Showing posts with label Cybersecurity. Show all posts
Showing posts with label Cybersecurity. Show all posts

Thursday, August 15, 2024

3 Cybersecurity Steps to Reduce Threats to your Electrical System

 3 Cybersecurity Steps to Reduce Threats to your Electrical System

When anyone mentions cybersecurity, you may automatically think they are referring to IT systems. That is because protecting IT networks – and their associated personal, financial, and other proprietary data – has been the responsibility of IT professionals for an exceptionally long time. But what about your operational technology (OT) infrastructures? Are they also at risk from cyberattacks? How can you protect them? In this post, we’ll discuss these questions, and three specific recommendations for protecting your electrical systems.

The electricity subsector cybersecurity Risk Management Process (RMP) guideline was developed by the Department of Energy (DOE), in collaboration with the National Institute of Standards and Technology (NIST) and the North American Electric Reliability Corporation (NERC).

OT Cyberattacks: An Increasing Threat

The Ponemon Institute emphatically states that, “Cyberattacks are relentless and continuous against OT environments.” In a survey of over 700 organizations from six countries they found that 50 percent had experienced a cyberattack against their OT infrastructure within the last two years that resulted in downtime. For large and critical operations, this can be devastating.

All you need to do is follow the news to see frequent examples of such attacks. For example, in early 2021, the fast action of a technician narrowly avoided the risk of thousands of people being poisoned due to a hacker gaining access to a Florida city’s water treatment plant. Going back a few years, a breach that came through the HVAC system caused international retailer Target to have 40 million credit and debit card accounts compromised, costing them $290 million.

 

The latter example is just one of many that show why building systems are now widely recognized as OT attack targets. The evolution toward smarter buildings is causing an explosion in the numbers of connected devices – already an estimated 200+ million in commercial buildings alone. With more devices comes more data that needs to be protected, but for facility and business management teams to extract the maximum value, data must be aggregated and shared across OT and IT systems.

This OT/IT interconnection means that a cyberattack on an OT system can:

·        Compromise operational safety or the health of building occupants

·        Impact productivity by taking down production lines or other equipment and processes; more about the relationship between Cybersecurity and Productivity.

·        Ultimately cause an IT threat by passing malware or a virus from the OT to IT infrastructure

The Attack Surface is Now Larger

Essentially, connected OT infrastructures have increased the ‘attack surface’ for hackers and, in many cases, have acted as an organization’s Achilles heel. Clearly, it is not enough anymore to focus attention only on protecting IT and data systems integrity. All organizations must ensure strong OT cybersecurity is in place.

But what OT systems are we talking about? Depending on your type of operation, these can include industrial automation systems (e.g. SCADA) and smart building systems like a building management system (BMS), building security, lighting systems, and the energy and power management system (EPMS) overseeing your facility’s electrical distribution. Navigant Research notes, “Cybersecurity issues are expected to grow in tandem with the digital transformation of real estate through intelligent building technologies.”

In this post, we will consider cybersecurity specifically for your EPMS and electrical distribution system. However, these recommendations and practices equally apply to other OT systems.

Connected Power Means Greater Vulnerability

Energy and power management systems are helping organizations boost efficiency and sustainability, optimize operating costs, maximize uptime, and get better performance and longevity from electrical assets. When combined with BMS, an EPMS can also help make the work environment healthier and more productive for occupants.

Enabling these EPMS benefits is a connected network of smart metering, analysis, control, and protection devices that share data continuously with onsite and/or cloud-based EPMS applications. The application provides extensive monitoring and analytics while providing mobile access to data and alerts to all facility stakeholders. Connection to the cloud also opens the door to expert power and asset advisory support that can augment a facility’s onsite team with 24/7 monitoring, predictive maintenance, energy management, and other services.

All these onsite, cloud, and mobile connections offer a potential target and entry for hackers so you can read our facility managers guide to building systems and cybersecurity.

 

Securing Your Electrical System: A Holistic Approach

A hacker only needs to find one ‘hole’ in one system, at one point of time, to be successful. What you need is a holistic approach to ensure that all potential vulnerabilities are secured. For new buildings, cybersecurity best practices should be a part of the design of all OT systems. For existing buildings, cybersecurity should be addressed when OT systems are starting to be digitized. For both scenarios, the following are three key considerations:

1. Seek Specialized, Expert Assistance

The priorities for IT systems are confidentiality, integrity, and availability. For OT, the top priorities are safety, resilience, and confidentiality. This means that OT security upgrades or problems need to be addressed in a different way from IT, with careful planning and procedures. For these reasons, you need to choose a cybersecurity partner who has proper OT experience, to help you comply with all relevant cybersecurity standards and best practices.

OT systems also use different communication protocols compared to IT systems, such as BACNet, Modbus, etc. If you had your IT team attempt to perform OT security system scans, those scanning tools might cause serious conflicts, risking an OT system shutdown.

Cyberthreats are also constantly evolving, so you should seek a partner who offers ongoing OT monitoring services, updates, system maintenance, and incident response. All of these should be available remotely.

2. Put the Right Controls in Place

An OT cybersecurity specialist will help audit your EPMS and electrical systems to assess the current vulnerabilities and risks, including the gaps in any procedures and protocols.

You and the specialist must determine how secure your electrical system needs to be. The IEC 62443 standard helps protect IoT-enabled OT systems by defining seven foundational requirements (e.g. access control, use control, availability, response, etc.), each of which are designated a security level. Increased security levels offer greater protection against more sophisticated attacks. Your cybersecurity partner will help you determine the level of security you need for each requirement.

An example of one technique for securing networked systems is to break up systems into ‘zones,’ with each secured individually. OT will be separated from IT, and within OT there may be further segregation. A special ‘demilitarized’ zone is typically included, which is a perimeter subnetwork that sits between the public and private networks for an added layer of security. This makes it harder for hackers to find a way in from one system or zone to another. Where required, connections between networks are provided by specially secured data ‘conduits.’

Your electrical system should also be physically secured, with no access by unauthorized personnel. This same strategy applies to EPMS communications network security by means of controlled, multi-tiered permission-based access.

3. Train your Staff

Many cyberattacks are successful because employees have caused unintended errors. It is important that your people become aware of, and vigilant against, cyberthreats. This includes giving your operations team specialized OT cybersecurity training.

This training will typically include multiple steps, including training all individuals to spot social engineering cues, such as phishing attempts or attempts to access protected areas using pretexting (i.e. someone pretending to be a vendor to gain access). This will also include establishing protocols around the use of passwords, multi-factor authorization, policies around WiFi access (e.g., guest network that remains isolated from OT networks), regular auditing of user accounts and permissions, etc.

While the horizontal cybersecurity framework provides a solid basis, specific characteristics of the energy sector such as the need for fast reaction, risks of cascading effects and the need to combine new digital technology with older technologies necessitate specific legislation.

Thanks to Felix Ramos & Khaled Fakhuri to write this article.


Saturday, July 1, 2023

AI, Cloud and Cybersecurity Open New Opportunities for Integrators

AI, Cloud and Cybersecurity Open New Opportunities for Integrators 

I was recently asked which technologies are going to have the most significant impact on the physical security industry in the next few years. With the rapid pace of change in technology today, there is no simple answer to this question.

One thing that is certain is that companies are under pressure to become more efficient, secure and operationally aware. That, in turn, is driving the need for real-time data capturing and processing from every part of their business, including security.

We are just beginning to see how emerging technologies and concepts such as artificial intelligence (AI), Cloud computing and cybersecurity are impacting our industry. As companies plan for the future, budgets are increasingly focused on innovative solutions that can help to process the growing amount of data being captured and consumed.

Manufacturers and systems integrators that understand this shift have been quick to identify opportunities to win new business through the introduction of value-added applications or new services capable of generating recurring monthly revenue.

We explore some of those technologies and opportunities below.


Artificial intelligence and analytics

AI analytics is the product of automating data analysis—a traditionally time-consuming and people-intensive task—using the power of today's artificial intelligence and machine learning technologies.

AI analytics refers to a subset of business intelligence that uses machine learning techniques to discover insights, find new patterns and discover relationships in the data. In practice, AI analytics is the process of automating much of the work that a data analyst would normally perform.

Customers are looking to AI and data analytics to gain better insight into their operations. These offerings can enable security-related intelligence or operational and customer insights. The key to AI is self-learning algorithms that, over time, get better at identifying certain targeted behaviors or transactions and reducing false positives.

We have also begun to see several chip manufacturers introduce next generation processors with AI built into the core firmware. As a result, systems integrators can expect to see many product innovations in 2018 focused on advanced video analytics, data integrations and application software.

The challenge for their customers will be clearly defining which data is most valuable to them, who will have access to it, and how to best manage it. Systems integrators can play a key role in this process by having those discussions with customers up front and encouraging a proof-of-concept phase before fully rollouts are undertaken.

 

Cloud-based services

Cloud based services provide information technology (IT) as a service over the Internet or dedicated network, with delivery on demand, and payment based on usage. Cloud based services range from full applications and development platforms, to servers, storage, and virtual desktops.

In addition to AI and data analytics capabilities, we are seeing demand from customers for Security-as-a-Service (SaaS) offerings. The combination of low, upfront capital costs and outsourced services has made Cloud-based video and access control popular, especially in the hospitality and small-to-medium enterprise markets. Examples of SaaS cloud service providers include Dropbox, G Suite, Microsoft Office 365, and Slack. In each of these applications, users can access, share, store, and secure information in “the cloud.”

As technology providers add more sophisticated applications and services to further drive customer insight and efficiencies, expect enterprise retail customers to begin moving to this model as well in 2018. For systems integrators, SaaS solutions can represent a recurring revenue stream and a great opportunity to generate new business.

 

Cybersecurity impacts

Cyber attacks can cause electrical blackouts, failure of military equipment, and breaches of national security secrets. They can result in the theft of valuable, sensitive data like medical records. They can disrupt phone and computer networks or paralyze systems, making data unavailable.

Cybersecurity is crucial because it safeguards all types of data against theft and loss. Sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and government and business information systems are all included.

The sheer scope and size of the data breaches we saw in 2017 – Equifax being one of the most notable – has heightened concerns over cyber-preparedness. Increasingly, customers are evaluating their own level of cybersecurity preparedness, as well as that of their suppliers.

There’s no doubt that our industry is taking cybersecurity seriously, however there is still work to be done, and both systems integrators and their manufacturer partners need to be prepared. Information technology (IT) departments will continue to play an expanded role in approving products for deployment on corporate networks. The use of third-party cybersecurity audits will also become more commonplace, which will significantly impact how products are developed and deployed.

In addition to ensuring that their products are secure, manufacturers and system integrators will also need to improve their own organizational security. For video solution providers, that could mean demonstrating how they protect their software code and architect their software, and how compliant their solutions are with data privacy standards in North America and globally.

The need to bolster cyber defenses will also create demand for new equipment and software upgrades as the vulnerabilities of customers’ legacy equipment are exposed.

Cybersecurity will be a challenge for some systems integrators, but a great business opportunity for others. Customers will increasingly look for integrators that can meet their cybersecurity standards and possibly pass a cyber audit. If there’s a weak link in the chain – from product design to installation or service – then everyone loses. System Integrators know major China manufacturers like Dahua, Hikvision, Uniview are not impacted, from everything we have seen. We executed the proof of concept code from the disclosure on multiple devices and were unable to gain access using the backdoor. The backdoor primarily impacts devices using HiSilicon SOC with Xiongmai software, which is dozens of small OEM manufacturers, using minimally modified OEM firmware, Open Source OS and drivers, and enabling telnet on port 9530.

So it’s important that integrators and manufacturers work closely together and ensure that they share the same high cybersecurity standards. Integrators should also demand that their manufacturer partners be diligent about educating them on products and keeping software up to date to reduce potential vulnerabilities.

 

Knowing your market

Many of today’s leading system integrators have begun investing in the additional resources needed to educate staff and align their organizations so they can successfully adopt and provide these new capabilities to their customers.

It’s important that your organization have conversations with both your end user customers and your technology providers so you can take advantage of new opportunities while also helping to clarify what’s possible today and what’s still on the horizon.

As integrators move from equipment sales to consultative solution sales, it is important to understand the unique business problems of the customers in your target market. While this concept is not new, a growing number of integrators are putting vertical market initiatives in place to concentrate their expertise.

The top five business challenges of yesterday may no longer be the top five challenges of tomorrow. Integrators need to understand what those unique challenges are for each vertical they play in, and work with manufacturers that can provide proven solutions for specific markets.

Thursday, September 1, 2022

IP surveillance camera Installation for small industrial complex

IP surveillance camera Installation for small industrial complex 

As someone that is in the industry, I get this question on a Weekly basis. “Do I need IP or Analog cameras for my Company / Small Scale Industry?”  The answer to this question is quite simple, “How important is your stuff & Property?” There is one major truth about IP cameras that some people find hard to swallow and I am going to be very blunt about it, “Yes, they are more expensive”. Budget is another factor to consider. Small business owners often have to make budget their primary concern and want a quality camera that is easy to install, accessible on mobile, and hassle-free. Quite often selecting the best video surveillance camera is all about the best option within a limited budget.
End-users should look at the total cost of ownership, including warranties and cybersecurity protection. To achieve more cost efficiencies, end users will want an intelligent system, and again, this requires video analytics.

They are more expensive BUT the Cost vs. Price analysis shows that they are in essence less expensive when considering what you actually get with the IP camera solution.  So what do you get, Clarity is the huge one. With the right IP camera you can catch such great detail that you can not only see and describe who is walking up to the door, but the camera system can recognize the face, store it, and give you the exact time the person walked up to the door. While the camera system is doing this it also has the capability to catch the make, model and license plate of the car s/he drove up in. And if that wasn’t enough, the camera system can count the number of people that walk up to the door, pull into the drive way, or even walk by the house. And believe it or not, the system will even send you an email if someone walks up to the door after hours. The system can alert you if the UPS man walks up and leaves a package, or it can alert you if you have something on the porch and it suddenly walks off.
Can you get this type of clarity with an analog camera system?  Maybe?  On a clear day? The honest answer: probably not. Can you get these extra features like facial detection with an analog camera system? That answers easy, NO.
 
So now I ask the same question that I asked above, “How important is your stuff or property?”  or the real question is “How important is your safety?”.
 
Cybersecurity, encryption, and infrared imagery are also growing trends that are currently driving the selection of video surveillance cameras, especially for government and other critical infrastructure customers.
These facilities often prioritize cybersecurity, so procurement officers look for a system that meets regulatory requirements, is secure, and highly reliable — one that protects the data from the camera to monitoring.
Location and threat type factor into the decision as well. Even the best outdoor security camera system won't be effective if installed indoors. Thermal cameras can detect potential intruders at a distance of up to 15 miles, providing an extra margin of response time. Explosion-proof cameras, commonly used in hazardous industries, are hardened with protective housing.
Another factor end users need to consider is installing a completely new system or adding to an existing one. With a new build, they have a blank canvas to work with that can be customized to match the end user's needs rather than retrofit new equipment to an existing system.
 
The most critical factor in selecting the best video surveillance camera is to understand its ultimate purpose — the problems it's required to solve and what it's expected to provide in the way of detection, identification, and data-mining capability. Pain points such as 24/7 monitoring of the premises and compliance requirements set by the enterprise business policies all need to be considered during the selection process.
 
Determining the number of areas of interest, how much of them to cover, and how close they are to each other is the next step. These parameters will determine the types of cameras required and how many. For example, you can achieve adequate coverage of an area using multiple fixed cameras or with just a few pan-tilt-zoom (PTZ) cameras.
 
Risk assessment should be performed to ensure the design of the system results in an installation that adequately addresses the threats and reduces the security risks. In order to identify the level(s) of security required (and potentially therefore the grading of the elements of the system), an assessment of the factors which are likely to come into play is required. In very global terms, from a security perspective these elements are typically considered as:
Threat (Who): The threat will typically be defined as the persons or events to be protected against. Threats will vary greatly in termsof objectives, determination, capability, resourcefulness,
Vulnerability (What / Where): The vulnerability will typically be the areas of concern that require protection. The level of vulnerability will be defined by numerous factors such as desirability of the objects in the area, ease of access, operational hours of the environment, exposure / secluded nature of the area.
Risk (What if?): Risk is effectively the consequence of a successful or attempted intrusion or event. These risks can be wide and varied and not immediately obvious. Risks and impact levels of each identified risk will typically vary depending on the nature of site. Risks can include:

1.   Immediate Financial Loss: Immediate value of items lost.

2.   Ongoing Financial Loss: Increased insurance premiums, time to return to profit.

3.   Personal Safety: Injuries to staff and / or members of public involved in violent incident.

4.   Stress Related Issues: Reduced staff morale, loss of staff due to safety concerns.

5.   Non-financial loss: May include loss of intellectual property, company data or similar.

Typically security systems cannot change the identified threat or alter the risk, but well deployed security measures significantly reduce the vulnerability. This in turn helps to reduce the likelihood of risks occurring.
 
These services are provided in different environments, such as swimming pools, fitness areas, dining halls, common areas and individual rooms. Each area has its own potential risks; for instance, guests can slip and fall near the swimming pool area if not properly maintained or they may get injured in the fitness area. Some of the most common causes of injury in these places are:

1.   Physical Attacks: Although the premises of hotel and hospitality providers are considered safe, in some crowded and low budget hotels, criminals may attack guests for their money. In these situations, the presence of outdoor surveillance cameras acts as an evidence against those criminals.

2.   Slips: Usually, the flooring is not similar in all areas of the premises. The guests being new generally do not pay much attention towards the uneven flooring and so they may slip and fall. Moreover, cracked flooring, worn-out carpets and wet floors are some of the major causes of slip and fall accidents.

3.   Broken Furniture: In order to save money, some hotels do in-house repair of furniture that broke down due to overuse. Because of its age and some guests’ weight, the furniture may collapse and injure the guests.

It is important to consider the level of detail required in an image so that it matches the need of the user. This should be discussed with the client. The practical effect of this is that a camera may need to have a wider or narrower field of view so that the necessary amount of detail can be seen and that in some circumstances more cameras may be needed, either to increase the area covered with the same detail or to allow for different levels of detail to be seen from the same view.
 
Whether the different levels of detail can be achieved using a single PTZ or single camera of high resolution is a matter that should be agreed.
 
A lens is a transparent optical device with perfect or approximate axial symmetry which transmits and refracts light, converging or diverging the transmitted light and to form images. A simple lens consists of a single optical element. A compound lens is an array of simple lenses (elements) with a common axis; the use of multiple elements allows more optical aberrations to be corrected than is possible with a single element. Lenses are typically made of glass or transparent plastic.

The measure of the fine detail that can be seen in an image. For analog systems this is typically measured in Television Lines or TVL. Higher TVL rating, the higher the resolution. Same way megapixel (MP) like 1.3mp, 2mp, 4mp, 8mp etc.
 
Resolution-horizontal
The amount of resolvable detail in the horizontal direction in a picture. It is usually expressed as the number of distinct vertical lines, alternately black and white, which can be seen in a distance equal to picture height.

Resolution-horizontal - vertical
The amount of resolvable detail in the vertical direction in a picture. It is usually expressed as the number of distinct horizontal lines, alternately black and white, which can theoretically be seen in a picture.
 
Detection, Recognition and Identification (DRI) in video surveillance is very important terms to get image details. DRI ranges, expressed in meters, km (or miles), can be found in the specification table of infrared camera brochures.
The terms “Detection”, “Recognition” and “Identification” were defined as follow:

·        Detection: ability to distinguish an object from the background

·        Recognition: ability to classify the object class (animal, human, vehicle,  …)

·        Identification: ability to describe the object in details (a man with a hat, a Jeep …)

As a best practice, do not assume the camera resolution is everything in regards to image quality. For a camera to operate in a day-night environment, (the absence of light is zero lux), the night mode must be sensitive to the infrared spectrum. It is highly recommended to conduct tests or pilot installations before buying large quantities of any model of camera.

Considering Small Scale industry owner agreed to install PTZ cameras & as per below drawing want to execute this project.

Considering Product Make is under NDAA Compliant IP Surveillance Cameras

BOQ of this Projects are

SL NO

Item Description

Qty

1

Supply of 1080p Resolution IP IR Outdoor PTZ Camera 4.6mm-165mm Vari focal Lens, 36X optical Zoom, 1/2.8" SONY Starvis Back-illuminated CMOS Sensor. IR 120Mtr and True Day/Night.

2Nos

2

Supply of 04CH Embedded Linux NVR with upto 6TB SATA Port; H.265; 1nos HDMI out, 1Nos USB.

1Nos

3

Supply of 2 TB Surveillance Hard Disk for NVR

1Nos

4

Supply of 04 PORT Network Switch for IP  Surveillance Camera

2Nos

5

Supply of 2C 1.5sqmm Armour Copper FRLS Cable.

90Mtr

6

Supply of 20mm PVC Conduit/ PVC Casing with accessories

30Mtr

7

Supply of CAT6 Cable to connect IP Camera to switch

 

8

Supply of 2U Rack for Network Switch.

1Nos

9

Supply of 9Mtr PTZ Camera MS Pole Powder Coated without Junction Box arrangement for One PTZ camera installation.

1Nos

10

Supply of Junction Box, Welded body construction in CRCA MS sheets.
Size: 600mm(W) x 200mm(D) x 450mm(H). Single hinged front door in 2mm thk with lock and foamed in place gasketing. Powder coating shade RAL 7035. For One Antenna injector, Camera Power Supply & Switch etc.

1Nos

11

Supply of 867Mbps 5G High Power Outdoor PTP Antenna for Two Camera

2Nos

12

Supply of 32” Surveillance Monitor for Viewing two PTZ camera

1Nos

13

Supply of CCTV Signage (We Checked Video Footage Every day)

2Nos

14

Installation, Testing, Commissioning & Handover including all documentation, arrangement, Transportation, Lodging Fooding.

1 Lot

 Note: Civil work in customer Scope. UPS power arrangement is in Customer Scope.

Display screens may be desk or wall mounted with consideration given to the ergonomics of the operator. The display screens should be installed to minimise the effect of lighting, particularly sunlight, which can adversely affect the viewing experience. Wall or ceiling mounted display screens should be mounted using suitable brackets in accordance with manufacturer’s instructions.
Consideration should be given to the positioning of such screens to ensure they are above head height or not in a position where people may bang their head on them.
Your guest needs to be aware that they are entering hotel area that is being monitored by CCTV surveillance equipment. Signs should be placed so that they are clearly visible and legible. The size of the sign will vary according to the circumstances of its location.



Incident Response

Locally agreed procedures should detail the action to be taken in the event of an incident. These procedures should conform to those laid out as below:
• Action to be taken
• Who should respond?
• The timescale for response
• The times at which observation should take place
• The criteria for a successful response
• CCTV operators should maintain a record of all incidents in the appropriate incident log.

The overall indicator of successful response to incidents is that the CCTV scheme fulfils its objectives, i.e.:
• Restoration of tranquility
• Dispersal or control of the situation
• Prevention or minimization of injury and damage
• Reduction of crime and disorder, to improve safety and reassure the guest
• Identification of a suspect
• Gathering relevant information to assist in the subsequent apprehension of offenders
• Apprehension of a suspect with evidence
• Guest safety through effective evacuation
• Traffic flow restored
 
Our CCTV projects are intended to reduce cases of theft and misconduct in the organisation premises. Like any other project, our CCTV projects will involve a degree of cost to the client, in terms of the cost of the installation, maintenance as well the impact it will have on personal privacy within the precincts of the organisation/ business premises.
SSA Integrate  will carry out a detailed survey of the area under surveillance and armed with experience in the field of public / social control techniques is proposing to install/ deploy CCTV and/ or alarm surveillance system that will make it possible to have a real time total visibility of the Areas under surveillance.
CCTV can be effective in reducing or preventing crime if it is part of a broader crime prevention and community safety strategy, as such, it should not be implemented as the only means of addressing crime in public places.


Tuesday, September 1, 2020

India and China relation effect in Surveillance Market

 India and China relation effect in Surveillance Market

India faces trade imbalance heavily in favour of China. The two countries failed to resolve their border dispute and Indian media outlets have repeatedly reported Chinese military incursions into Indian territory. Both countries have steadily established military infrastructure along border areas.

Major Issues Between India And China

  •      LAC issues – Border demarcation has been a major issue between India and China. ..
  •     Water Disputes – The 4 Rivers flowing from China to India are the crucial source of water for some Indian states. ...
  •     Dali Lama – India's step to shelter Dalai Lama, who has taken shelter in Dharamshala, after his exile.

According to Indian sources, melee fighting on 15/16 June 2020 resulted in the deaths  of 20  Indian soldiers (including an officer) and casualties of 43 Chinese soldiers (including death of an officer). ... On the Indian side ten soldiers were reported to have been taken captive while the Chinese numbers remain unconfirmed.

Many Indians largely blame China for the origin of the coronavirus, and criticize its lack of disclosure, its influence on the WHO, and what are seen as its efforts to take diplomatic or commercial advantage of the crisis. Because of COVID-19, China's GDP contracted 6.8% during the first quarter of 2020, the country’s first quarterly economic retrenchment in decades, according to data released April 17 by the National Bureau of Statistics of China. Thus, India’s government has announced restrictions on foreign direct investment from countries that share a land boundary with India — a move clearly directed against China. It has also been proactive in its neighborhood with diplomatic outreach, economic aid, technical assistance, and the provision of medical supplies.

Outside of China, the pandemic has severely affected the production of video surveillance equipment in areas where the equipment is being made, such as India, Vietnam, and Brazil, as factories remained shuttered under lockdown orders. It is difficult to say when production in these areas will resume since virus spread and containment efforts differ for each country.

To ensure that social distancing norms and the home ministry’s standard operating procedures are being followed, the government will ask all major companies that reopen with permits to share their CCTV footage.
“We will make it mandatory for all bigger organisations to share CCTV footage. We will set up a control room where our industry department will monitor this feed to ensure that the social distancing norms are being followed,” said additional chief secretary and GMDA chief VS Kundu. Besides this, officials from the labour department as well as Haryana State
Industrial Development Corporation (HSIDC) will constantly monitor the factories. “We will also form teams of volunteers who will conduct random checks at the industry premises to see that the SOPs are being followed,” said Kundu. You need to audit video footage what your camera saw. As far as the construction sites are concerned, only those projects that have made arrangements for the workers’ accommodation at the site will be allowed to reopen.

China alone in 2019 accounted for approximately 90% of the worldwide production of video surveillance camera units, and its domestic surveillance market represented 47% of worldwide global market revenue, Omdia estimates, as shown by the chart below. 

Contactless technology was an inevitable demand that COVID-19 brought with it. Realizing this at an early stage of the pandemic. Facial recognition could grant access or unlock a door without physical contact, but in many instances, you would still need to open a door by touching its handle. To deal with this, manufacturer offered motorized swing door and sliding door operators. At exits, recommended touch-free buttons that could open the doors. But Facial recognition is costly, their capacity is lower than fingerprint-based systems, and chances of error are more. Even in a global pandemic, researchers are crawling the internet for photos of people wearing face masks to improve facial recognition algorithms...so, yes, the technology will continue to evolve and continue to be used.
 
The customers, on their part, are keen on these solutions, but because the Indian government had implemented a country-wide lockdown for almost six months from March, sales have been less. Even though the country-wide lockdown was lifted in May, regional lockdowns and restrictions continue, and many customers are still reluctant to decide to invest. Also need to remember India is a highly cost-sensitive economy. This reason Indian people depends on china low cost zero quality product. Some high-end customers, like a pharmaceutical company they upgrading from their existing fingerprint scanners is a significant capital investment decision because they have hundreds of readers across their premises. So, the market may take a final decision only after observing the developments of a vaccine or cure for COVID-19.
 
Some Si' s received an inquiry for a facial recognition-based access control solution, integrated with thermal screening and mask detection, where they categorically said not to go for Chinese products. Although there are customers interested in contactless access control technology, the Indian market appears to have taken a wait-and-watch strategy for now. However, the spread of the virus in the next few months would play a critical role in the decision-making process. By the end of this year or early next, we would get a clearer picture.

For a global security solutions provider, entering the Indian market begins with understanding the local customer’s requirements. But this is not easy, as the Indian market is fragmented and diverse, making it close to impossible to reach every end customer without investing heavily in a high-budget marketing plan. Security systems integration industry in India is not as organized as it should be. Delays in decision making are common in Indian public sector projects. Often there are also a lot of uncertainties because of political reasons. Post-sales challenges differ from customers to customers. Each project has its own set of challenges. These call for several levels of permissions that they are required to seek from different government bodies like National Highway Authorities, Railway Authorities, and other local authorities, before installation, which is another set of challenges during the execution stage.
 
Video Surveillance market especially regarding IP-based surveillance systems, is the customer’s lack of knowledge on what they want to buy. They compare IP Surveillance systems with IP devices that are used in general networking/LAN. The problem is that LAN/WAN is focused more on the network or the backend. For IP surveillance, they need to pay attention to the camera as it is the major component, apart from other network devices. This is where the price sensitivity issues that have become a nightmare for foreign vendors in India resurface. Competition from Chinese manufacturers is a challenge to SIs working with premium solution providers. Mr. Arindam Bhadra, Technical director of SSA Integrate said” “With the presence of various low-quality Chinese products, the biggest challenge for us is to convince our customers to buy products, which, although high in pricing, offers a better quality coupled with world-class technology. Still, many customers take cameras as just a device to watch the videos rather than for security surveillance. So, educating the customer and convincing them on the quality of products is the major challenge. Even they not bother type of cyber certification, UL etc.”

Cybersecurity threat mitigation awareness in the customer is not yet mature and, in such cases, we recommend products that follow best cybersecurity practices to ensure the IP Surveillance equipment doesn’t become the weakest link on the network. Marketing to end customers could be a possible solution, as this would support SIs in their efforts to convince the customer to not just focus on the price factor. When you combine this with steps to create more awareness of cybersecurity issues, customers will have a better understanding of what it takes to protect their surveillance data.

Several public video surveillance vendors in China have now released their Q1 financial reports that show their business being impacted at different levels. Revenue fell by 5% at Hikvision, by 19% at Dahua, by 36% at Kedacom, and rose just 0.5% at China Transinfo, the parent company of Uniview. The reversals are likely due to halted or delayed government-driven video surveillance projects as well as stagnant demand in the enterprise and small and medium business sector because of COVID-19.

Now I share one real life experience, happened with Nagpur based Si’s ACE Technologies, Mr. Ashish Agrawal said
“I would rather lose a order of 70 lakh than compromise on my nations security by Quoting on Manipulation done by Hikvision, Dahua, UNV or CP Plus.
For me Nation comes 1st.
May be emotional fool, but a Proud Indian at Heart.
Today i have rejected a customer asking me specs of these Chinese oem's. Kam profit hoga this FY, but at heart I'm happy that I've done my bit in securing safety and sovereignty of my Nation. My Tribute and Respect soldiers who laid down their lives for our security and security of this Great Nation from Pakis and Chinese. Many undercover we even don't know.
 
May be from business i made foolish decision, but not at cost of My Country.
 
It's time we as Indirect Security solution providers should stand together in supporting Safety, Sovereignty and Security of Our Nation.”

At last someone had to start, he did a bit. May be few SI's who have moral ethics and feelings for Nation can also do. Also few people who have sold souls and heart to Chinese companies can come back and Stand for their Nation.
 
Finally, dealing with government projects in India requires people who are familiar with how the system works. A potential solution some vendors have already considered is hiring such people to work as intermediaries. In a market like India, foreign vendors would always be better off with a reliable local representative. A lot of their success could depend on how efficient this representative could be.

Boycotting Chinese products & use NDAA approved video surveillance is correct process in new normal Indian society. Manufacturers wish and expect to make their products entirely in India in a few years, but there is much to be done before the country reaches that stage. “Make in India” is not as easy as it sounds. But “assemble in India” is good word.  

Download: