phone number

Archive for the ‘Articles ’ Category

Gallagher Team Takes Top Engineering Award

Posted on: December 1st, 2014 by webprese



Gallagher has added another esteemed award to its growing list of accolades after the company won at The New Zealand Engineering Excellence Awards held in Auckland on Friday 28 November.  The award for New Zealand Engineering Innovators of the Year was presented to a Gallagher product development team responsible for designing two world-leading perimeter security technology devices: the K20 Tensioner Link System, and Z10 Tension Sensor.

Senior Product Manager, Craig Malins, said the team were thrilled at winning the award.  “There were many people at Gallagher involved in this project along the way.  We’re honoured to have been selected alongside some of New Zealand’s top engineers, as winners of such a prestigious award” said Malins.

Gallagher has been collecting a number of honours across the world for its strength in the design and manufacture of security products.  This latest award recognises a commitment to innovation and excellence in engineering by an individual or a team.

“We’re very proud of our people” said Gallagher Group CEO, Sir William Gallagher.  “It’s wonderful to receive an award that recognises how brilliant and innovative our team is.”

The New Zealand Engineering Excellence Awards are run by the Institution of Professional Engineers New Zealand (IPENZ) and celebrate the finest engineering work undertaken by companies throughout the country. Gallagher’s winning team comprised four core members of the wider Gallagher product development team: Senior Product Manager, Craig Malins; Technical Engineer, Paul Reid; Senior Electronics Engineer, Keith Gallagher; and Technical Leader, Andrew Bealing.

The post Gallagher Team Takes Top Engineering Award appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


Drugs worth $1.5 billion seized by Joint Organised Crime Group

Posted on: December 1st, 2014 by webprese


Six men have been charged by the Joint Organised Crime Group (JOCG) for their involvement in the attempted importation of almost three tonnes of MDMA and crystal methamphetamine (ice) into Sydney.

This seizure is estimated to be worth up to $1.5 billion on the street.

The illicit drugs were intercepted by the Australian Customs and Border Protection Service officers at the NSW Container Examination Facility and were hidden in a mixed container load of furniture and unmarked boxes.

Police will allege the consignment with an estimated weight of almost 2 tonnes of MDMA and more than 800kgs of methamphetamine was shipped to Australia from Germany and arrived into Australia on 19 November.

Police conducted a controlled delivery of the consignment to an address in Blacktown where its contents were removed and transported to another location.

The six men were arrested in the early hours of this morning when they were found accessing the boxes from the consignment at an address in Smithfield.

The men are all Australian residents and range in ages from 23 to 34.

AFP Commissioner Andrew Colvin said agencies are working together harder than ever to stop drugs from entering our country.

“Working together as a part of the Joint Organised Crime Group, this seizure represents the second largest in Australian history and is worth up to $1.5 billion,” Commissioner Colvin said.

“This seizure represents another success for law enforcement in halting illicit drugs bound for Australia.”

“This seizure represents the second largest seizure in Australian history, which proves law enforcement agencies are working harder than ever to keep drugs out of our community.”

New South Wales Police Commissioner Andrew Scipione said the significance of today’s seizure cannot and should not ever be underestimated.

“Today the NSW Police Force’s Organised Crime Squad, with its partner agencies, has taken billions of dollars-worth of illicit drugs off the streets just before the start of the summer party season,” Commissioner Scipione said.

This highlights just how effective joint agency operations are at targeting and disrupting these criminal enterprises coming into the country.

“These illicit drugs are hideous poisons that ruin not only people’s lives but they destroy families, entire communities and have the potential of destroying a whole generation.

“Today we have successfully taken an enormous and unprecedented portion off the streets of New South Wales and the effects of this great seizure will be seen far and wide across the Australian community,” Commissioner Scipione said.

ACBPS Chief Executive Officer Roman Quaedvlieg said that a seizure of this quantity reinforces our belief that amphetamine type substances are a growing threat to the Australian community.

“The importation of these substances into the community is being orchestrated by serious and organised crime groups, and stopping this is one of the services’ key operational priorities,” Mr Quaedvlieg said.

“The detection of this consignment shows the critical role that Customs and Border Protection plays in operations like this.”

“This seizure is also testimony to the dedication and persistence of our officers.”

Australian Crime Commission CEO Chris Dawson said the results reflect outstanding collaboration between law enforcement agencies, but said the job is not finished.

“The hard work starts now, we need to continue to apply pressure on criminals who import illicit drugs and capitalise on this significant blow to their industry,” Mr Dawson said.

The men have all been charged with attempting to possess a commercial quantity of a border controlled drug and will face the Parramatta District Court today.

These charges attract a possible penalty of life imprisonment and investigations into this matter remain ongoing.

The JOCG is a multiagency investigation group comprising the Australian Federal Police, the NSW Police Force, Australian Customs and Border Protection Service, NSW Crime Commission and the Australian Crime Commission.

The post Drugs worth $1.5 billion seized by Joint Organised Crime Group appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


The Enemy within – Securing the business against the internal threat

Posted on: November 27th, 2014 by webprese


The news archives are littered with stories of organisations betrayed by trusted colleagues, including the most innocuous-looking workers. The trust that organisations place in their workforce can leave them vulnerable to malicious employees, who often use clever methods to hide their illicit activities. Attacks from the inside carry the potential for significant damage that can rival or even exceed the damage caused by external forces. Internal attacks that continue undetected can cause serious harm to an organisation. Perhaps most significantly, they can expose the personal information of customers or employees. A breach of this kind — whether it is identity theft, inappropriate use of data or the sale of sensitive information — can leave an organisation legally liable for associated damages and subject to regulatory fines. In addition, a company’s competitive position could suffer if an insider uses intellectual property or trade secrets for unauthorised purposes.

Insider threats in particular present a unique problem for a physical protection system. Insiders could take advantage of their access rights, complemented by their authority and knowledge of a facility, to bypass dedicated physical protection elements or other provisions such as measures for safety, material control and accountancy, and operating measures and procedures. Further, as personnel with access in positions of trust, insiders are capable of carrying out ‘defeat’ methods not available to outsiders due to protective measures such as intruder detection and and access controls. Insiders have more opportunities to select the most vulnerable target and the best time to execute a malicious act.

Therefore, securing the business against the insider threat requires firstly an assessment to understand what those threats might be. Insiders may have different motivations and may be passive or active, non-violent or violent. The term ‘motivation’ is used to describe the motive forces that compel an adversary to perform or attempt to perform a malicious act. Motivation may include ideological, personal, financial and psychological factors and other forces such as coercion. Insiders could act independently or in collusion with others. They could become malicious on a single impulse, or act in
a premeditated and well prepared manner, depending upon their motivation.

Anybody can pose a threat

Insiders may hold any position in an organisation from security guards through to maintenance staff or even senior management. Others not directly employed by the operator but who also have access such as vendors, emergency personnel, including firefighters and first responders, contractors, subcontractors and inspectors from regulatory organisations should also be considered. It is vital that organisations understand normal employee baseline behaviours and also ensure employees understand how they may be used as a conduit for others to obtain information.

Thus, one of the first steps must involve policy making — the definition of parameters for acceptable behaviour within a peer group. These parameters will serve as the baseline for comparative analysis, so it is important to establish user profiles based on historical data or concrete experience — not just business expectations that may or may not be realistic. Building a baseline understanding of the personalities and behavioural norms of those previously defined as ‘insiders’ will make detecting deviations in these norms easier. Some general behavioural characteristics of insiders at risk of becoming a threat include:

  • Greed/ financial need
  • Vulnerability to blackmail
  • Compulsive and destructive behaviour
  • Rebellious, passive aggressive
  • Intolerance of criticism
  • Self-perceived value exceeds performance
  • Lack of empathy
  • Predisposition towards law enforcement

Obviously, these characteristics alone do not mean that your organisation is at threat, and nor is it an exhaustive list, but it is important to realise that individuals that exhibit these characteristics may reach a point at which they carry out malicious activity. One of the best prevention measures is to train employees to recognise and report behavioural indicators exhibited by peers or business partners.

Who should have access?

Another common-sense recommendation for preventing security breaches is to restrict privileged access to as few people as possible and keep watch over those who do. Insiders may indeed have access to some or all areas of a facility, systems, equipment or tools, or possess intimate knowledge of the facility layout, transport arrangements and/or processes, physical protection, safety systems and other sensitive information. Too often, organisations give employees more access to systems and data than they really need to do their jobs. They also fail to monitor or disable accounts for third- party contractors when their work is done, or delete access privileges for ex-employees.

Integrated Security Systems

Most organisations will have at least some of the security elements needed to protect against malicious internal attacks: authentication systems, asset tracking software, device and Internet usage monitoring capabilities, to name a few. However, it is critical for these pieces to interact as seamlessly as possible. One of the difficulties in detecting insider attacks is the time it takes to analyse a vast amount of data coming from a wide array of devices, entry points and user accounts.

Through the integration of a wide range of security components, both physical and cyber, systems can communicate in real time, enabling a faster response before data can be used for illegitimate purposes — and potentially even predict and prevent malicious attacks. Administrators should be able to access a central console that compiles messages and events from systems that monitor everything from door alarms through to network devices and application usage. This removes much of the effort normally required when trying to manually review historical logs and searching for complex relationships across systems. Integration enables events to be correlated across the Enterprise, for example, providing the ability to identify if an employee remotely logs on to an application without having passed through physical access points, such as a badge reader or an onsite workstation, can immediately identify the behaviour as unusual and potentially harmful. Without this automatic, real-time correlation, the remote access may not be detected quickly enough. A delay of even …read more

Source: Australian Security Magazine


Fortinet Joins Equinix Cloud Exchange to Offer Large Organizations Fast and Flexible Access to the Most Advanced Solutions for Securing Critical Data

Posted on: November 27th, 2014 by webprese


Fortinet Logo

Fortinet, a world leader in high-performance network security, announced it has formed an alliance with  Equinix, Inc, joining the Equinix Cloud Exchange to provide enterprises and service providers the most mature, scalable and reliable security solutions across multiple cloud architectures. Fortinet’s industry-leading, high capacity firewall technologies deliver exceptional security functionality, throughput and ultra-low latency, enabling security, flexibility, scalability and manageability across customer datacenters, while leveraging the benefits of Software Defined Networking (SDN) and Network Function Virtualization (NFV).

The Equinix Cloud Exchange is an advanced interconnection solution that enables seamless, on-demand and direct access to multiple clouds and networks inside Equinix IBX data centers. By bringing together cloud service providers with enterprises and enabling them to establish private, high-performance connections, the Equinix Cloud Exchange gives cloud users direct access to the services they need to build sophisticated hybrid cloud solutions.

“As more and more enterprise customers incorporate cloud deployments into their overall infrastructure, there is a fundamental effect on how network security is designed and deployed,” said Chris Sharp, vice president of cloud innovation at Equinix. “As businesses move more and more sensitive data to cloud infrastructures, the addition of Fortinet’s proven, carrier-class solutions to our Cloud Exchange will enable large global customers to deploy a robust virtualised security infrastructure without compromising performance.”

Fortinet’s Approach to Software Defined Networking
Software Defined Networking (SDN) is an approach in which control is decoupled from hardware and given to a software application called a controller. SDN enables rapid changes in switching and routing policies independent of physical architecture, which can cause security policies to become easily outdated and lead to gaps in protection. Virtualised Fortinet appliances are well suited to SDN/NFV orchestration for enabling and protecting SDN environments. Fortinet products support the routing protocols and VPN technology necessary for administrators to implement new infrastructures while maintaining proper security policies. Virtualised FortiGate devices support dynamic routing protocols in both IPv4 and IPv6 (such as BGP and OSPF), allowing administrators to define new network routes as necessary. Built-in IPsec and SSL VPN technologies allow customers to protect new connections to data centers, as well as encrypt and secure communication between systems and end-users.

“Our FortiPrivate Cloud and FortiGate and cloud/SaaS management solutions offer the unique ability to integrate seamlessly into the Equinix Cloud Exchange. Combined, they offer a significant opportunity for customers to pick cloud services best suited for their respective applications, workloads and business needs,” said Matthew Pley, vice president, carriers and service providers, for Fortinet. “Security is top of mind for anyone moving to more efficient — yet more complex — cloud environments. We are excited to offer Equinix Cloud Exchange customers the peace of mind in knowing in that their critical assets are continually being protected, regardless of their cloud environments.”

The post Fortinet Joins Equinix Cloud Exchange to Offer Large Organizations Fast and Flexible Access to the Most Advanced Solutions for Securing Critical Data appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


2014 Crime Prevention Award winners announced

Posted on: November 27th, 2014 by webprese


ACAVP Awards

The Australian Crime and Violence Prevention Awards (ACVPA) are now in their 21st year and they play a vital role in highlighting effective, community-based initiatives to prevent crime or violence before it is committed.

When crime prevention works well, it reduces the social and economic costs to the community in responding to criminal acts.

The Coalition Government was elected on a platform to help make our streets and communities safer through tough and effective steps to assist fighting and preventing crime.

Since coming to Government we have fast-tracked new anti-gang squads to help state and territory authorities tackle criminal gangs, and their illegal trades including drug trafficking, drug manufacturing, extortion, prostitution and firearms trafficking.

We have a roadmap to tackle the growing threat of fraud—particularly identity crime—which was recently released.

We also have a $50 million Safer Streets program which is being used to support a range of community safety commitments to improve security on the ground in communities around Australia.

The ACVPA program continues its valuable service to Governments, by identifying practical projects to reduce crime in the community.

This year the ACVPA Awards recognise two national winners—from Queensland and South Australia, and 13 State winners, all with a diversity of approaches to prevent and mitigate crime and violence.

Today’s award winners are playing a key role in keeping our community engaged and our streets safer.

We know only safe communities can be strong and prosperous, and I congratulate them on their work in helping to achieve this.

The awards are sponsored by the heads of Australian Governments and the Law, Crime and Community Safety Council, and are managed by the Australian Institute of Criminology.

For a full list of national, state and territory winners visit the AIC website at

The post 2014 Crime Prevention Award winners announced appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


Omlis Computer Security Day 2014: Mobile payment security and tokenization

Posted on: November 27th, 2014 by webprese


Omlis Logo

In light of Computer Security Day on 30 November, it is important to recognize ways in which heightened security is necessary for mobile devices. With 6 out of the world’s total 7 billion people using mobile phones, and about one-third of cyber-attacks involving a mobile device, mobile security has gained the highest priority position. Security experts Omlis and Orion Software and Services claim that mobile payment encryption requires a unique, advanced approach for securing consumer data.

One out of every six smartphone users has been subject to a cyber-attack, according to a recent report from Experian. These users may or may not have realized that they’ve fallen for a phishing scam, had their personal data taken to use offline or had an account hijacked.

With Gartner forecasting that 448 million global users will use their mobile phones for transactions by 2016, a need for mobile phone security is imminent, with increased adoption rates indicating the urgent demand for mobile payment security.

“The quickly increasing demand for mobile banking has created a massive opportunity for cyber criminals, leaving consumer information and businesses vulnerable to attack,” said Simon Cairns, Director of Orion Software and Services, a leading cyber-security expert in the UK. “As adoption of mobile finance technologies escalates, security issues are coming to light. Omlis mobile payment encryption provides the first proven solution to mobile fraud, eliminating the risk of data breaches and ensuring unbreakable protection for mobile devices.”  

Omlis mobile payment security includes advanced security technology and is the first and only solution that powers mobile transactions using high-integrity development processes.

“This is the first mobile payment solution that utilises a high-integrity security model based on the same technology used for security-critical situations like air traffic control, nuclear defense, and avionics. The solution is proven with a C-by-C (correctness by construction) methodology which ensures that any payment will be protected against a huge range of potential attacks, and proves that the Omlis security solution will work over the long-term,” said Matt Banham, Chief Technology Officer of Omlis. “With the first solution designed specifically for mobile payment security, we decided to use a novel method of tokenization to provide the ultimate security for mobile payments.”

Tokenization enables payments on mobile phones through allowing secure transactions, and powers mobile payment technologies like ApplePay. Omlis uses a unique tokenization process to enable secure payments on mobile devices. In basic terms, tokenization is the secure process of encrypting credit card information by generating a ‘token’ that replaces a cardholders’ credit or debit card PAN (personal account number) within a digital transaction, providing enhanced fraud prevention for online and mobile payments. 

“Omlis offer a highly differentiated proposition to the market and their unique approach to ensuring the uncompromised safety of sensitive information is why they are a leading vision in their industry and our proud partners,” said Cairns.

Secure mobile payment solutions provider Omlis recently signed a strategic 5 year Distribution Agreement with the market-leading technology distributor Orion Software and Services. Based upon Orion’s in-depth cryptographic and security expertise, market awareness and credibility, the Omlis partnership delivers completely secure, trusted mobile payment encryption technology to financial institutions and payment service providers.

The post Omlis Computer Security Day 2014: Mobile payment security and tokenization appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


Seagate Appoints New Managing Director of Sales & Marketing for Asia

Posted on: November 27th, 2014 by webprese


Seagate Logo

Seagate has announced that it has appointed Rex Dong as the Managing Director of the sales and marketing organisation for Asia, excluding China and Japan. Dong will assume responsibility for sales, marketing and business development for Asia, in addition to his existing responsibilities as the Country Manager of Taiwan, Seagate Technology.

“We are pleased to announce Rex’s new appointment,” said BanSeng Teh, Senior Vice President of Global Sales, Seagate Technology. “His excellent leadership skills will enable him to organise and manage diverse teams across multiple countries to build a more successful business for Seagate in Asia. Moreover, Rex has exceptional experience in working with the OEM customers and business partners. Rex also has acute business acumen and the ability to identify new business opportunities. We are confident that with Rex at the helm, he will take Seagate’s business in Asia to a higher level.”

Dong was the former OEM manager for Seagate in Taiwan from 1992 to 2000, and he joined Seagate as the Country Manager of Taiwan, responsible for sales, marketing and the overall leadership of the Taiwan office in 2008.

Prior to this, Dong was the General Manager of Portwell, President and Senior Vice President of Ennoconn Corporation, an embedded solutions provider owned by Foxconn Technology. In addition to that, he held various management, sales and marketing positions at Mitac and Wiso Electronic in Taiwan.

Dong majored in Electronic Engineering at the Tamkang University, Taiwan and graduated from the eMBA of National Chengchi University, Taiwan.

The post Seagate Appoints New Managing Director of Sales & Marketing for Asia appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


Property Exchange Australia chooses Verizon to secure online property transactions

Posted on: November 26th, 2014 by webprese


Verizon Logo

Property Exchange Australia has chosen a Verizon smart credentials identity-authentication solution to secure its new national electronic-conveyancing system. The system eliminates the need for purchasers to manually complete multiple forms, and allows Land Registries, financial institutions and practitioners to transact online together and in real time. PEXA anticipates that the system, which slashes processing times, will enable Australian consumers to finalise their transactions much more quickly.

PEXA’s electronic-conveyancing system’s functionality will support new mortgages, mortgage discharges, transfers, settlements, caveats, notices and other administrative documents in one easy to use, intuitive, electronic platform. The fully managed Verizon solution will enable PEXA to establish end-user identities across multiple systems and applications, creating a fully integrated, auditable trail. In addition, it enables users to digitally sign documents through a smart card.

According to the Verizon 2014 Data Breach Report, two-thirds of all breaches can be attributed to lost/stolen user credentials (user name/password). Verizon smart credential services system is developed for enterprises looking to protect both physical and virtual assets. Using a Web-based portal, updates and changes can be made quickly and easily so that organisations have a view into who and how data is being accessed. This is especially helpful when managing lost credentials, new hires, departed employees and a change-over with partners and/or suppliers as well as suspicious network behaviour.

PEXA CEO Marcus Price said: “When you are transacting online, the last thing you want to worry about is the integrity of the system, especially with multiple parties involved. With PEXA, lawyers, conveyancers, and banks, can safely perform lodgments and financial settlements online.”

Verizon’s cloud-enabled solution is being delivered from the company’s highly secure Canberra data centre. The Verizon team has full responsibility for the installation, support, management and maintenance of the security solution, freeing PEXA’s own IT department to focus on strategic business needs.

Verizon Australia and New Zealand Managing Director, David Kim, said: “The challenge for all organisations today is how to communicate with customers, partners and stakeholders online as safely and securely as possible. Systems like PEXA’s are transformational, but they will only achieve their potential if all parties involved can be assured that every step of the process is secure. Verizon’s authentication solutions are critical in ensuring that only the right people are able to access the information they need.”

Verizon’s offers a full continuum of managed security solutions including advanced security analytics and intelligence; distributed denial of service defense; investigative response; governance, risk and compliance solutions; identity and access management solutions; and vulnerability management services – delivered in the cloud or on premises in more than 50 countries. For more information, visit

Verizon Communications Inc. (NYSE, Nasdaq: VZ), headquartered in New York, is a global leader in delivering broadband and other wireless and wireline communications services to consumer, business, government and wholesale customers. Verizon Wireless operates America’s most reliable wireless network, with more than 106 million retail connections nationwide. Verizon also provides converged communications, information and entertainment services over America’s most advanced fiber-optic network, and delivers integrated business solutions to customers in more than 150 countries. A Dow 30 company with more than $120 billion in 2013 revenues, Verizon employs a diverse workforce of 178,500. For more information, visit

The post Property Exchange Australia chooses Verizon to secure online property transactions appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


Retired RNZAF Air Vice-Marshall Graham Lintott to head Lockheed Martin New Zealand

Posted on: November 26th, 2014 by webprese


Lockheed Martin

Lockheed Martin has announced that retired Royal New Zealand Air Force (RNZAF) Air Vice-Marshal Graham Lintott was selected to serve as Managing Director of Strategy and Business Development for Lockheed Martin’s New Zealand operation, effective immediately.

In this role, Lintott will lead the growth of Lockheed Martin’s New Zealand business both domestically and for international export. He will support Raydon Gates, Chief Executive, Lockheed Martin Australia and New Zealand.

“Graham’s distinguished career and exemplary reputation as a leader made him the ideal candidate to fill such a critical role for Lockheed Martin New Zealand. The calibre of this appointment reinforces the importance of the New Zealand market to Lockheed Martin, and I am delighted that Graham is leading our organisation as we look for opportunities to widen the range of products and services we provide to our New Zealand customers and partners,” said Gates.

Lintott’s career with the Royal New Zealand Air Force spanned more than 40 years. He distinguished himself both as a pilot and a commander, achieving the rank of Air Vice-Marshal and appointed Chief of Air Force in 2006.

Prior to assuming his new role with Lockheed Martin New Zealand, Lintott served as New Zealand’s Defence Attaché to the United States of America. He was bestowed with the honour of Officer of the New Zealand Order of Merit in 2008.

Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 113,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. The Corporation’s net sales for 2013 were US$45.4 billion. Headquartered in Canberra, Lockheed Martin Australia is a wholly-owned subsidiary of Lockheed Martin Corporation. The company employs more than 900 people in Australia and New Zealand working on a wide range of major programmes spanning the aerospace, defence and civil sectors.

The post Retired RNZAF Air Vice-Marshall Graham Lintott to head Lockheed Martin New Zealand appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine


Southern Cross Protection: How Safe is Your Home? Household Crime in Australia

Posted on: November 25th, 2014 by webprese


Household Crime in Australia-Infographic

The post Southern Cross Protection: How Safe is Your Home? Household Crime in Australia appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Security Magazine