<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Tubesock, Inc.</title>
	<atom:link href="https://www.tubesock.net/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.tubesock.net/</link>
	<description>Protecting Clients From Doors to Data</description>
	<lastBuildDate>Tue, 27 Sep 2022 14:19:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.tubesock.net/wp-content/uploads/2023/02/favicon.png</url>
	<title>Tubesock, Inc.</title>
	<link>https://www.tubesock.net/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Barracuda Web Application Firewall named a Strong Performer by independent research firm</title>
		<link>https://www.tubesock.net/barracuda-web-application-firewall-named-a-strong-performer-by-independent-research-firm/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=barracuda-web-application-firewall-named-a-strong-performer-by-independent-research-firm</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 27 Sep 2022 14:19:49 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254844</guid>

					<description><![CDATA[<p>Barracuda Web Application Firewall (WAF) has been named a Strong Performer in “The Forrester Wave™: Web Application Firewalls, Q3 2022.”</p>
<p>The post <a href="https://www.tubesock.net/barracuda-web-application-firewall-named-a-strong-performer-by-independent-research-firm/">Barracuda Web Application Firewall named a Strong Performer by independent research firm</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We’re proud to share the news that Barracuda Web Application Firewall (WAF) has been named a Strong Performer in “<a href="https://www.barracuda.com/forrester-wave-web-application-firewalls-report-Q3-2022?utm_source=51625&amp;utm_medium=blog&amp;utm_campaign=blog">The Forrester Wave<img decoding="async" src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="&#x2122;" class="wp-smiley" style="height: 1em; max-height: 1em;" />: Web Application Firewalls, Q3 2022</a>.”</p>
<p>Forrester’s detailed analysis of products and services says WAF customers should look for providers that:</p>
<ul>
<li>Allow stakeholders to configure and manage the WAF as they see fit</li>
<li>Use threat intelligence to enhance analysis and automate protections</li>
<li>Easily integrate everywhere</li>
</ul>
<p><a href="https://www.barracuda.com/products/webapplicationfirewall?utm_source=51625&amp;utm_medium=blog&amp;utm_campaign=blog">Barracuda Web Application Firewall</a> (WAF) protects applications, APIs, and mobile app backends against a variety of attacks including the <a href="https://www.barracuda.com/glossary/owasp-top-10?utm_source=51625&amp;utm_medium=blog&amp;utm_campaign=blog">OWASP Top 10</a>, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. Barracuda WAF and <a href="https://www.barracuda.com/waf-as-a-service?utm_source=51625&amp;utm_medium=blog&amp;utm_campaign=blog">WAF-as-a-Service</a> are part of <a href="https://www.barracuda.com/cap?utm_source=51625&amp;utm_medium=blog&amp;utm_campaign=blog">Barracuda Cloud Application Protection (CAP)</a>, a platform that protects web applications wherever they reside – in the cloud, on premises, or hybrid.</p>
<h2>Intuitive protection</h2>
<p>According to Forrester, “Barracuda has the most granular and intuitive anti-data-leakage features that we saw, with a range of out-of-the-box datatypes, the ability to define custom data types, and settings for the number of initial or trailing characters to display. Reporting and rule creation features are strong, if not quite differentiating.” <sup>1</sup></p>
<p>We feel this reflects the strong investment we’ve made in solutions that provide customers with comprehensive, enterprise-grade application security that goes beyond traditional WAF protection.</p>
<p>“Barracuda offers customers the flexibility they need to stay secure, particularly as customers are dealing with a variety of complex dynamics, including protecting remote workers, while helping them stay productive,” <strong>said Tim Jefferson, SVP of Data, Network and Application Security, at Barracuda.</strong> “We believe the results of this report reinforce the trust our customers have in our WAF technology to meet their evolving application security needs.”</p>
<p>Get your complimentary copy of “<a href="https://www.barracuda.com/forrester-wave-web-application-firewalls-report-Q3-2022?utm_source=51625&amp;utm_medium=blog&amp;utm_campaign=blog">The Forrester Wave<img decoding="async" src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="&#x2122;" class="wp-smiley" style="height: 1em; max-height: 1em;" />: Web Application Firewalls, Q3 2022</a>.” right now.</p>
<h3><a href="https://www.barracuda.com/forrester-wave-web-application-firewalls-report-Q3-2022?utm_source=51625&amp;utm_medium=blog&amp;utm_campaign=blog">Get your copy of the report now</a></h3>
<p> </p>
<p><sup>1</sup> Forrester “The Forrester Wave<img decoding="async" src="https://s.w.org/images/core/emoji/14.0.0/72x72/2122.png" alt="&#x2122;" class="wp-smiley" style="height: 1em; max-height: 1em;" />: Web Application Firewalls, Q3 2022” by Sandy Carielli and Amy DeMartine, Lok Sze Sung, and Peggy Dostie, Published 27 September 2022.</p>
<p>The post <a href="https://www.tubesock.net/barracuda-web-application-firewall-named-a-strong-performer-by-independent-research-firm/">Barracuda Web Application Firewall named a Strong Performer by independent research firm</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
	</item>
		<item>
		<title>CISA to measure security progress</title>
		<link>https://www.tubesock.net/cisa-to-measure-security-progress/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cisa-to-measure-security-progress</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 26 Sep 2022 19:04:21 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254836</guid>

					<description><![CDATA[<p>How do we measure the effectiveness of cybersecurity efforts? The national security of the United States may depend on the answer.</p>
<p>The post <a href="https://www.tubesock.net/cisa-to-measure-security-progress/">CISA to measure security progress</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has committed to <a href="https://www.nextgov.com/cybersecurity/2022/09/cisa-plans-measure-effect-coming-standards-industrys-cybersecurity/377363/" target="_blank" rel="noopener">spending the next three years measuring the success of the government’s effort to protect both publicly and privately controlled critical infrastructure</a> from cyberattacks.</p>
<p><span id="more-51628"></span></p>
<p>CISA executive assistant director for cybersecurity Eric Goldstein told the Homeland Security Committee in the U.S. House of Representatives that precisely what the agency intends to measure will be shared next month.</p>
<p>Cybersecurity professionals, of course, have been trying to quantify the success of their efforts for decades with little to no success so there will undoubtedly be lots of interest in the CISA approach to one of the most vexing challenges in all of cybersecurity. As most cybersecurity professionals are all too aware, proving the value of cybersecurity is a challenge. Investments in cybersecurity are deemed worthwhile in the absence of a breach. In the event of a breach, however, the value of those investments is questioned no matter how many attacks have been thwarted.</p>
<p>Exactly how CISA plans to collect the data that would be required is also something of a mystery. Most of the critical infrastructure CISA is chartered to help protect is managed via public-private partnerships that are not always anxious to share information with perceived outsiders that might be obligated to publicly share that data.</p>
<p>In fact, the level of cybersecurity transparency that should be required is now a subject of an increasingly heated debate in Congress. Rep. Jim Langevin, D-R.I., has attached to the <a href="https://www.congress.gov/bill/117th-congress/house-bill/7900/text" target="_blank" rel="noopener">National Defense Authorization Act for 2023</a> a proposed 554 amendment that would require the Department of Homeland Security (DHS) to designate certain components of critical infrastructure as systemically important entities (SIEs). As such, operators of this infrastructure would be required to meet specific cybersecurity standards. The U.S. Chamber of Commerce along with 17 other industry associations sent a <a href="https://www.uschamber.com/assets/documents/220916_Coalition_SIEAmendmentH.R.7900NDAA_SASC-HSGAC.pdf?utm_campaign=wp_the_cybersecurity_202&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_cybersecurity202" target="_blank" rel="noopener">letter</a> to Senate leaders opposing the amendment.  Specifically, the letter claims the amendment would transform the relationship between CISA and operators of critical infrastructure from being a partnership to one where CISA is empowered to impose additional cybersecurity requirements on industry.</p>
<p>Regardless of the degree of oversight that CISA might be able to provide the devil is always going to be in the details measured. The simple truth is it may not be possible to measure the effectiveness of cybersecurity. In addition, there clearly needs to be more concern over how data might be shared with a federal agency that is required to make reports to Congress that are likely to be closely read by malicious actors around the world that have already shown a keen interest in compromising critical infrastructure. In all probability, whatever compromise is struck is not likely to satisfy anyone. The requirements agreed upon will not likely be stringent enough to be meaningful. All that might be accomplished is a lot of data that would otherwise be kept hidden is now being shared more widely.</p>
<p>As Ronald Reagan once note the most dangerous words in the English language are “I’m from the government and I’m here to help.” It’s not that government agencies intend to cause more harm than good, but the nature of the way federal agencies operate doesn’t always lead to the most optimal cybersecurity outcome possible.</p>
<p>The post <a href="https://www.tubesock.net/cisa-to-measure-security-progress/">CISA to measure security progress</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
	</item>
		<item>
		<title>Announcing the Winners of CStore Decisions’ 2022 Hot New Products Contest</title>
		<link>https://www.tubesock.net/announcing-the-winners-of-cstore-decisions-2022-hot-new-products-contest/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=announcing-the-winners-of-cstore-decisions-2022-hot-new-products-contest</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 23 Sep 2022 20:41:42 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254838</guid>

					<description><![CDATA[<p>Eagle Eye LPR (license plate recognition) won the CStore Decisions “2022 Hot New Product” Contest in the technology category. C-store Decisions is a leading publication for convenience store executives. Winners were determined based on key factors to success at convenience stores. In the convenience store industry, thousands of new products and services are launched each …<br />
 Announcing the Winners of CStore Decisions’ 2022 Hot New Products Contest Read More »<br />
The post Announcing the Winners of CStore Decisions’ 2022 Hot New Products Contest first appeared on Eagle Eye Networks.</p>
<p>The post <a href="https://www.tubesock.net/announcing-the-winners-of-cstore-decisions-2022-hot-new-products-contest/">Announcing the Winners of CStore Decisions’ 2022 Hot New Products Contest</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" width="320" height="202" src="https://www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" loading="lazy" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions.jpg 320w, https://www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions-300x189-1.jpg 300w" sizes="auto, (max-width: 320px) 100vw, 320px" title="" /></p>
<p><em>Eagle Eye LPR (license plate recognition) won the CStore Decisions “2022 Hot New Product” Contest in the technology category. C-store Decisions is a leading publication for convenience store executives. Winners were determined based on key factors to success at convenience stores.</em></p>
<hr class="wp-block-separator has-css-opacity" />
<p>In the convenience store industry, thousands of new products and services are launched each year. But how can retailers predict which of those new products will ultimately be successful with customers?</p>
<p>CStore Decisions’ 2022 Hot New Products Contest evaluated a number of new product launches and is awarding the products set for success at c-stores this year.</p>
<p>This year, CStore Decisions received more than 100 entries across dozens of categories. A panel of retailer experts judged this year’s entries. Winners were determined using a point system that looked at key factors to success including innovation, packaging and more. New products/services are defined as having launched in 2022.</p>
<h4>Technology</h4>
<p><strong>Gold: </strong>Eagle Eye Networks  — Eagle Eye LPR (License Plate Recognition)</p>
</p>
</p>
<div class="wp-container-1 wp-block-buttons">
<div class="wp-block-button"><a class="wp-block-button__link" href="https://cstoredecisions.com/2022/09/23/announcing-the-winners-of-cstore-decisions-2022-hot-new-products-contest/" target="_blank" rel="noreferrer noopener">Read the full article</a></div>
</div>
<h3>In the News</h3>
<p>By <strong><a href="https://cstoredecisions.com/author/emmy-boes/">Emily Boes</a> </strong><br /><em>Covered on these news sites. Click the image to read more.</em></p>
<figure class="wp-block-image size-full"><a href="https://cstoredecisions.com/2022/09/23/announcing-the-winners-of-cstore-decisions-2022-hot-new-products-contest/" target="_blank" rel="noreferrer noopener"><img decoding="async" loading="lazy" width="320" height="202" src="https://www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions.jpg" alt="" class="wp-image-147818" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions.jpg 320w, https://www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions-300x189-1.jpg 300w" sizes="auto, (max-width: 320px) 100vw, 320px" /></a></figure>
<p>The post <a href="https://www.een.com/blog/announcing-the-winners-of-cstore-decisions-2022-hot-new-products-contest/">Announcing the Winners of CStore Decisions’ 2022 Hot New Products Contest</a> first appeared on <a href="https://www.een.com">Eagle Eye Networks</a>.</p>
<p>The post <a href="https://www.tubesock.net/announcing-the-winners-of-cstore-decisions-2022-hot-new-products-contest/">Announcing the Winners of CStore Decisions’ 2022 Hot New Products Contest</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
		<media:thumbnail url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions.jpg" />
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions.jpg" medium="image" />
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/cstore-decisions.jpg" medium="image" />
	</item>
		<item>
		<title>5 things we learned at Secured.22</title>
		<link>https://www.tubesock.net/5-things-we-learned-at-secured-22/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-things-we-learned-at-secured-22</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 23 Sep 2022 19:22:15 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254833</guid>

					<description><![CDATA[<p>Looking back at some of our favorite Secured.22 sessions, here are a few takeaways that stuck with us.</p>
<p>The post <a href="https://www.tubesock.net/5-things-we-learned-at-secured-22/">5 things we learned at Secured.22</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://barracuda.events/secured.22/register/blog/">Secured.22</a>, Barracuda’s virtual customer conference, wrapped up on September 14, and a lot of interesting content was packed into this two-day event. With interactive content for a half day each day, the conference brought together informative sessions on the latest security threats from malicious bots to account takeover, network security, and more. We hope customers were able to gain a better understanding of industry trends, Barracuda’s latest research, and how Barracuda’s solutions can help address the challenges they’re facing.</p>
<p>Looking back at some of our favorite Secured.22 sessions, here are a few takeaways that stuck with us.</p>
<h2>1. Barracuda is constantly evolving to keep customers secure</h2>
<p>In his opening keynote, Chief Customer Officer Brian Babineau talked about Barracuda’s mission to protect and support our customers for life. He pointed out that following through on this mission requires evolution, both from a technical perspective to keep up with up with today’s dynamic threat environment, and from a customer success perspective to give customers more choices to meet their changing needs.</p>
<p>During Secured.22, Barracuda made <a href="https://www.barracuda.com/news/article/865">four exciting product announcements</a> across four product families, showcasing the different ways the teams are driving innovation and evolution across the company. New capabilities protect against persistent and evolving threats like <a href="https://blog.barracuda.com/rware" title="rware" target="_blank" rel="noopener">ransomware</a>, and help customers solve complex digital business transformation challenges in the areas of <a href="https://www.barracuda.com/news/article/861">Email Protection</a>, <a href="https://www.barracuda.com/news/article/863">Zero Trust Access</a>, <a href="https://www.barracuda.com/news/article/862">Managed XDR</a>, and <a href="https://www.barracuda.com/news/article/864">Data Protection</a>.</p>
<h2>2. To stop bots, you have to think like a bot</h2>
<p>In his session about the ways cybercriminals are using malicious bots to cause data breaches, Nitzan Miron, VP of Product Management for Application Security, broke down the different types of automated attacks, from distributed denial of service (DDOS) attacks to shopping cart fraud and more.</p>
<p>He pointed out that the main motivation in most of these attacks is to use bots for financial gain and explained that in order to stop bots, you have to think like a bot. Hearing his detailed explanation of the different ways to detect bot activity and tell it apart from human users provided interesting insight into the approach Barracuda takes to helping protect customers from these automated threats.</p>
<h2>3. Account takeover is an existential threat</h2>
<p>Mike Flouton, VP of Product management for Email Security, led a session on managing account takeover risk, referring to account takeover as an existential threat. He explained that at a time when attacks are getting more sophisticated and cybercriminals are getting better at avoiding your defenses, users are more distracted than ever, and more information is available online that cybercriminals can use to personalize attacks.</p>
<p>The combination is leading to a massive rise in account takeover attacks, and the persistent nature of the attacks are leading to prolonged data breaches. Mike emphasized that defense-in-depth or multilayered protection is the best approach to preventing these types of attacks.</p>
<h2>4. Identity is at the source of all successful breaches</h2>
<p>On day two of Secured.22, Sinan Eran, VP of Zero Trust at Barracuda, spoke about shifting to a Zero Trust, Secure Service Edge architecture and why it can be so impactful. He explained that identity is at the source of all successful breaches, but identity has expanded. It’s not just about the users anymore, but also devices and apps.</p>
<p>Sinan made a comparison that really helped illustrate the point in a relatable way. When you go through security at an airport, you first have to show your ID to prove who you are. You also have to show that you have a ticket to prove that you have authorization to be at that place at that time.</p>
<h2>5. Getting the basics right still matters</h2>
<p>In her <a href="https://blog.barracuda.com/2022/08/03/new-session-added-to-secured-22-customer-conference/">session about inspecting your Microsoft 365 tenant security</a>, Angelica Faber, Principal Cloud Solution Architect, Security at Microsoft talked about why getting tenant security right should be step zero. She shared a number of recent headlines about MFA fatigue, but she pointed to a statistic showing that 99% of cyberattacks could have been prevented with multifactor authentication.</p>
<p>Angelica encouraged customers to raise their baseline security and pointed to using security defaults as an easy way to increase your security if you don’t know where to start.</p>
<h3><a href="https://barracuda.events/secured.22/register/blog/">Watch Secured.22 sessions on demand</a></h3>
<p>The post <a href="https://www.tubesock.net/5-things-we-learned-at-secured-22/">5 things we learned at Secured.22</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
	</item>
		<item>
		<title>Intermittent encryption: The latest advance in the ransomware arms race</title>
		<link>https://www.tubesock.net/intermittent-encryption-the-latest-advance-in-the-ransomware-arms-race/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=intermittent-encryption-the-latest-advance-in-the-ransomware-arms-race</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 22 Sep 2022 19:58:37 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254831</guid>

					<description><![CDATA[<p>New research shows that cybercriminals are using intermittent encryption as a new way to get an advantage over their victims in ransomware attacks.</p>
<p>The post <a href="https://www.tubesock.net/intermittent-encryption-the-latest-advance-in-the-ransomware-arms-race/">Intermittent encryption: The latest advance in the ransomware arms race</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Network attackers and defenders have been facing off against each other for decades, in what has long been described as an “arms race” between the two. This description of their incremental efforts to gain technological advantage has got to be one of the oldest and well-used metaphors in the security lexicon by now. But it’s as relevant today as it was 15 years ago. If anything, the rate of innovation is actually accelerating.</p>
<p>That’s certainly a key takeaway from <a href="https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/">new research</a> on the “intermittent encryption” techniques currently being advertised to <a href="https://blog.barracuda.com/rware" title="rware" target="_blank" rel="noopener">ransomware</a> affiliates. But is it enough to give the bad guys a lasting advantage? As long as security vendors continue to innovate in protection, detection, and response, there’s no reason why it should.</p>
<h2>What is intermittent encryption?</h2>
<p>The new technique outlined in this research is designed to achieve two things:</p>
<ul>
<li><strong>Encrypt at speed,</strong> in order to scramble all of a victim organization’s files before they have a chance to detect and stop an attack</li>
<li><strong>Bypass current detection methods </strong>by reducing the intensity of file IO operations — that is, the similarity between a known version of a file unaffected by ransomware, and one suspected to have been modified and encrypted</li>
</ul>
<p>Intermittent encryption helps to achieve the former because files are only partially encrypted. Thus, the <a href="https://www.barracuda.com/glossary/ransomware?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">ransomware</a> still causes “irretrievable damage” but in an even shorter timeframe. LockFile variant was apparently one of the first to use this technique, encrypting every other 16 bytes of a file. <a href="https://www.splunk.com/en_us/form/an-empirically-comparative-analysis-of-ransomware-binaries.html">A study</a> of 10 discrete ransomware types earlier this year found that network defenders have on average just 43 minutes to mitigate attacks once encryption has begun.</p>
<p>Intermittent encryption helps to bypass detection because it disrupts the statistical analysis techniques used by many current security tools. These look for the intense file IO operations which partial encryption helps to minimize, making it harder to spot a modified file from one unaffected by ransomware.</p>
<p>The bad news is that these techniques have been detected in a growing number of variants, including: Qyick, Agenda, BlackCat (ALPHV), PLAY, and Black Basta. As it’s said to be relatively easily to implement, it could well become the norm among ransomware operators.</p>
<h2>Breaches keep coming</h2>
<p>Intermittent encryption isn’t the only example of technological innovation in ransomware. A recent <a href="https://www.infosecurity-magazine.com/news/ransomware-gang-hacks-voip-for/">report</a> revealed threat actors exploiting vulnerabilities in popular VoIP software to access a targeted corporate network. While vulnerability exploitation in ransomware is nothing new — in fact, it’s a top three initial access vector, along with phishing and RDP attacks — it is a sign that threat actors are increasingly prepared to scour the attack surface for any potential security gaps they can find.</p>
<p>Other examples include targeting of network-attached storage (NAS) devices such as those produced by Taiwanese manufacturer QNAP. Popular among SMBs and consumers, these NAS boxes were recently patched by the vendor, but customers didn’t follow suit quickly enough. <a href="https://www.infosecurity-magazine.com/news/researchers-674-surge-deadbolt/">Researchers detected</a> a recent 674% increase in devices infected by the Deadbolt ransomware as a result.</p>
<p>The ransomware threat will therefore continue to evolve in unexpected ways as threat actors look for new ways to deceive defenders and current security tooling. Most recently big-name organizations such as Texas-based <a href="https://www.theregister.com/2022/09/14/ransomware_medical_groups/">OakBend Medical Center</a>, <a href="https://www.itpro.co.uk/security/ransomware/369094/bell-canada-subsidiary-hit-by-hive-ransomware-attack">Bell Canada</a> and New York emergency responder <a href="https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/">Empress EMS</a>. The threat is also expanding increasingly into the nation state arena, with recent U.S. <a href="https://www.justice.gov/opa/pr/three-iranian-nationals-charged-engaging-computer-intrusions-and-ransomware-style-extortion">indictments of</a> and <a href="https://home.treasury.gov/news/press-releases/jy0941">sanctions on</a> Iranian actors thought to be linked to Tehran. Critically, these individuals are accused of carrying out not only geopolitical attacks on other nation states but also financially motivated raids on private businesses — ranging from accounting practices to regional utilities and housing providers.</p>
<h2>Getting back on the front foot</h2>
<p>It is the job of the security vendor community to continue monitoring these trends, anticipate where new threats may come from and update their products to neutralize any advantage attackers may gain. But their customers must also stay alert and be proactive in their security posture. That means layering up defenses to mitigate ransomware across those three key attack vectors. This will involve putting in place best practice security controls such as:</p>
<ul>
<li>Advanced <a href="https://www.barracuda.com/products/email-protection/phishing-protection?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">anti-phishing capabilities</a>, including AI-based detection</li>
<li>User <a href="https://www.barracuda.com/products/email-protection/security-awareness-training?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">education and awareness programs</a></li>
<li><a href="https://www.barracuda.com/waf-as-a-service?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">Web application firewalls (WAFs)</a> to shield data</li>
<li>An automated, risk-based patching program</li>
<li>Threat detection and response across multiple layers (<a href="https://barracudamsp.com/product-details/extended-detection-and-response-xdr/?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">XDR</a>)</li>
<li>Firewalls and other protection for <a href="https://www.barracuda.com/products/industrial-security?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">IoT and OT environments</a></li>
<li>Regular <a href="https://www.barracuda.com/products/backup?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">backups</a>, including one offline copy</li>
<li>Regularly tested <a href="https://www.barracuda.com/products/email-protection/incident-response?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">incident response</a> plans</li>
</ul>
<p>SMBs should also consider adopting a <a href="https://www.barracuda.com/products/cloudgen-access?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">Zero Trust approach</a> to security to help mitigate the impact of ransomware. Key components include least privilege policies, network segmentation, multi-factor authentication and continuous monitoring. The ransomware arms race may not be winnable. But there’s plenty that security bosses can do to minimize cyber risk across their organization.</p>
<h3><a href="https://www.barracuda.com/ransomware?utm_source=51613&amp;utm_medium=blog&amp;utm_campaign=blog">E-book: Ransomware protection can be as easy as 1-2-3</a></h3>
<p>The post <a href="https://www.tubesock.net/intermittent-encryption-the-latest-advance-in-the-ransomware-arms-race/">Intermittent encryption: The latest advance in the ransomware arms race</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
	</item>
		<item>
		<title>Our most remote customer: The Island of Saint Helena</title>
		<link>https://www.tubesock.net/our-most-remote-customer-the-island-of-saint-helena/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=our-most-remote-customer-the-island-of-saint-helena</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 21 Sep 2022 21:03:34 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254816</guid>

					<description><![CDATA[<p>If you really want to get away from it all, you could hardly do better than to head for the small volcanic island of Saint Helena.</p>
<p>The post <a href="https://www.tubesock.net/our-most-remote-customer-the-island-of-saint-helena/">Our most remote customer: The Island of Saint Helena</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignright wp-image-51611 size-thumbnail" src="https://www.tubesock.net/wp-content/uploads/2022/09/st-helena-government-150x150-1.png" alt="Saint Helena" width="150" height="150" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/st-helena-government-150x150-1.png 150w, https://www.tubesock.net/wp-content/uploads/2022/09/st-helena-government-300x300-1.png 300w, https://www.tubesock.net/wp-content/uploads/2022/09/st-helena-government-500x500-1.png 500w, https://www.tubesock.net/wp-content/uploads/2022/09/st-helena-government-80x80-1.png 80w, https://www.tubesock.net/wp-content/uploads/2022/09/st-helena-government.png 700w" sizes="(max-width: 150px) 100vw, 150px" />If you really want to get away from it all, you could hardly do better than to head for the small volcanic island of Saint Helena. It’s a British Overseas Territory, and it’s pretty much in the dead center of the south Atlantic Ocean, about 10 miles long and 5 miles wide. Its main historic claim to fame is that it is where Napoleon Bonaparte lived out his final days in exile.</p>
<p>Now, obviously the best way to prevent cyberthreats is to maintain an air gap between your systems and the outside world, and until the late 1990s, that’s pretty much what the government of Saint Helena did. In fact, uncontrolled use of USB drives from the mainland used to be the most concerning threat vector.</p>
<p>But progress is relentless, and today a 10Mbit link connects the Saint Helena government’s approximately 700 workers to the wider world — and to the cyberthreats that inhabit it.</p>
<p>“We’re faced with the same challenges other organizations face,” says Director of Technology Operations Jeremy Roberts, “such as inbound threats like data theft, <a href="https://www.barracuda.com/glossary/phishing?utm_source=51605&amp;utm_medium=blog&amp;utm_campaign=blog">phishing</a>, and <a href="https://www.barracuda.com/ransomware?utm_source=51605&amp;utm_medium=blog&amp;utm_campaign=blog">ransomware</a>. That’s why we’re glad to have worked with Barracuda over the past 15 years to ensure security.”</p>
<h2>Choosing Barracuda</h2>
<p><img decoding="async" loading="lazy" class="alignright size-medium wp-image-51608" src="https://www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-300x200-1.jpg" alt="St Helena IT team" width="300" height="200" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-300x200-1.jpg 300w, https://www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-1024x683-1.jpg 1024w, https://www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-768x512-1.jpg 768w, https://www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-1536x1024-1.jpg 1536w, https://www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-2048x1365-1.jpg 2048w, https://www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-272x182-1.jpg 272w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>When Roberts and his team first realized that they needed to implement additional security, they began doing research and turning to trusted associates. “One of my contacts in the telecommunications industry recommended Barracuda,” he says. “After looking into their products and capabilities, we came to the consensus that they would be a good fit for us.”</p>
<p>(Are we proud of the fact that even in the middle of the ocean there are people recommending Barracuda to each other? Yes. Yes, we are.)</p>
<p>“We’ve recently installed several <a href="https://www.barracuda.com/products/websecuritygateway?utm_source=51605&amp;utm_medium=blog&amp;utm_campaign=blog">Barracuda Web Security Gateway</a> appliances along with <a href="https://www.barracuda.com/products/cloudgenfirewall?utm_source=51605&amp;utm_medium=blog&amp;utm_campaign=blog">CloudGen Firewall</a> appliances, and we’ve found them to be reliable, robust, and efficient for our needs,” says Roberts.</p>
<p>“The Web Security Gateway not only protects us from web-borne threats,” he continues. “It also lets us regulate bandwidth usage, which is really important considering our limited data pipe. And even when the new subsea cable upgrades the island’s connectivity in a few months, it will still be an important consideration.”</p>
<p>“The CloudGen Firewall appliances were simply effortless to install and get up and running, thanks to Zero-Touch Deployment,” says Roberts. “And, of course, the very advanced security capabilities give us real peace of mind. We’ve not had any compromises since installing, and the products are user-friendly — there’s very little you have to do day-to-day to manage them. I don’t have any critical feedback about Barracuda.”</p>
<h2>Into the cloud era</h2>
<p>When the new high-bandwidth cable brings Saint Helena into the cloud era, they will face a new world of both opportunity and advanced threats, but Roberts is confident that Barracuda will continue to be their security partner.</p>
<p>“Over the past 15 years we’ve received excellent support care from Barracuda,” he says. “At this moment, I can’t foresee ourselves moving away from the brand.”</p>
<h3><a href="https://www.barracuda.com/netsec?utm_source=51605&amp;utm_medium=blog&amp;utm_campaign=blog">Protect and optimize your network with Barracuda Network Protection</a></h3>
<p>The post <a href="https://www.tubesock.net/our-most-remote-customer-the-island-of-saint-helena/">Our most remote customer: The Island of Saint Helena</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
		<media:thumbnail url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/st-helena-government-150x150-1.png" />
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/st-helena-government-150x150-1.png" medium="image">
			<media:title type="html">Saint Helena</media:title>
		</media:content>
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/DSC_0387-300x200-1.jpg" medium="image">
			<media:title type="html">St Helena IT team</media:title>
		</media:content>
	</item>
		<item>
		<title>Threat Spotlight webinar: Ransomware on the rise</title>
		<link>https://www.tubesock.net/threat-spotlight-webinar-ransomware-on-the-rise/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=threat-spotlight-webinar-ransomware-on-the-rise</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 20 Sep 2022 18:53:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254814</guid>

					<description><![CDATA[<p>Get an early look at a webinar with CTO Fleming Shi who will be discussing three real-world ransomware attacks that took place in the past year.</p>
<p>The post <a href="https://www.tubesock.net/threat-spotlight-webinar-ransomware-on-the-rise/">Threat Spotlight webinar: Ransomware on the rise</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://blog.barracuda.com/rware" title="rware" target="_blank" rel="noopener">Ransomware</a> continues to be a wildly popular way to attack organizations of all types and sizes and extort big money from them. In the first half of 2022, the <a href="https://blog.barracuda.com/2022/08/24/threat-spotlight-the-untold-stories-of-ransomware/">number of attacks detected spiked to an eye-popping 1.2 million per month</a>.</p>
<p>Considering the hundreds of millions of dollars that <a href="https://www.barracuda.com/ransomware?utm_source=51599&amp;utm_medium=blog&amp;utm_campaign=blog">ransomware</a> crooks get from their victims every year, it’s critical for anyone in IT security to keep abreast of the newest ways that cybercriminals work to deploy ransomware in your network.</p>
<p>To help with that, Barracuda has released its <a href="https://blog.barracuda.com/2022/08/24/threat-spotlight-the-untold-stories-of-ransomware/">newest Threat Spotlight report</a>, focused on the latest developments in ransomware tactics and how to combat them. It’s filled with information that you can use to accurately gauge your organization’s exposure to today’s ransomware threats and effectively mitigate risks.</p>
<h2>New strategies, new attack vectors</h2>
<p>The <a href="https://lp.barracuda.com/BEU-AMER-WBN-20220929-Ransomware-Threat-Spotlight-Grande_LP-Registrationconvertedpage.html?utm_source=51599&amp;utm_medium=blog&amp;utm_campaign=blog">upcoming webinar</a> will be co-presented by Barracuda CTO Fleming Shi and Principal Product Marketing Manager Stasia Hurley, who will jointly provide a guided tour of the report’s key insights and takeaways. Here are just a few of the things you’ll find out if you attend:</p>
<ul>
<li>Why the healthcare and education industries experienced unusually sharp increases in ransomware attacks during the past year</li>
<li>How criminals are increasingly targeting large organizations by first penetrating smaller, less well-defended networks and using them as a springboard to attack partners, vendors, and others</li>
<li>Why VPN systems with inadequate user-authentication schemes continue to be a favored point of attack for ransomware criminals</li>
<li>Why application-based ransomware attacks are on the rise, even as email remains the top vector</li>
</ul>
<h2>Learning from real-world attacks</h2>
<p>One of the challenges for anyone seeking information about ransomware attacks is the fact that many organizations are reluctant to publicly reveal that they’ve been successfully attacked and share the story of their response and how much (if anything) they paid in ransom.</p>
<p>At the webinar, Fleming and Stasia will walk you through a detailed discussion of three different real-world ransomware attacks that took place in the past year. You’ll see the different ways that attackers penetrated their victims’ networks, how long they were able to reside undetected within those networks, and how the organizations responded to the incidents once they were detected.</p>
<p>Examples will include victims who were poorly prepared and suffered the consequences, as well as those who had solid defensive plans in place and were able to avoid significant costs.</p>
<h2>How to minimize risks</h2>
<p>As part of the presentation, Stasia and Fleming will also explain some of the tools and strategies you can use to minimize the ransomware risk to your organizations, such as:</p>
<ul>
<li>Strengthening VPN authentication by implementing multi-factor authentication or (even better) a zero-trust network access solution such as <a href="https://www.barracuda.com/products/cloudgen-access?utm_source=51599&amp;utm_medium=blog&amp;utm_campaign=blog">Barracuda CloudGen Access</a></li>
<li>Using a backup system, such as <a href="https://www.barracuda.com/products/backup?utm_source=51599&amp;utm_medium=blog&amp;utm_campaign=blog">Barracuda Backup</a>, that is protected against sophisticated attacks that seek to find, infect, and encrypt your backups to prevent fast and easy recovery of compromised data</li>
<li>Implementing network segmentation in order to limit the spread of a ransomware infection to only a small portion of your data</li>
</ul>
<p>Attending this webinar is one of the best things you can do to help you understand how ransomware crooks are evolving their attacks and plan out the steps you need to take to harden your security profile. <a href="https://lp.barracuda.com/BEU-AMER-WBN-20220929-Ransomware-Threat-Spotlight-Grande_LP-Registrationconvertedpage.html?utm_source=51599&amp;utm_medium=blog&amp;utm_campaign=blog">Register now</a> to reserve your spot.</p>
<p><strong>Free webinar</strong></p>
<p><strong>Threat Spotlight: Ransomware in 2022</strong></p>
<p><strong>Thursday, September 29, 2022</strong></p>
<p><strong>10 a.m. – 11 a.m. PT</strong></p>
<h3><a href="https://lp.barracuda.com/BEU-AMER-WBN-20220929-Ransomware-Threat-Spotlight-Grande_LP-Registrationconvertedpage.html?utm_source=51599&amp;utm_medium=blog&amp;utm_campaign=blog">Save your spot today</a></h3>
<p>The post <a href="https://www.tubesock.net/threat-spotlight-webinar-ransomware-on-the-rise/">Threat Spotlight webinar: Ransomware on the rise</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
	</item>
		<item>
		<title>Report calls out ad network malware complicity</title>
		<link>https://www.tubesock.net/report-calls-out-ad-network-malware-complicity/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-calls-out-ad-network-malware-complicity</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 19 Sep 2022 19:06:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254812</guid>

					<description><![CDATA[<p>A new report details how cybercriminals partner with other entities to deploy malware attacks through malicious advertising.</p>
<p>The post <a href="https://www.tubesock.net/report-calls-out-ad-network-malware-complicity/">Report calls out ad network malware complicity</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A <a href="https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/Unholy-Triangle-Report.pdf" target="_blank" rel="noopener">report</a> published by the Digital Citizens Alliance coalition based in Washington D.C. in collaboration with White Bullet and Unit 221B details the activities of an “Unholy Triangle” of organizations that are working with cybercriminals to insert malware into what appears to be legitimate online advertising to the average user.</p>
<p><span id="more-51596"></span></p>
<p>Known as malvertising, the report details how cybercriminals are working with entities that specialize in piracy to employ scare tactics and other techniques that, for example, facilitate campaigns involving misleading ads such as a false claim that the user has a computer virus. They are also coaching illicit actors on tactics to frighten or entice users to click on such ads.</p>
<p>The coalition specifically calls out advertising networks that are not vigilant about where they place ads and the type of advertising they accept for being complicit in distributing malware.</p>
<p>Digital Citizens Alliance worked with White Bullet, a provider of tools to combat piracy advertising, and Unit 221B, a provider of cybersecurity services, to analyze thousands of piracy sites, including well-known platforms such as Fmovies[.]to, Myflixer[.]to, and Dramacool9[.]co. The non-profit coalition of consumers, businesses, and Internet experts focused on educating the general public and policymakers has previously estimated piracy is a $2 billion-plus ecosystem fueled by illicit access to movies, TV shows, and live entertainment.</p>
<p>The collation is now estimating piracy operators are generating at least $121 million in revenues by injecting malware into advertising that contains <a href="https://blog.barracuda.com/rware" title="rware" target="_blank" rel="noopener">ransomware</a>, downloads spyware to track a user’s activities, seeks access to a user’s device to steal banking information, or simply flags the device for a future attack. More than half of the $121 million generated came from U.S. visits to these sites, the report noted. Digital Citizens Alliance also noted Americans who visit piracy sites are two to three times more likely to report an issue with malware than those who say they haven’t visited these sites.</p>
<p>Overall, malvertising accounts for 12% of the total ads on piracy sites, with nearly 80% of all pirate sites serving up an estimated 321 million ads containing malware. On average, one in six visits to a piracy site leads to an attempt to serve malware, according to the report.</p>
<p>Many cybersecurity professionals have long known how malvertising is used to distribute malware but the extent to which this attack vector is being employed shines a spotlight on how pervasive the issue has become. Organizations of all sizes should be applying more pressure on advertising networks that programmatically distribute advertising without any regard to the content included. There also needs to be more government oversight of how ad networks operate.</p>
<p>Obviously, there also needs to be a lot more education for end users that often don’t think twice about visiting a site that has been created for the express purpose of distributing malware. Cybersecurity professionals, of course, have been warning about fake sites for years now. The issue is with hundreds of millions of ads infected with malware being served up it only takes a few end users to make a mistake that unleashes havoc across an entire organization.</p>
<p>The post <a href="https://www.tubesock.net/report-calls-out-ad-network-malware-complicity/">Report calls out ad network malware complicity</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
	</item>
		<item>
		<title>Video Analytics: Adding Steak to the Sizzle</title>
		<link>https://www.tubesock.net/video-analytics-adding-steak-to-the-sizzle/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=video-analytics-adding-steak-to-the-sizzle</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 16 Sep 2022 18:25:05 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254796</guid>

					<description><![CDATA[<p>In this SDM magazine article, Dean Drako, CEO and founder of Eagle Eye Networks, talks about how integrators profit from cloud video surveillance and add-on services, ” “Cloud is fundamentally an RMR model, generating significant revenue from the customer each year or month … If it’s in the cloud and not on premise, you’re running …<br />
 Video Analytics: Adding Steak to the Sizzle Read More »<br />
The post Video Analytics: Adding Steak to the Sizzle first appeared on Eagle Eye Networks.</p>
<p>The post <a href="https://www.tubesock.net/video-analytics-adding-steak-to-the-sizzle/">Video Analytics: Adding Steak to the Sizzle</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" width="500" height="334" src="https://www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="SDM-Logo-FI" loading="lazy" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI.png 500w, https://www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI-300x200-1.png 300w, https://www.een.com/wp-content/uploads/2016/08/SDM-Logo-FI-100x67.png 100w, https://www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI-195x130-1.png 195w, https://www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI-200x134-1.png 200w, https://www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI-400x267-1.png 400w" sizes="auto, (max-width: 500px) 100vw, 500px" title="" /></p>
<p><em>In this SDM magazine article, Dean Drako, CEO and founder of Eagle Eye Networks, talks about how integrators profit from cloud video surveillance and add-on services, ” “Cloud is fundamentally an RMR model, generating significant revenue from the customer each year or month … If it’s in the cloud and not on premise, you’re running it, charging a fee, and making more money.”</em></p>
<hr class="wp-block-separator has-css-opacity" />
<p>Only a few years ago, the promise of video analytics seemed like more sizzle than steak. Interpretation based on pixel motion and algorithms created false alarms, and the unreliability turned off customers. But over the past two years, advances in artificial intelligence (AI), machine learning, deep learning, and edge-based IP cameras have made it more accurate than ever before.</p>
<p>Besides traditional security applications, businesses are turning to video data for intelligence purposes, using predictive analytics, patterns and behaviors, which makes video surveillance and video-verified intrusion detection systems more intelligent and capable of more advanced decisions.</p>
</p>
<div class="wp-container-1 wp-block-buttons">
<div class="wp-block-button"><a class="wp-block-button__link" href="https://www.sdmmag.com/articles/101185-video-analytics-adding-steak-to-the-sizzle" target="_blank" rel="noreferrer noopener">Read the full article</a></div>
</div>
<h3>In the News</h3>
<p>By <a href="https://www.sdmmag.com/authors/1796-laura-toops">Laura Mazzuca Toops</a><br /><em>Covered on these news sites. Click the image to read more.</em></p>
<figure class="wp-block-image size-full is-resized"><a href="https://www.sdmmag.com/articles/101185-video-analytics-adding-steak-to-the-sizzle" target="_blank" rel="noopener"><img decoding="async" loading="lazy" src="https://www.tubesock.net/wp-content/uploads/2022/09/sdm-logo.png" alt="sdm-logo" class="wp-image-13476" width="195" height="46" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/sdm-logo.png 390w, https://www.een.com/wp-content/uploads/2016/04/sdm-logo-300x71.png 300w, https://www.een.com/wp-content/uploads/2016/04/sdm-logo-100x24.png 100w, https://www.een.com/wp-content/uploads/2016/04/sdm-logo-200x47.png 200w" sizes="auto, (max-width: 195px) 100vw, 195px" /></a></figure>
<p>The post <a href="https://www.een.com/blog/video-analytics-adding-steak-to-the-sizzle/">Video Analytics: Adding Steak to the Sizzle</a> first appeared on <a href="https://www.een.com">Eagle Eye Networks</a>.</p>
<p>The post <a href="https://www.tubesock.net/video-analytics-adding-steak-to-the-sizzle/">Video Analytics: Adding Steak to the Sizzle</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		
		
		<media:thumbnail url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI.png" />
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/SDM-Logo-FI.png" medium="image">
			<media:title type="html">SDM-Logo-FI</media:title>
		</media:content>
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/sdm-logo.png" medium="image">
			<media:title type="html">sdm-logo</media:title>
		</media:content>
	</item>
		<item>
		<title>Must Have Video Surveillance Features For Parking Professionals</title>
		<link>https://www.tubesock.net/must-have-video-surveillance-features-for-parking-professionals/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=must-have-video-surveillance-features-for-parking-professionals</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 16 Sep 2022 15:16:55 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.tubesock.net/?p=254784</guid>

					<description><![CDATA[<p>Eagle Eye Networks, the worldwide leader in cloud video surveillance, welcomes the National Parking Association Convention and Expo to Austin. Austin-based Eagle Eye Networks will be in Booth #517 at the #NPAExpo to showcase our flexible and affordable cloud security solutions for the parking industry. Additionally, click here if you would like to book a …<br />
 Must Have Video Surveillance Features For Parking Professionals Read More »<br />
The post Must Have Video Surveillance Features For Parking Professionals first appeared on Eagle Eye Networks.</p>
<p>The post <a href="https://www.tubesock.net/must-have-video-surveillance-features-for-parking-professionals/">Must Have Video Surveillance Features For Parking Professionals</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" width="1200" height="700" src="https://www.tubesock.net/wp-content/uploads/2022/09/parking-garage-entrance.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Cloud Video Surveillance for parking lots" loading="lazy" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/parking-garage-entrance.jpg 1200w, https://www.tubesock.net/wp-content/uploads/2022/09/parking-garage-entrance-300x175-1.jpg 300w, https://www.tubesock.net/wp-content/uploads/2022/09/parking-garage-entrance-1024x597-1.jpg 1024w" sizes="auto, (max-width: 1200px) 100vw, 1200px" title="" /></p>
<p>Eagle Eye Networks, the worldwide leader in cloud video surveillance, welcomes the <a href="https://www.npaconvention.org/2022/" target="_blank" rel="noopener">National Parking Association Convention and Expo</a> to Austin. </p>
<p>Austin-based Eagle Eye Networks will be in <a href="https://www.npaconvention.org/2022/expo.cfm" target="_blank" rel="noopener">Booth #517</a> at the #NPAExpo to showcase our flexible and affordable cloud security solutions for the parking industry. Additionally, click <a href="https://www.een.com/event/national-parking-association/" target="_blank" rel="noopener">here</a> if you would like to book a meeting in advance with Eagle Eye Networks at the convention. And if you just need authentic Texas barbecue recommendations from a local company, click here for our <a href="https://www.een.com/wp-content/uploads/2022/09/Austin-Barbecue-Guide.pdf" target="_blank" rel="noopener">Austin BBQ Guide</a>. </p>
<h2>Cloud Video Surveillance For Parking Lots and Garages</h2>
<p><a href="https://www.een.com/product/cloud-vms-system-overview/" target="_blank" rel="noopener">Eagle Eye Networks Cloud VMS</a> (Video Management System) is an <a href="https://www.een.com/solutions/cloud-video-surveillance-parking-lot/" target="_blank" rel="noopener" title="ideal surveillance solution for parking lots and garages">ideal surveillance solution for parking lots and garages</a>. Our cloud system provides remote access and management coupled with unmatched system flexibility. Further, Eagle Eye VMS reduces the cost and complexity associated with traditional surveillance installations by working with existing cameras and infrastructure and allowing users to choose the security cameras that best fit their needs and budget.</p>
<p>The cloud system is also equipped with advanced features and <a href="https://www.een.com/video-analytics/" target="_blank" rel="noopener">video analytics</a> including license plate recognition and smart, searchable video.  Therefore parking lot owners and operators can strengthen security, minimize loss, and gain valuable insight into customer behavior.</p>
<p>Read on for the top three features parking lot owners and operators should look for in a video surveillance system for their business.</p>
<div class="wp-container-1 wp-block-buttons">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link" href="https://www.een.com/request-demo/">LEARN MORE</a></div>
</div>
<div style="height:32px" aria-hidden="true" class="wp-block-spacer"></div>
<h2>1. Secure, Remote Video Retention, Access, and Management</h2>
<figure class="wp-block-image alignright size-full is-resized"><img decoding="async" loading="lazy" src="https://www.tubesock.net/wp-content/uploads/2022/09/instrusion-detection-phone-1.jpg" alt="intrusion detection analytics on mobile device" class="wp-image-81996" width="272" height="180" srcset="https://www.tubesock.net/wp-content/uploads/2022/09/instrusion-detection-phone-1.jpg 600w, https://www.tubesock.net/wp-content/uploads/2022/09/instrusion-detection-phone-1-300x200-1.jpg 300w, https://www.tubesock.net/wp-content/uploads/2022/09/instrusion-detection-phone-1-200x133-1.jpg 200w, https://www.tubesock.net/wp-content/uploads/2022/09/instrusion-detection-phone-1-400x266-1.jpg 400w, https://www.een.com/wp-content/uploads/2020/03/instrusion-detection-phone-1-100x67.jpg 100w, https://www.tubesock.net/wp-content/uploads/2022/09/instrusion-detection-phone-1-195x130-1.jpg 195w" sizes="auto, (max-width: 272px) 100vw, 272px" /><figcaption>Mobile access to surveillance video</figcaption></figure>
<p>Offsite surveillance video retention, combined with remote access and management, works particularly well for parking industry owners and operators. With cloud surveillance there is no need for an on-site video storage device, instead video is securely transferred to cloud data centers where it is accessible from anywhere. </p>
<p>Owners and operators can view and manage multiple sites remotely, even from their mobile devices with Eagle Eye Cloud VMS. Additionally, all locations can be viewed from a single dashboard. </p>
<p>System access for one or multiple locations can easily be set up for new employees and managers can remotely adjust camera retention, resolution, and video analytics at any time. </p>
<h2>2. Accurate and Affordable License Plate Recognition</h2>
<p><a href="https://www.een.com/product/license-plate-recognition/" target="_blank" rel="noopener">Eagle Eye LPR (License Plate Recognition)</a> is an AI-powered and highly accurate license plate recognition technology that works with any surveillance camera in all kinds of challenging conditions – increasing business security and efficiency while lowering costs.</p>
<p>Combined with the Eagle Eye <a href="https://www.een.com/product/vehicle-surveillance-package/" target="_blank" rel="noopener">Vehicle Surveillance Package</a>, parking owners and operators can automate parking access, monitor entry/exit, and search through history to find specific plates, times, and locations.</p>
<figure class="wp-block-video"><video controls src="https://player.vimeo.com/progressive_redirect/playback/694180906/rendition/1080p/file.mp4?loc=external&amp;signature=2dfba9688a9eabe1b65748707211057eb6b78d09cc3a1d2fca010cd0e77756a6"></video><figcaption>Watch this video to learn more about Eagle Eye LPR (License Plate Recognition)</figcaption></figure>
<h2>3. Video Analytics and Automatic Alerts</h2>
<p><a href="https://www.een.com/video-analytics/" target="_blank" rel="noopener">Video analytics</a> combined with cloud-based video retention can automatically detect security risks and send alerts, freeing parking professionals to focus on other aspects of their business. Use data from video analytics to make informed business decisions by monitoring customer trends and patterns. </p>
<p><a href="https://www.een.com/video-analytics-loitering-detection/" target="_blank" rel="noopener">Loitering Detection</a> and <a href="https://www.een.com/video-analytics-line-crossing-detection/" target="_blank" rel="noopener">Line Crossing</a> analytics activated on certain cameras can alert designated managers or operators when there is suspicious activity at a location. This activity can include people lingering in an area for a long period of time, or entering an area from a questionable location.</p>
<p>Eagle Eye Cloud VMS makes it easy for system admins to turn on or off any video analytics for any camera based on changing needs of their operation.  </p>
<p>If you would like additional information on the benefits of the Eagle Eye Cloud VMS for parking lots and garages, you can view our <a href="https://www.een.com/solutions/cloud-video-surveillance-parking-lot/" target="_blank" rel="noopener">parking industry page</a> or set up a risk free demo below. </p>
<h2>While You’re Visiting Austin</h2>
<p>Part of living in Austin means constantly being asked for barbecue recommendations. Its something that’s debated in the office and among friends and family. If you’re looking for barbecue recommendations near the <a href="https://www.austinconventioncenter.com/" target="_blank" rel="noopener">Austin Convention Center</a> and downtown hotels, here is an <a href="https://www.een.com/wp-content/uploads/2022/09/Austin-Barbecue-Guide.pdf" target="_blank" rel="noopener">Austin BBQ guide</a> with some recommendations for authentic Texas barbecue in Austin.  </p>
<div class="wp-container-2 wp-block-buttons">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link" href="https://www.een.com/wp-content/uploads/2022/09/Austin-Barbecue-Guide.pdf">EAGLE EYE AUSTIN BBQ GUIDE</a></div>
</div>
<div style="height:47px" aria-hidden="true" class="wp-block-spacer"></div>
<div id="form" class="wp-block-een-form-block container-fluid content bg-dark ready" style="background:;background-image:url(https://www.een.com/wp-content/uploads/2022/03/LPR-Demo-Footer.jpg)">
<div class="container">
<div class="row">
<div class="col-lg-6 col-md-12"></div>
<div class="col-lg-6 col-md-12">
<div class="home_form_container">
<h2 class="title" style="color:">Learn More About Eagle Eye Networks Solutions For Parking Lots</h2>
<p><script type="text/javascript">var gform;gform||(document.addEventListener("gform_main_scripts_loaded",function(){gform.scriptsLoaded=!0}),window.addEventListener("DOMContentLoaded",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,initializeOnLoaded:function(o){gform.domLoaded&&gform.scriptsLoaded?o():!gform.domLoaded&&gform.scriptsLoaded?window.addEventListener("DOMContentLoaded",o):document.addEventListener("gform_main_scripts_loaded",o)},hooks:{action:{},filter:{}},addAction:function(o,n,r,t){gform.addHook("action",o,n,r,t)},addFilter:function(o,n,r,t){gform.addHook("filter",o,n,r,t)},doAction:function(o){gform.doHook("action",o,arguments)},applyFilters:function(o){return gform.doHook("filter",o,arguments)},removeAction:function(o,n){gform.removeHook("action",o,n)},removeFilter:function(o,n,r){gform.removeHook("filter",o,n,r)},addHook:function(o,n,r,t,i){null==gform.hooks[o][n]&&(gform.hooks[o][n]=[]);var e=gform.hooks[o][n];null==i&&(i=n+"_"+e.length),gform.hooks[o][n].push({tag:i,callable:r,priority:t=null==t?10:t})},doHook:function(n,o,r){var t;if(r=Array.prototype.slice.call(r,1),null!=gform.hooks[n][o]&&((o=gform.hooks[n][o]).sort(function(o,n){return o.priority-n.priority}),o.forEach(function(o){"function"!=typeof(t=o.callable)&&(t=window[t]),"action"==n?t.apply(null,r):r[0]=t.apply(null,r)})),"filter"==n)return r[0]},removeHook:function(o,n,t,i){var r;null!=gform.hooks[o][n]&&(r=(r=gform.hooks[o][n]).filter(function(o,n,r){return!!(null!=i&&i!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][n]=r)}});</script></p>
<div class="gf_browser_chrome gform_wrapper gform_legacy_markup_wrapper" id="gform_wrapper_155" style="display:none">
<div id="gf_155" class="gform_anchor" tabindex="-1"></div>
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_155" id="gform_155" action="/feed/#gf_155" novalidate>
<div class="gform_body gform-body">
<ul id="gform_fields_155" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_155_1" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_155_1"><label class="gfield_label" for="input_155_1">First Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_1" id="input_155_1" type="text" value="" class="large" tabindex="49" placeholder="First Name" aria-required="true" aria-invalid="false" /> </div>
</li>
<li id="field_155_6" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_155_6"><label class="gfield_label" for="input_155_6">Last Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_6" id="input_155_6" type="text" value="" class="large" tabindex="50" placeholder="Last Name" aria-required="true" aria-invalid="false" /> </div>
</li>
<li id="field_155_2" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_155_2"><label class="gfield_label" for="input_155_2">Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_2" id="input_155_2" type="text" value="" class="large" tabindex="51" placeholder="Phone" aria-required="true" aria-invalid="false" /> </div>
</li>
<li id="field_155_20" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_155_20"><label class="gfield_label" for="input_155_20">Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
                            <input name="input_20" id="input_155_20" type="email" value="" class="large" tabindex="52" placeholder="Email" aria-required="true" aria-invalid="false" />
                        </div>
</li>
<li id="field_155_11" class="gfield company_input gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_155_11"><label class="gfield_label" for="input_155_11">Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_11" id="input_155_11" type="text" value="" class="large" tabindex="53" placeholder="Company" aria-required="true" aria-invalid="false" /> </div>
</li>
<li id="field_155_18" class="gfield field_sublabel_hidden_label field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_155_18"><label class="gfield_label gfield_label_before_complex">Address</label>
<div class="ginput_complex ginput_container has_country ginput_container_address" id="input_155_18">
                        <input type="hidden" class="gform_hidden" name="input_18.4" id="input_155_18_4" value="" /><span class="ginput_left address_country ginput_address_country" id="input_155_18_6_container"><br />
                                        <select name="input_18.6" id="input_155_18_6" tabindex="57" aria-required="false"><option value="" selected>Country</option><option value="AF">Afghanistan</option><option value="AL">Albania</option><option value="DZ">Algeria</option><option value="AS">American Samoa</option><option value="AD">Andorra</option><option value="AO">Angola</option><option value="AI">Anguilla</option><option value="AQ">Antarctica</option><option value="AG">Antigua and Barbuda</option><option value="AR">Argentina</option><option value="AM">Armenia</option><option value="AW">Aruba</option><option value="AU">Australia</option><option value="AT">Austria</option><option value="AZ">Azerbaijan</option><option value="BS">Bahamas</option><option value="BH">Bahrain</option><option value="BD">Bangladesh</option><option value="BB">Barbados</option><option value="BY">Belarus</option><option value="BE">Belgium</option><option value="BZ">Belize</option><option value="BJ">Benin</option><option value="BM">Bermuda</option><option value="BT">Bhutan</option><option value="BO">Bolivia</option><option value="BQ">Bonaire, Sint Eustatius and Saba</option><option value="BA">Bosnia and Herzegovina</option><option value="BW">Botswana</option><option value="BV">Bouvet Island</option><option value="BR">Brazil</option><option value="IO">British Indian Ocean Territory</option><option value="BN">Brunei Darussalam</option><option value="BG">Bulgaria</option><option value="BF">Burkina Faso</option><option value="BI">Burundi</option><option value="KH">Cambodia</option><option value="CM">Cameroon</option><option value="CA">Canada</option><option value="CV">Cape Verde</option><option value="KY">Cayman Islands</option><option value="CF">Central African Republic</option><option value="TD">Chad</option><option value="CL">Chile</option><option value="CN">China</option><option value="CX">Christmas Island</option><option value="CC">Cocos Islands</option><option value="CO">Colombia</option><option value="KM">Comoros</option><option value="CD">Congo, Democratic Republic of the</option><option value="CG">Congo, Republic of the</option><option value="CK">Cook Islands</option><option value="CR">Costa Rica</option><option value="HR">Croatia</option><option value="CU">Cuba</option><option value="CW">Curaçao</option><option value="CY">Cyprus</option><option value="CZ">Czech Republic</option><option value="CI">Côte d&#8217;Ivoire</option><option value="DK">Denmark</option><option value="DJ">Djibouti</option><option value="DM">Dominica</option><option value="DO">Dominican Republic</option><option value="EC">Ecuador</option><option value="EG">Egypt</option><option value="SV">El Salvador</option><option value="GQ">Equatorial Guinea</option><option value="ER">Eritrea</option><option value="EE">Estonia</option><option value="SZ">Eswatini (Swaziland)</option><option value="ET">Ethiopia</option><option value="FK">Falkland Islands</option><option value="FO">Faroe Islands</option><option value="FJ">Fiji</option><option value="FI">Finland</option><option value="FR">France</option><option value="GF">French Guiana</option><option value="PF">French Polynesia</option><option value="TF">French Southern Territories</option><option value="GA">Gabon</option><option value="GM">Gambia</option><option value="GE">Georgia</option><option value="DE">Germany</option><option value="GH">Ghana</option><option value="GI">Gibraltar</option><option value="GR">Greece</option><option value="GL">Greenland</option><option value="GD">Grenada</option><option value="GP">Guadeloupe</option><option value="GU">Guam</option><option value="GT">Guatemala</option><option value="GG">Guernsey</option><option value="GN">Guinea</option><option value="GW">Guinea-Bissau</option><option value="GY">Guyana</option><option value="HT">Haiti</option><option value="HM">Heard and McDonald Islands</option><option value="VA">Holy See</option><option value="HN">Honduras</option><option value="HK">Hong Kong</option><option value="HU">Hungary</option><option value="IS">Iceland</option><option value="IN">India</option><option value="ID">Indonesia</option><option value="IR">Iran</option><option value="IQ">Iraq</option><option value="IE">Ireland</option><option value="IM">Isle of Man</option><option value="IL">Israel</option><option value="IT">Italy</option><option value="JM">Jamaica</option><option value="JP">Japan</option><option value="JE">Jersey</option><option value="JO">Jordan</option><option value="KZ">Kazakhstan</option><option value="KE">Kenya</option><option value="KI">Kiribati</option><option value="KW">Kuwait</option><option value="KG">Kyrgyzstan</option><option value="LA">Lao People&#8217;s Democratic Republic</option><option value="LV">Latvia</option><option value="LB">Lebanon</option><option value="LS">Lesotho</option><option value="LR">Liberia</option><option value="LY">Libya</option><option value="LI">Liechtenstein</option><option value="LT">Lithuania</option><option value="LU">Luxembourg</option><option value="MO">Macau</option><option value="MK">Macedonia</option><option value="MG">Madagascar</option><option value="MW">Malawi</option><option value="MY">Malaysia</option><option value="MV">Maldives</option><option value="ML">Mali</option><option value="MT">Malta</option><option value="MH">Marshall Islands</option><option value="MQ">Martinique</option><option value="MR">Mauritania</option><option value="MU">Mauritius</option><option value="YT">Mayotte</option><option value="MX">Mexico</option><option value="FM">Micronesia</option><option value="MD">Moldova</option><option value="MC">Monaco</option><option value="MN">Mongolia</option><option value="ME">Montenegro</option><option value="MS">Montserrat</option><option value="MA">Morocco</option><option value="MZ">Mozambique</option><option value="MM">Myanmar</option><option value="NA">Namibia</option><option value="NR">Nauru</option><option value="NP">Nepal</option><option value="NL">Netherlands</option><option value="NC">New Caledonia</option><option value="NZ">New Zealand</option><option value="NI">Nicaragua</option><option value="NE">Niger</option><option value="NG">Nigeria</option><option value="NU">Niue</option><option value="NF">Norfolk Island</option><option value="KP">North Korea</option><option value="MP">Northern Mariana Islands</option><option value="NO">Norway</option><option value="OM">Oman</option><option value="PK">Pakistan</option><option value="PW">Palau</option><option value="PS">Palestine, State of</option><option value="PA">Panama</option><option value="PG">Papua New Guinea</option><option value="PY">Paraguay</option><option value="PE">Peru</option><option value="PH">Philippines</option><option value="PN">Pitcairn</option><option value="PL">Poland</option><option value="PT">Portugal</option><option value="PR">Puerto Rico</option><option value="QA">Qatar</option><option value="RO">Romania</option><option value="RU">Russia</option><option value="RW">Rwanda</option><option value="RE">Réunion</option><option value="BL">Saint Barthélemy</option><option value="SH">Saint Helena</option><option value="KN">Saint Kitts and Nevis</option><option value="LC">Saint Lucia</option><option value="MF">Saint Martin</option><option value="PM">Saint Pierre and Miquelon</option><option value="VC">Saint Vincent and the Grenadines</option><option value="WS">Samoa</option><option value="SM">San Marino</option><option value="ST">Sao Tome and Principe</option><option value="SA">Saudi Arabia</option><option value="SN">Senegal</option><option value="RS">Serbia</option><option value="SC">Seychelles</option><option value="SL">Sierra Leone</option><option value="SG">Singapore</option><option value="SX">Sint Maarten</option><option value="SK">Slovakia</option><option value="SI">Slovenia</option><option value="SB">Solomon Islands</option><option value="SO">Somalia</option><option value="ZA">South Africa</option><option value="GS">South Georgia</option><option value="KR">South Korea</option><option value="SS">South Sudan</option><option value="ES">Spain</option><option value="LK">Sri Lanka</option><option value="SD">Sudan</option><option value="SR">Suriname</option><option value="SJ">Svalbard and Jan Mayen Islands</option><option value="SE">Sweden</option><option value="CH">Switzerland</option><option value="SY">Syria</option><option value="TW">Taiwan</option><option value="TJ">Tajikistan</option><option value="TZ">Tanzania</option><option value="TH">Thailand</option><option value="TL">Timor-Leste</option><option value="TG">Togo</option><option value="TK">Tokelau</option><option value="TO">Tonga</option><option value="TT">Trinidad and Tobago</option><option value="TN">Tunisia</option><option value="TR">Turkey</option><option value="TM">Turkmenistan</option><option value="TC">Turks and Caicos Islands</option><option value="TV">Tuvalu</option><option value="UM">US Minor Outlying Islands</option><option value="UG">Uganda</option><option value="UA">Ukraine</option><option value="AE">United Arab Emirates</option><option value="UK">United Kingdom</option><option value="US">United States</option><option value="UY">Uruguay</option><option value="UZ">Uzbekistan</option><option value="VU">Vanuatu</option><option value="VE">Venezuela</option><option value="VN">Vietnam</option><option value="VG">Virgin Islands, British</option><option value="VI">Virgin Islands, U.S.</option><option value="WF">Wallis and Futuna</option><option value="EH">Western Sahara</option><option value="YE">Yemen</option><option value="ZM">Zambia</option><option value="ZW">Zimbabwe</option><option value="AX">Åland Islands</option></select><br />
                                        <label for="input_155_18_6" id="input_155_18_6_label" class="hidden_sub_label screen-reader-text">Country</label><br />
                                    </span></p>
<div class="gf_clear gf_clear_complex"></div>
</p></div>
</li>
<li id="field_155_26" class="gfield gfield--width-full field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_26"><label class="gfield_label gfield_label_before_complex">I&#8217;m a current customer and interested in being a beta tester</label>
<div class="ginput_container ginput_container_checkbox">
<ul class="gfield_checkbox" id="input_155_26">
<li class="gchoice gchoice_155_26_1">
								<input class="gfield-choice-input" name="input_26.1" type="checkbox" value="Yes" id="choice_155_26_1" tabindex="58" /><br />
								<label for="choice_155_26_1" id="label_155_26_1"></label>
							</li>
</ul>
</div>
</li>
<li id="field_155_19" class="gfield gfield_contains_required field_sublabel_below field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_155_19"><label class="gfield_label gfield_label_before_complex">Consent<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_consent"><input name="input_19.1" id="input_155_19_1" type="checkbox" value="1" tabindex="59" aria-describedby="gfield_consent_description_155_19 gfield_description_155_19" aria-required="true" aria-invalid="false" /> <label class="gfield_consent_label" for="input_155_19_1">I agree to the privacy policy.</label><span class="gfield_required gfield_required_asterisk">*</span><input type="hidden" name="input_19.2" value="I agree to the privacy policy." class="gform_hidden" /><input type="hidden" name="input_19.3" value="54" class="gform_hidden" /></div>
<div class="gfield_description gfield_consent_description" id="gfield_consent_description_155_19">I hereby consent to the processing of my personal data above, for the purpose of receiving a response to my request and to receive commercial information on the products and services of Eagle Eye Networks. I have read and understood the Eagle Eye Networks <a href="https://www.een.com/privacy-policy/" target="_blank" rel="noopener">Privacy Policy</a>.</div>
</li>
<li id="field_155_7" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_7">
<div class="ginput_container ginput_container_text"><input name="input_7" id="input_155_7" type="hidden" class="gform_hidden" aria-invalid="false" value="Website Form" /></div>
</li>
<li id="field_155_8" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_8">
<div class="ginput_container ginput_container_text"><input name="input_8" id="input_155_8" type="hidden" class="gform_hidden" aria-invalid="false" value="No Contact Attempted Yet" /></div>
</li>
<li id="field_155_9" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_9">
<div class="ginput_container ginput_container_text"><input name="input_9" id="input_155_9" type="hidden" class="gform_hidden" aria-invalid="false" value="" /></div>
</li>
<li id="field_155_22" class="gfield gfield--width-full gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_22">
<div class="ginput_container ginput_container_text"><input name="input_22" id="input_155_22" type="hidden" class="gform_hidden" aria-invalid="false" value="marketingqualifiedlead" /></div>
</li>
<li id="field_155_10" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_10">
<div class="ginput_container ginput_container_text"><input name="input_10" id="input_155_10" type="hidden" class="gform_hidden" aria-invalid="false" value="" /></div>
</li>
<li id="field_155_21" class="gfield gfield--width-full gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_21">
<div class="ginput_container ginput_container_text"><input name="input_21" id="input_155_21" type="hidden" class="gform_hidden" aria-invalid="false" value="" /></div>
</li>
<li id="field_155_15" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_15">
<div class="ginput_container ginput_container_text"><input name="input_15" id="input_155_15" type="hidden" class="gform_hidden" aria-invalid="false" value="" /></div>
</li>
<li id="field_155_16" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_16">
<div class="ginput_container ginput_container_text"><input name="input_16" id="input_155_16" type="hidden" class="gform_hidden" aria-invalid="false" value="" /></div>
</li>
<li id="field_155_17" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_17">
<div class="ginput_container ginput_container_text"><input name="input_17" id="input_155_17" type="hidden" class="gform_hidden" aria-invalid="false" value="" /></div>
</li>
<li id="field_155_27" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible" data-js-reload="field_155_27"><label class="gfield_label" for="input_155_27">Email</label>
<div class="ginput_container"><input name="input_27" id="input_155_27" type="text" value="" autocomplete="new-password" /></div>
<div class="gfield_description" id="gfield_description_155_27">This field is for validation purposes and should be left unchanged.</div>
</li>
</ul>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_155" class="gform_button button" value="Learn more" tabindex="60" onclick="if(window[&quot;gf_submitting_155&quot;]){return false;}  if( !jQuery(&quot;#gform_155&quot;)[0].checkValidity || jQuery(&quot;#gform_155&quot;)[0].checkValidity()){window[&quot;gf_submitting_155&quot;]=true;}  " onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_155&quot;]){return false;} if( !jQuery(&quot;#gform_155&quot;)[0].checkValidity || jQuery(&quot;#gform_155&quot;)[0].checkValidity()){window[&quot;gf_submitting_155&quot;]=true;}  jQuery(&quot;#gform_155&quot;).trigger(&quot;submit&quot;,[true]); }" /> <input type="hidden" name="gform_ajax" value="form_id=155&amp;title=&amp;description=&amp;tabindex=49" /><br />
            <input type="hidden" class="gform_hidden" name="is_submit_155" value="1" /><br />
            <input type="hidden" class="gform_hidden" name="gform_submit" value="155" /></p>
<p>            <input type="hidden" class="gform_hidden" name="gform_unique_id" value="" /><br />
            <input type="hidden" class="gform_hidden" name="state_155" value="WyJ7XCIxOS4xXCI6XCJhNDNmMzE1M2MxNDhmODZhYjhkM2FjYWJhZDVlODIwNlwiLFwiMTkuMlwiOlwiZGFhMGEzNjA3OTU5YmJkNmRjNGRjNTljYWZjODhiMGVcIixcIjE5LjNcIjpcIjFjNmVmNTIxNDNmMmIwYjZkYTZhOTcyMDc1MWNjODI0XCJ9IiwiZjQ3ODUxYTAzMjQzMDEzMTRkNDQzOGUzZmIxMDU3ODIiXQ==" /><br />
            <input type="hidden" class="gform_hidden" name="gform_target_page_number_155" id="gform_target_page_number_155" value="0" /><br />
            <input type="hidden" class="gform_hidden" name="gform_source_page_number_155" id="gform_source_page_number_155" value="1" /><br />
            <input type="hidden" name="gform_field_values" value="" /></p></div>
</p></form>
</p></div>
<p>                <iframe style="display:none;width:0px;height:0px;" src="about:blank" name="gform_ajax_frame_155" id="gform_ajax_frame_155" title="This iframe contains the logic required to handle Ajax powered Gravity Forms."></iframe><br />
                <script>
gform.initializeOnLoaded( function() {gformInitSpinner( 155, 'https://www.een.com/wp-content/uploads/2021/06/Reload-Image-Gif-2.gif' );jQuery('#gform_ajax_frame_155').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_155');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_155').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_155').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_155').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_155').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */ jQuery(document).scrollTop(jQuery('#gform_wrapper_155').offset().top - mt); }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_155').val();gformInitSpinner( 155, 'https://www.een.com/wp-content/uploads/2021/06/Reload-Image-Gif-2.gif' );jQuery(document).trigger('gform_page_loaded', [155, current_page]);window['gf_submitting_155'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery('#gform_wrapper_155').replaceWith(confirmation_content);jQuery(document).scrollTop(jQuery('#gf_155').offset().top - mt);jQuery(document).trigger('gform_confirmation_loaded', [155]);window['gf_submitting_155'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_155').text());}, 50);}else{jQuery('#gform_155').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger('gform_post_render', [155, current_page]);} );} );
</script>
</div>
</div>
</div>
</div>
</div>
<p>The post <a href="https://www.een.com/blog/must-have-video-surveillance-features-for-parking-professionals/">Must Have Video Surveillance Features For Parking Professionals</a> first appeared on <a href="https://www.een.com">Eagle Eye Networks</a>.</p>
<p>The post <a href="https://www.tubesock.net/must-have-video-surveillance-features-for-parking-professionals/">Must Have Video Surveillance Features For Parking Professionals</a> appeared first on <a href="https://www.tubesock.net">Tubesock, Inc.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://player.vimeo.com/progressive_redirect/playback/694180906/rendition/1080p/file.mp4?loc=external&#038;signature=2dfba9688a9eabe1b65748707211057eb6b78d09cc3a1d2fca010cd0e77756a6" length="0" type="video/mp4" />

		
		<media:thumbnail url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/parking-garage-entrance.jpg" />
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/parking-garage-entrance.jpg" medium="image">
			<media:title type="html">Cloud Video Surveillance for parking lots</media:title>
		</media:content>
		<media:content url="https://www.tubesock.net/www.tubesock.net/wp-content/uploads/2022/09/instrusion-detection-phone-1.jpg" medium="image">
			<media:title type="html">intrusion detection analytics on mobile device</media:title>
		</media:content>
	</item>
	</channel>
</rss>
