Marketing vs. reality

August 2015 News & Events

The security industry has really got its work cut out for it. In South Africa, most of us are more focused on the physical security side of things due to the country’s extreme levels of crime and the perception among syndicates that it is a safe haven – not necessarily an incorrect perception.

It’s therefore not surprising that some of our local security manufacturers are thriving, not only on South African soil, but also internationally. It’s a given that if a product makes the grade here, it will easily meet the needs of other countries, in terms of reliability, usability and durability. (Read more about our local manufacturers in the September issue.)

However, while local and international physical security companies are putting their best foot forward and promising the world, there seems to be a bit of a disconnect with the real world. We often hear how some big brands just don’t perform as expected, or more often don’t integrate as expected, creating havoc as an integrator tries to resolve basic problems in a multi-million rand deal.

Maybe the cause is a lack of testing and poor pilot projects that should put products through their paces. I saw an example of this at a recent thermal camera shootout, which Hi-Tech Security Solutions will report on in the September issue. Perhaps we assume that because company A has a product that performs in a certain way, that when company B launches the same product it will deliver the same performance. Therefore, we buy the cheaper product from B only to realise too late that B’s product is the poor cousin of A’s product.

This is why it is so important to select the right partners for the job and to do your own homework. It’s worth running pilot projects and well designed shootouts to determine exactly what you are getting. If you’re paying for performance, proving that performance is a small investment in the success of the whole project.

Sadly, the cyber security market is in a similar space. South Africans are more focused on who’s at the door than who’s in the network. This leads to rash buying decisions influenced by marketing hype and biased advice from sales people.

An example of this is the hype around BYOD (bring your own device). There are many companies offering solutions to help corporations stay safe from attacks and malware from mobile devices that employees use and are connected to the corporate network. This is an area any company should be aware of and should secure.

However, in the Verizon 2015 Data Breach Investigations Report (DBiR), a report that collates data of breaches over the past year from 70 different companies and organisations across 61 countries (including South Africa), analysing over 79 790 security incidents, the mobile threat is seen as minimal. Only 0.03% of the mobiles carried what the report terms 'higher-grade malicious code'. The rest was malware aimed at collecting user data and blasting adverts at the poor user, not breaching corporate data stores. (Sadly, well over 90% of mobile malware is targeted at Android, 96% according to FireEye.)

Another interesting snippet from the DBiR is that between 70% and 90% of malware samples are unique to a single organisation. This is due to the more organised nature of cyber crime, which sees the crooks slightly altering the code of a common piece of malware so that its signature is not picked up by your traditional antivirus scans. The malware does the same function, but it’s harder to detect by traditional means. All this makes one wonder how effective your antivirus product really is if all it does is look for known signatures*.

So when a disaster happens, the MD ends up wondering what he spent so much money on; similar to the physical security trauma of finding out your awesome million rand surveillance installation captures high resolution shots of ladies’ hairdos and men’s bald spots and not much else.

* Do not uninstall your antivirus product; they still do an important job. And if you don’t use an antivirus solution, now’s a good time to start. And yes, I know how wonderfully, fantastically and spectacularly brilliant and virus free Apple’s desktop OS supposedly is, but get one anyway.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
Linear heat detection (LHD) from Technoswitch
Technews Publishing Technoswitch Fire Detection & Suppression Products & Solutions Fire & Safety
SecuriHeat LHD by Securiton prevails where conventional fire detectors reach their physical limits. It copes well with extreme temperatures and constantly high atmospheric humidity, while precise measurements are also possible when corrosive gases and contaminated air are present.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...