classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Physical and cyber defence centre
November 2017, This Week's Editor's Pick, Cyber Security, News

XON and NEC Africa launched their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services, with all the underlying IT infrastructure necessary for a turnkey solution.

The key difference between this and other similar operations is the bridged physical and cybersecurity services combined into a single service, focused on safety and security for organisations ranging from state entities to individual commercial operations.

“The service we provide from our purpose-built facility in Midrand, ensures people are safe and secure in a world beset by many difficult issues,” says Vernon Fryer, who heads up NEC Africa’s African cyber business and CDOC.

NEC collaborates closely with Interpol and various other global organisations in the fight to secure the safety and wellbeing of citizens in many countries. NEC has established several cyber defence and operations centres around the globe to assist in that ongoing cause.

XON and NEC Africa’s centre differs markedly in that it provides that same world class service in Africa, from Africa, and also integrates the dependable solutions and services of XON’s enterprise-class systems integration business for the complete solution.

Bertus Marais, GM of Public Safety and Security at XON.
Bertus Marais, GM of Public Safety and Security at XON.

“Our customers get the full range of services and solutions from creating data centres to field infrastructure and services, even including alternative energy, and the networks that connect everything,” says Bertus Marais, GM of public safety and security at XON. “The CDOC unites the worlds of physical and cybersecurity and include analytics and biometrics systems. The individual services are too numerous to mention but range from access and perimeter control and surveillance to fingerprinting, iris recognition, to big data analytics to provide facial recognition at scale, crowds in public areas behaviour monitoring and control, and then the increasingly crucial cybersecurity technologies and services.”

Africa, like other parts of the world, faces several challenges from terrorism to political instability, crime, and other socio-economic-related trials.

The City of Cape Town’s recent three-phase disaster plan outlines the deployment of army and police personnel to issue rationed water in the severest scenario. The CDOC from XON and NEC Africa could provide surveillance, monitor the situation, manage the emergency resources, and facilitate a smooth and successful water distribution process. To do so it would tap into social media channels, even limited by geography, monitor conversations, establish tone of discussions among citizens for any imminent threats to public safety, combine visual and other surveillance from several sources, overlay emergency resources, and provide emergency control personnel options for dealing with several potential scenarios.

The same technology can be used elsewhere in Africa to monitor and manage terrorism threats, including scanning tens of thousands of faces at ports, facilitate electoral security, counter narcotics and other smuggling, help the fight against human trafficking, monitor and manage natural resources, key infrastructure, and much more.

“The CDOC centre is a specialised combination of technologies and skilled personnel who monitor cyber situations 24-7 on behalf of clients who don’t have the expertise to do so themselves,” says Fryer. “The reality is that this is a rapidly evolving scenario that few organisations have the resources to effectively mitigate.

“The recent Deloitte hack is still being investigated. Although, they say few customers were affected. In another case, last year November, it emerged that someone used the Mirai botnet to conduct a denial of service (DDoS) attack against Liberia. Much closer to home, an unscrupulous person used Twitter to lure unsuspecting candidates into his fake South African Defence Force enrolment scheme, charging them, and essentially keeping them prisoner at a property in Pretoria. A South African woman was also rescued from a human trafficking syndicate in Malaysia after being lured in by a fake modelling competition online that attracted women from 14 countries.

“These examples combine the cyber world with the physical world,” says Fryer. “The borders between the two are increasingly blurred as the ramifications span from one to the other and back. The ability to reveal a wealth of personal information, from our physical locations to contacting us, anonymously, and tapping our supposedly restricted personal data, means criminals and other nefarious elements have unprecedented power to corrupt and subvert our safety and security. It’s a difficult world for the authorities and emergency responders to navigate as it relies on skills and infrastructure usually foreign to them.”

For more information, contact www.xon.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Aggregation, automation and augmentation
    April 2018, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Memoori Market Research interviewed Milestone CTO Bjorn Eilertsen, who spoke about future trends in the video surveillance Industry.
  • The IQ of a shrimp
    April 2018, Naxian Systems, This Week's Editor's Pick, Integrated Solutions, IT infrastructure, Security Services & Risk Management
    Amidst all the talk and confusion, Hi-Tech Security Solutions talks to Bernard Senekal to get a better understanding of what artificial intelligence really is.
  • How deep learning benefits the security industry
    April 2018, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
    Artificial intelligence and deep learning are taking video analytics into a new era of improved recognition and potentially creating a revolution in pre-event alerts.
  • The cybersecurity of physical ­security
    April 2018, This Week's Editor's Pick, Cyber Security
    Being aware of the dangers is one thing, but actually knowing what you need to look out for and do to secure your surveillance infrastructure, is quite another.
  • The network is the camera
    April 2018, IT infrastructure, Cyber Security
    Protecting your network is a critical step in protecting your security infrastructure as well as your business. Hi-Tech Security Solutions talks to Aruba Networks about network security.
  • Local is illuminated
    April 2018, GIS-SA, This Week's Editor's Pick, Products
    Local surveillance lighting company, Green Illumination Systems (GIS) has launched the latest in its line of locally designed and manufactured lighting products.
  • The question of value
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    How do you know your surveillance installation is delivering value? Do your service providers deliver value?
  • Surveillance-friendly storage
    April 2018, Capsule Technologies, Seagate Technology, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Storage solutions for surveillance must be designed for intense sequential writing to the disk and random reading. Your average desktop hard disk won’t do the job.
  • Beyond the hype: tomorrow’s surveillance, today’s reality
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure, Conferences & Events, Training & Education
    iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.
  • Eight things to consider when designing a camera perimeter
    April 2018, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    PureTech Systems offers eight practical tips to remember when designing a camera-based perimeter security solution.
  • Protecting the nerve centre
    April 2018, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    A control room is seen as a secure location that is tasked with securing other locations, but it is not unheard of in South Africa that a control room is hijacked. What can be done to secure these locations?
  • Secure communication technology
    April 2018, Panasonic South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
    Cyber-attacks on IoT devices are on the rise, with video surveillance systems connected to the Internet also becoming a popular target.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.