Showing posts with label Storage. Show all posts
Showing posts with label Storage. Show all posts

Wednesday, October 1, 2025

Gaming PC with Home Video Surveillance

 How to Integrate Your Gaming PC with Home Surveillance CCTV

Suppose you are deep into your gaming zone with headphones on. The sound of a knock on the door or someone breaking into your home is impossible to hear. Well, you need a home surveillance CCTV system. Simply install and incorporate  cameras into your existing gaming PC setup to make your home secure.

Protecting your gaming setup and improving alertness about the surroundings can put a lot of gamers’ minds at ease. Gaming is a strict business. You must put in skill and concentration to take your game account to new heights.

A simple task such as ordering a pizza can engage your mind in constantly hearing the doorbell or ringing phone.  A gamer can easily avoid constant loss of concentration through overlay video of a  camera. To learn more about integrating your gaming PC with CCTV, read on!

Integrating Gaming PC with CCTV

Let’s start with the basics. We will use an offline setup for gamers to emphasize the concept of a closed-circuit system. In addition, we will mention methods gamers can use to broadcast their camera feed to the internet. It will make it accessible from anywhere in the world. To start the integration process, you will need a set of items. Let’s move step-by-step:

Step 1: Choose the Right CCTV Cameras

CCTV cameras come in various shapes, sizes, and technical capabilities. We typically recommend an IP CCTV camera for gamers in a home configuration. It will provide a crisp video with details ideal for a small-scale setup. There are wireless versions of IP CCTV cameras, but they are prone to interference, which can cause stuttering video or audio. In a surveillance setup, having a wired connection alongside an on-camera SD card recording is the best option.

Connecting an IP CCTV camera with the internet and offline setup is easy. They can provide up to 4K resolution depending on the requirement. Furthermore, users can opt for a camera with a microphone to receive live audio. They only need a RJ45 ethernet connection for data and a power source. However, you will not need two cables running throughout the house for the camera. A single RJ45 cable will suffice. We will explain how to achieve that in the next step.

Step 2: Collecting Necessary CCTV Surveillance Items

After you decide which camera is best for your setup, we can move on to the other items. Here is a list of things for a home surveillance CCTV setup:

·        Cameras: The number of cameras will depend on the number of places you want to perform surveillance. It will serve as a basis for the items next in line.

·        PoE Switch: After deciding the number of cameras, you need a PoE (Power over Ethernet) switch. It will serve as the basis for providing power and transmitting your video to the gaming PC. Usually, people set it up near the computer, and its ports should equal the number of cameras plus one port for computer/router connection.

·        PoE Injector and Splitter: A typical IP CCTV camera requires coaxial power and network cable. A PoE injector and splitter will convert a simple ethernet cable to a coaxial power cable and data transmitting connection. Just ensure that they are IEEE 802.3at/aft compatible.

·        Ethernet Cable: The whole system communicates using the ethernet cable. Calculate the distance between the camera and the PoE switch after routing. There are various categories of ethernet cable available. Their price depends on the quality. We recommend using a Cat5e for its price/performance ratio. Anything above the Cat5e grade is also compatible.

**Note: A typical setup will have a line running underneath the carpet alongside the edges of the wall. Make sure to take proper measurements.

·        Router: You will need a router to connect the complete setup to the internet and ensure your PC remains connected. If you are an online gamer, then you own one. We will explain how to connect all the pieces and make them start working.

Step 3: Camera Placement

Strategically placing your  camera is essential. Ensure it is not easily accessible, and you can route the wire hidden away from eyesight. Following are some of the areas where you can place your camera for surveillance:

·        Front Door Entrance

·        Back Door Entrance

·        Vulnerable Windows

·        Garage

·        Drive Way

·        Hallway

·        Common Rooms

The areas might not relate to your setup, but be sure to cover maximum entrances. Observe where you can mount the camera for complete and precise coverage.

Step 4: Complete the CCTV Setup

Let’s start connecting all the puzzles. Before we mount the camera in their respective location, check connections and equipment healthiness by performing a test. Complete the following process to complete your CCTC setup.

1.   Connect your PoE switch to the power outlet and ensure the lights are on.

2.   Now connect the ethernet cable in one of the ports of the PoE switch and connect the other end to a PoE injector and splitter.

3.   Now take a camera and connect its wires with the PoE injector and splitter. Your camera will now have power.

4.   Take a new ethernet cable, insert it into one of the ports on the PoE switch, and connect the other end with the computer router. Make sure you plug in your gaming PC to the same router.

5.   Download and install the  software from the camera manufacturer’s website. Follow the instruction to access your camera live feed.

6.   You have successfully tested your equipment if you can see the live feed.

7.   As the last step, install your CCTV cameras at their designated location, route the cable, and complete the setup.

Step 5: Start Monitoring CCTV with Gaming PC

Now that you have connected all your equipment let’s obtain the live video feed from your cameras and place an overlay on your favorite game. You will need a decent graphics card and Windows or MacOS computer.

1.   We will be using the VLC media player. Download and install the latest version. It is free to use.

2.   You will be accessing the camera through its IP address. It is usually written and provided by the manufacturer. Check the website or instruction manual.

3.   Start VLC media player.

4.   Navigate to Media > Open Network Stream

5.   Now type the address to your camera with the following settings

rtsp://admin:a1B2c4@192.168.1.5

·        Note that in the address given above, the camera username is (admin), the password is (a1B2c4), and the IP address is (192.168.1.5). Everything else will remain the same.

·        After you enter, you will start streaming your IP CCTV camera.

·        Now, right-click on the live stream, navigate to view, and always click on top.

·        Right-click on the live stream and navigate to view. Now click minimal interface.

·        Now you will have a constant stream on top of all your games.

Note: To view your surveillance streams live from anywhere around the world. Follow the camera manufacturer’s guidelines to enable the online setup. The process is easy to follow once you connect the PC to the internet router.

Conclusion:

There are tons of benefits of having a live stream over your gaming sessions. It improves spatial awareness and helps gamers concentrate on their gaming ventures. The gaming industry has reached a whopping $385 billion and still growing. It is logical to find your share within the broad field. A home surveillance CCTV can provide the comfort of security for gamers. What better than having a live view of your surroundings while gaming?

The process is easy, and anyone with a basic knowledge of computers can put a system together. To save time, you can order a pre-configured setup from an online website to immediately set up your surveillance. At last, we hope you find value in our article. So set up your watch and get gaming!


Wednesday, January 1, 2025

Cloud vs On-premise Security Systems

Cloud vs On-premise Security Systems 

Wishing you a very happy new year 2025. Choosing the right security framework for your data is crucial. Cloud vs on-premise security offers distinct advantages and challenges, shaping how businesses protect sensitive information.

Understanding these differences is key to deploying a strategy that safeguards data and aligns with operational needs.

On-Premise & Cloud Security Compared

On-premise and cloud security solutions represent two fundamentally different approaches to protecting data.

On-premise security, often referred to as on-prem, involves storing data on local servers and managing it directly within the physical premises of a company. This approach provides complete control over security measures and physical security but requires significant investment in infrastructure, ongoing maintenance, and robust security teams.

Conversely, cloud security leverages remote servers managed by third-party cloud providers to store and secure data. This model offloads much of the heavy lifting of data security to the cloud provider, offering scalability, cost savings on hardware, and access to advanced security features without the same capital expenditure.

However, it relies heavily on the cloud provider’s ability to protect data and manage cyber threats effectively, potentially limiting the direct control businesses have over their sensitive data and security infrastructure.

What’s A Cloud Security?

Cloud security refers to the set of policies, technologies, applications, and controls used to protect data, applications, and the associated infrastructure of cloud computing. It is a critical component of any cloud service offered by cloud providers who manage and maintain the cloud infrastructures.

Pros:

  • Scalability: Cloud security scales with your needs, allowing for adjustments in protection as your data storage or security needs change.
  • Cost-Effectiveness: Reduces the need for major hardware investments and lowers ongoing software licenses and system maintenance costs.
  • Advanced Security Features: Typically includes robust security controls, disaster recovery plans, and frequent updates to defend against the latest threats.

Cons:

  • Dependency on Internet Connection: Requires a constant internet connection to access data, which can be a significant drawback during outages.
  • Less Control: Users have less control over their data as it is managed by the cloud service provider.
  • Potential for Data Breaches: Although secure, the external management of data may increase exposure to data breaches if not properly managed.

What’s On-Premise Security?

On-premise security involves managing the IT infrastructure and data storage on-site within a company’s facilities. This traditional IT infrastructure allows companies full control over their data and security measures.

Pros:

  • Complete Control: Organizations have full authority over their security systems, data management, and compliance with industry regulations.
  • Physical Control: Data remains within the company’s physical location, which can enhance security measures and reduce the risk of data breaches from external sources.
  • Customization: Systems can be customized to meet specific security requirements and integrate seamlessly with existing on-premise infrastructure.

Cons:

  • High Initial Costs: Requires significant capital investment in physical servers, cooling systems, and other infrastructure.
  • Maintenance and Upgrades: Responsibility for maintenance, upgrades, and security falls on the organization, requiring dedicated IT staff and additional resources.
  • Limited Scalability: Scaling up requires additional hardware and can be slower and cumbersome than cloud solutions.

Here’s A Quick Look

Feature

Cloud-based Security

On-premise Security

Initial Setup Cost

Lower upfront costs as infrastructure is hosted by the provider.

Higher upfront costs for purchasing and installing hardware and software.

Operational Expense

Ongoing subscription fees; costs spread over time.

Higher initial investment but lower ongoing operational costs.

Scalability

Easily scalable to meet growing needs without physical hardware updates.

Scaling requires additional hardware and can be time-consuming and costly.

Maintenance and Updates

Handled by the service provider, ensuring systems are always up-to-date.

Requires internal resources for maintenance and updates, potentially leading to delays.

Data Control

Data is stored off-site, requiring trust in the provider’s security measures.

Complete control over data storage and security, but requires robust internal security policies.

Access and Availability

Accessible from anywhere with an internet connection, enhancing flexibility.

Access typically limited to the on-site network unless specific remote solutions are implemented

Factors To Consider:

Infrastructure

On-premise solutions require significant local server and storage infrastructure, making them ideal for organizations with established data centers that can securely handle sensitive data.

In contrast, cloud solutions leverage the cloud infrastructure provided by vendors, reducing the need for physical storage but necessitating a reliable internet connection to access cloud data and services. This decision often depends on the capacity to effectively manage and protect the infrastructure.

Maintenance

Maintenance demands for on-premise vs. cloud security solutions differ substantially. On-premise systems require ongoing maintenance by in-house IT staff to protect the data center, perform regular backups, and update software and hardware. It can be costly and labor-intensive but offers greater control.

Cloud-based services, however, shift the burden of maintenance to the cloud provider. It includes automatic updates and disaster recovery options, reducing the workload on local IT staff and minimizing the direct control organizations have over their maintenance processes.

Compliance

Compliance with industry regulations is critical in deciding between on-premise and cloud solutions. On-premise security solutions often allow organizations to tailor their security measures and data management practices to meet specific regulatory requirements, offering a significant advantage in industries with stringent data protection standards.

While offering robust security controls and compliance with general standards, cloud services may not be suitable for all regulatory environments, particularly where the physical location and data handling are concerned. Companies must assess whether cloud or on-premise solutions align with their compliance needs and security posture.

Connectivity

Connectivity is essential when deploying any security solution. Cloud solutions typically require a strong, consistent internet connection to access data and security controls, making them dependent on the quality of the internet service. It can be a drawback in areas with unreliable connectivity.

On-premise solutions, on the other hand, often rely on internal networks, reducing dependence on external internet services and enhancing control over access management. However, this can limit the ability to remotely manage security unless solutions to incorporate automatic rerouting and other connectivity enhancements are implemented.

Storage

The choice between cloud and on-premise solutions also affects how and where data is stored. Cloud storage offers virtually unlimited capacity and scalability, which can be a significant advantage for organizations dealing with large volumes of data or those requiring the flexibility to scale quickly.

On-premise solutions provide more control over the physical storage infrastructure, which can be crucial for meeting certain regulatory compliance standards or handling highly sensitive data. However, expanding storage capacity on-premise can be costly and requires physical space and additional hardware.

Reliability

Reliability is crucial in maintaining continuous operations, especially with security systems.

On-premise systems allow for direct control over the entire infrastructure, which is more reliable in managing and foreseeing potential failures within the data center. However, these systems are susceptible to physical damage and local disruptions.

While potentially more vulnerable to internet outages, cloud solutions often offer enhanced reliability through redundant systems and data centers in various geographies, ensuring that data remains accessible and protected against single points of failure.

Security Monitoring

Effective security monitoring is vital for identifying and responding to threats in real-time. Cloud-based security solutions often come with advanced security monitoring tools that the cloud provider constantly updates to handle the latest threats. It allows security professionals to focus on strategic security planning rather than the day-to-day updates of security systems.

On-premise solutions, while offering more control over the monitoring process, require significant investment in developing and maintaining these systems.

The organization’s ability to keep pace with rapidly evolving security threats can be challenged unless ongoing updates and training are part of the operational plan.

FAQs

What is the biggest risk with cloud security?

The biggest risk associated with cloud computing is data security. Since data is stored remotely, it often traverses the internet and is managed by third parties, increasing the exposure to potential breaches. Despite robust cloud security controls, the external handling of sensitive data can raise concerns about vulnerability to cyber threats.

Is the cloud more secure than on-premises?

Cloud security has advanced significantly, often offering stronger defenses than traditional on-premises solutions due to the scale and resources of cloud providers. However, the security level can depend on specific use cases and the security measures implemented. On-premises solutions provide physical control over data, which can be crucial for certain regulatory or sensitive environments.

How do you compare cloud and on-premises computing?

Comparing cloud and on-premises computing involves evaluating key differences in cost, control, flexibility, and security. Cloud solutions typically offer greater scalability and cost-efficiency but lack the direct control and customization that on-premises infrastructure provides. On-premises computing requires substantial upfront investment and ongoing maintenance but offers enhanced control over security, making it suitable for organizations with strict data security parameters.

Key Takeaways

Choosing between cloud and on-premises security solutions depends on specific business needs, security requirements, and operational preferences. Cloud computing offers scalability and advanced security managed by specialists, making it ideal for businesses that need flexibility and state-of-the-art protection.

On-premises solutions, while potentially more costly and complex to manage, provide complete control over data and systems, which can be critical for certain regulatory environments.

If you’re evaluating the best path for your organization’s security strategy and need expert advice, contact us today for a free consultation. Our security professionals are ready to assist you in making an informed decision that aligns with your security posture and business objectives.

Friday, March 1, 2024

Cyber Scams on the Rise in India

Unmasking the Surge: Cyber Scams on the Rise in India 

Cybercrime refers to criminal activities that are carried out using computers, computer networks, or the internet as tools or target.  Thеsе illegal activities can take various forms and can encompass a wide range of actions,  from financial fraud and data theft to online harassment and cybеr espionage.

Alarming reports suggest a surge in cyberattacks in India during the first three months of 2023, with over 500 million attacks thwarted out of a billion global attempts, as per the 'State of Application Security Report'.

Almost half the complaints, 1.56 million, were registered in 2023. Since 2019, more than 66,000 FIRs have been filed across states and Union territories based on these complaints.

Cyber scams have witnessed a significant rise in India, with multiple factors contributing to this concerning trend. Let's delve into a detailed analysis of the reasons behind the increasing prevalence of cyber scams in the country:

1. Rapid Digitalization: 

India is experiencing a massive digital transformation, with a growing number of people embracing online platforms for various activities like banking, shopping, and communication. This increased digitalization has provided cybercriminals with a larger pool of potential targets and opportunities to exploit vulnerabilities in the digital ecosystem.

2. Rising Internet Penetration: 

The widespread availability of affordable smartphones and internet connectivity has led to a surge in the number of internet users in India. As the internet user base expands, so does the potential victim pool for cyber scammers.

3. Lack of Cyber Awareness: 

A significant portion of the Indian population, particularly in rural areas and older age groups, may not have adequate knowledge of cybersecurity best practices. This lack of awareness makes them more susceptible to falling prey to various cyber scams, such as phishing emails, fake websites, and lottery frauds.

4. Sophistication of Cybercriminals: 

Cybercriminals have become increasingly sophisticated in their techniques and tools, making it challenging for individuals and organizations to detect and protect against their attacks. Advanced phishing emails, malware, and social engineering tactics are some of the methods employed by cyber scammers to exploit their victims.

5. Inadequate Cybersecurity Infrastructure: 

Despite the increasing cyber threats, many organizations and individuals in India still lack robust cybersecurity infrastructure and practices. This inadequacy leaves them vulnerable to cyber attacks, data breaches, and financial losses.

6. Lack of Stringent Regulations: 

The absence of stringent cybersecurity regulations and penalties for cybercrime in India can be perceived as an opportunity by cyber scammers. The absence of severe consequences for perpetrators may embolden them to continue their illicit activities.

7. Increasing Online Transactions: 

The rise of e-commerce and digital payment platforms has led to a surge in online transactions. This digital financial ecosystem attracts cyber scammers who seek to exploit security loopholes and trick users into divulging sensitive financial information.

8, Insider Threats: 

Insider threats, where current or former employees with access to sensitive data engage in fraudulent activities, can pose significant risks to businesses and individuals alike.

9. Global Nature of Cybercrime: 

Many cyber scams originate from outside India, taking advantage of the borderless nature of the internet. These international cyber threats may pose jurisdictional challenges for law enforcement agencies and hinder effective prosecution.

Root Cause to this: -

The rapid digitalization, rising internet penetration, lack of cyber awareness, and the increasing sophistication of cybercriminals are some of the key reasons behind the rise of cyber scams in India.

To combat this growing menace, there is an urgent need for enhanced cybersecurity awareness, investment in robust security measures, and the formulation of stringent cybersecurity regulations.

Additionally, continuous education and training in cybersecurity best practices for individuals and organizations can play a vital role in thwarting cyber scammers and creating a safer digital environment for all. Do not install non-NDAA approved IP Camera, NVR etc. Do not use China Based origin brand IP camera NVR etc.

Here are other takeaways for 2023:

  • Imposter scams. Imposter scams remained the top fraud category, with reported losses of $2.7 billion. ...
  • Investment scams. While investment-related scams were the fourth most-reported fraud category, losses in this category grew. ...
  • Social media scams. ...
  • Payment methods. ...
  • Losses by age.

Cybercrime Laws In India

1.   Information Tеchnology Act, 2000 (IT Act): Thе Information Tеchnology Act,  2000,  is thе primary legislation that dеals with cybеrcrimеs in India.  It was amеndеd in 2008 to kееp up with еvolving tеchnology and cybеr thrеats.  Kеy provisions of thе IT Act includе:

2.   Sеction 43: This sеction dеals with unauthorizеd accеss to computеr systеms and data. It providеs for pеnaltiеs for unauthorizеd accеss,  downloading,  or introduction of computеr virusеs.

3.   Sеction 65: This sеction dеals with tampеring with computеr sourcе documеnts, and it imposеs pеnaltiеs for altеring,  damaging,  or dеlеting data with thе intеnt to causе damagе or harm.

4.   Sеction 66: This sеction addrеssеs computеr-rеlatеd offеnsеs, such as hacking,  and prеscribеs pеnaltiеs for unauthorizеd accеss to computеr systеms,  nеtworks,  or data.

5.   Sеction 66A (Rеpеalеd): Sеction 66A was controvеrsial and was struck down by thе Suprеmе Court of India in 2015 bеcausе it was dееmеd to bе infringing on frее spееch rights.

6.   Sеction 66B: This sеction dеals with dishonеstly rеcеiving stolеn computеr rеsourcеs or communication dеvicеs.

7.   Sеction 66C: It pеrtains to idеntity thеft and thе usе of somеonе еlsе’s idеntity for fraudulеnt purposеs.

8.   Sеction 66D: This sеction dеals with chеating by pеrsonation using a computеr rеsourcе.

9.   Sеction 67: This sеction addrеssеs thе publication or transmission of obscеnе matеrial in еlеctronic form and imposеs pеnaltiеs.

10.Sеction 69: This sеction providеs thе govеrnmеnt with thе powеr to intеrcеpt and monitor еlеctronic communications for rеasons rеlatеd to national sеcurity.

11.Sеction 70: This sеction dеals with thе protеction of critical information infrastructurе and providеs for thе appointmеnt of a National Critical Information Infrastructurе Protеction Cеntrе (NCIIPC).

12.Sеction 72: It dеals with thе brеach of confidentiality and privacy and imposеs pеnaltiеs for disclosing pеrsonal information without consеnt.

13.Information Tеchnology (Amеndmеnt) Act, 2008: This amеndmеnt act еxpandеd thе scopе of thе IT Act and introducеd provisions rеlatеd to data protеction,  data brеachеs,  and increased pеnaltiеs for cybеrcrimеs.

Tracking WhatsApp messages or any other form of electronic communication without proper legal authorization is typically illegal and a violation of privacy.  However, undеr certain circumstances and with appropriate legal processes,  law enforcement agencies and cybеr cеlls may bе able to access WhatsApp messages as part of a criminal investigation. WhatsApp usеs еnd-to-end encryption, which means that messages arе scramblеd and can only bе decrypted by thе intended recipient.  WhatsApp itself does not have accеss to thе content of messages. To access WhatsApp messages for investigative purposes’, law enforcement agencies typically nееd to obtain proper lеgal authorization,  such as a court-issued warrant or a lawful court order.

Government of India has banned 17 Chinese companies from participating in tenders in India and warned private companies that do business with government entities against using these Chinese products. This is being seen as a significant crackdown on Chinese products that were entering the country after changing their brand names and tying up with Indian entities, ostensibly to hide their place of origin, and thus impacting the strategic and security interests of India while benefiting the Chinese economy.

The companies that have been banned include Xp-pen, Highvision Hikvision, Lenovo, Dahua, Lava, Ottomate, Xolo, Airpro, Grandstream, Wi-Tek, Realtime, Maxhub, Nokia, Domino, Reputer and Tyco.

The Sunday Guardian, last year, had revealed about Chinese products being used in government public sector undertakings that are working in the strategic sectors (Indian PSUs continue reliance on Chinese equipment in strategic sectors, 26 February 2023).

As per the government order released on the last day of January, the Indian sellers of these Chinese brands and the catalogs uploaded by them have been removed from Government e Marketplace (GeM) and they are not eligible for participating in any bid on GeM. The order has also said GeM will cancel those orders where the products of these Chinese companies are found to be used for the bid.

Seventy products, the maximum on the list, that have been banned belong to Hangzhou Hikvision Digital Technology Co., Ltd., often shortened to Hikvision. Its Indian face is Prama Hikvision (India) Pvt. Ltd. It is one of the biggest suppliers to Indian government agencies.

Similarly, DNS overseas, which handles products brought from the Beijing-based Hanvon Ugee Group and is a big player in the tablet market in India, has been removed from the GeM portal.

Twenty two products made by Lenovo, including servers, have been banned. Not many are aware that Lenovo is of Chinese origin.

Lenovo, founded in 1984, is seen as a product of the Chinese Academy of Sciences (CAS)—the Chinese-government’s premier institution of scientific research. CAS is reported to have extensive ties to the Chinese military.

Five products of Zhejiang Dahua Technology Company Limited, a publicly traded company based in Binjiang District, Hangzhou, which manufactures video surveillance equipment and sells its products in India under the brand name “Dahua” also features on the banned list.

Nineteen products of Lava International, whose brand ambassador is actor Kartik Aaryan, and has used cricketer Mahendra Singh Dhoni in the past, too have been banned. Also put on the banned list are products made under the brand name “Ottomate”, which is also a part of the Lava group. The products that have been banned include smart phones, fans and tablets. While Lava is seen as an Indian company, its products are made in China and then sold in India under a new brand name.

Thirteen products of Airpro have been put on the banned list including routers and cameras.

Five products of Grandstream and W-Tek that are sold in India by Cohesive Technologies have been removed from the portal.

Thirty one products made by “Realtime” and sold by Realtime Biometrics India Private Limited companies that include boom barriers, biometric access system, CCTVs have been banned.

The government has also come down heavily on the Chinese entity, Maxhub that sells its products through Shiyuan India Private Limited. A total of 18 of its products have been banned.

Six products sold by Hmd Mobile India Private Limited that are made by Nokia have been banned. According to industry insiders, the banned products are being manufactured in China. The brand had launched a media blitzkrieg a few years ago to convince Indian nationals that it was not making its products in China.

Seven products made by Tyco and marketed in India by Tyco Safety Products (India) Private Limited, two of Domino sold in India by Domino Printech India Llp and one of Reputer sold domestically by Innovitiq have been banned.

However, what has piqued industry insiders and security watchers is that many entities with notable Chinese investments and control that are active in India have not been added to this list.

These include products made by Huawei, Alcatel Lucent—a French company now owned by Chinese promoters, TvT, Tiandy Technologies and Uniview. All these companies have a significant presence in India and have been dealing with government agencies for a long time now.

On 6 August 2020, a Registration Committee under Department of Expenditure Order was constituted under the chairpersonship of Manmeet Kaur Nanda, a 2000 cadre IAS officer, who was then Joint Secretary, Department for Promotion of Industry and Internal Trade, to consider applications received for registration of bidders from countries that share land border with India for participation in public procurement.

It is this committee that keeps an eye on the products from the identified countries and evaluates the risk, if any, that is poised by them. In November 2023, Nanda moved as Joint Secretary to the Cabinet Secretariat. Sources in Government of India said that this is not an exhaustive list and more companies will be added on the list as per inputs that the concerned officials will receive.