at the site, without the need to increase management and administrative resource within the organisation. SmartTask has since enabled RCP21 to deliver a superior security...
Protecting commercial properties is complicated and goes beyond safeguarding people and property. Security professionals respond to the needs of the business, staff, contractors, and visitors and deal with the realities of property damage, theft, and disgruntled employees. Ava helps the team react to anomalies and policy enforcement in real-time. Instead of merely investigating incidents, organisations can take the necessary steps to prevent them. Spotlight brings relevant feeds to the operator...