$119.4 Billion: Projected Growth of Physical Security Market by 2023


Simply put, the physical security market consists of all the security solutions you can walk up to and touch. Cameras, virtual gate guard systems, HOA management systems and more all have elements of physical security. Of course, because all of these solutions are deeply integrated with network and cloud-based technologies, cybersecurity could be considered to be equally important, but is not what we are looking at in this article


As risk continues to rise with rapid progress sometimes leaving vulnerabilities unchecked, the demand for physical security, the tried and true barrier between real assets and those seeking to steal or destroy them, will grow along with the risk.


A combination of fear generated from media responses to so-called “terror attacks”, advancements in tech in general, and the growing use of IP cameras to perform video surveillance are expected to push the growth of the physical security market worldwide.

According to this report:


 this growth is expected to be from $84.1 billion in 2018 to $199.4 billion by 2023 with a CAGR (compound annual growth rate) of 7.3%.


This report details how the services segment of the market is expected to have the fastest growth rate. Physical security is indispensable for enhancing existing video surveillance through integration of digital (IP) solutions and integrating them with modern IT and network environments.


Of course, the larger enterprises are expected to be at the bleeding edge as this all occurs over the next few years, but this doesn’t mean that small or medium businesses need to miss out. While the big players have the greatest pools of revenue to draw from and more infrastructure to protect, the smaller enterprises can see just as much or greater benefit by implementing integrated IP-based physical security sooner rather than later. The best time to step up your security will always be before the attack comes, and not as a reactive measure.


 Security Technology of South Texas is a leading provider of cutting-edge physical security products. We have the experience and attention to detail to give you the best for your money when it comes to IP cameras, access control solutions, monitored video, and more.

Contact us at admin@gostst.com
or call 24/7     (210)-446-4863



Cryptojacking Attack Infects Thousands of ISP-Grade Routers

Cryptomining attack scripts, sometimes referred to as cryptojacking, are a subtle form of malware designed to harness the power of your CPU to mine cryptocurrency for those who develop them. These malware can be spread through infected files and the usual vectors of transmission. Cryptomining can also take place with our without your tacet consent on websites, especially those associated with torrenting and distribution of copywrited materials.

In this case however, a more sophisticated approach has been taken in an effort to spread the reach of the mining campaign through compromising industrial, ISP-grade routers. A hacking campaign has compromised “tens of thousands of MikroTik routers to embed Coinhive cryptomining scripts in websites using a known vulnerability.” (threatpost.com)

Censys.io reports that over 170,000 active Mikrotik devices were infected with the CoinHive site-key ( a single site-key was found across all infections, which indicates a single entity to be behind the attacks). Although the campaign appeared to originally target Brazil, infections are still growing internationally. A search on Shodan (a search engine for security researchers) shows growing tens of thousands of compromised routers outside of Brazil.

MikroTik routers are employed by large enterprises and ISPs in order to serve web pages to multiple thousands or more users each day. This means that each instance of compromise could pay out big for the threat actor.

This is a warning call and reminder to everyone who has a MikroTik device to patch as soon as possible,” Trustwave researcher Simon Kenin wrote. “This attack may currently be prevalent in Brazil, but during the final stages of writing this blog, I also noticed other geo-locations being affected as well, so I believe this attack is intended to be on a global scale.”

We’re … talking about potentially millions of daily pages for the attacker,” Kenin wrote. “The attacker wisely thought that instead of infecting small sites with few visitors, or finding sophisticated ways to run malware on end-user computers, they would go straight to the source: carrier-grade router devices.”


Known Vulnerabilities 

Because the attack capitalizes on a known vulnerability, it is a prime example of what enterprises of all sizes risk when they delay or prevent installation of developer patches. The attack takes advantage of a vulnerability that was actually fixed by MikroTik in a previous patch.

Whoever is behind the attack, it appears they have an intimate understanding of the functionality of this particular router.

Initial investigation indicates that instead of running a malicious executable on the router itself, which is how the exploit was being used when it was first discovered, the attacker used the device’s functionality in order to inject the CoinHive script into every web page that a user visited,” explained Kenin.

Any MikroTik router users should make sure that their RouterOS is current with security patches, lest they fall prey to this latest cryptojacking campaign. 

The end user still has a few options as well, as cryptojacking can be halted in the web browser itself using (MinerBlock extension) or at the local firewall (CoinBlockerLists). Because the CoinHive script is injected into HTTP traffic, it can generally be avoided by forcing requests to be made over the secure version, HTTPS, depending of course on whether or not the site being accessed supports it.

Source: Threatpost.com  

Contact us at     admin@gostst.com
 or call 24/7        (210)-446-4863

STST Partners with 3XLOGIC as Authorized Dealer and Integrator

Not just another IP camera manufacturer, 3XLOGIC is changing how the end user manages and interacts with the IP ecosystem through implementing industry leading software-as-a-service architecture that gives even the newest IT novice the power to manage a complicated network of IP cameras and access control technology like a pro admin.
3XLOGIC makes use of the cloud for all storage and video processing needs, and systems will not feature on-site NVRs. This creates a robust video management structure and shifts processing power requirements away from the end-user or any computers located at the site. Through their proprietary “Infinias CLOUD” cloud hosting technology, a 3xLOGIC system can easily be made capable of handling video monitoring and analytics alongside access control solutions from just a single door all the way to “enterprise” scale operations.
This cloud based service “delivers broad access control capabilities to conveniently secure and manage user location(s)” (3xlogic.com) and uses an easy to use browser-based GUI. Having an easy to understand end-user interface allows for access control to be both practical and affordable for virtually any user, independent of the size of the business or the technical expertise of the end-user.
The user can “view, monitor, and report” (3xlogic.com) on events and alarms, as well as do things like define security rolls and create different levels of access privileges for the individual users.

Unique to the systems that can be built using 3xLOGIC’s hardware are what they term the “rules engine”. This is a logic system in their cloud space that allows the customer to “build the functionality they need such as Lock-down, First-in, last-out, n-man rule, and much more” (3xLOGIC.com) This rule engine can be used effectively on any scale to apply systems of rules and is particularly useful for access control purposes.

The “Infinias” cloud system is also capable of interfacing with wireless locks, which is increasingly a popular method used in large scale security solutions. While the same effect can be achieved by running wire to each door in the facility, the relatively low cost of using wireless locks, cameras, and etc. make this an increasingly attractive option for some. With time and improvements to wireless technology and a greater number of systems making use of cloud technology, wireless “everything” seems to be just on the horizon.

Overall, the solutions offered by 3xLOGIC are some of the most smooth and seamless out there. Technology like this is setting the stage for the future of fully integrated video surveillance, analytics, and access control systems. Above industry standard IP cameras, custom analytics, and a simple yet robust end-user interface all make 3xLOGIC stand out even among what sometimes feels like a crowded security market.
Security Technology of South Texas is an authorized dealer and integrator for 3xLOGIC. Contact us today to see what kind of system is right for your business or project.
Call us 24/7 at    (210)-446-4863     or       email admin@gostst.com

Source: 3xLOGIC.com

Avigilon Blue: A Powerful New Integrator Cloud Service Platform

Avigilon Blue is a new product from industry leader in IP video and access control Avigilon. What makes this product unique is its ability to integrate on premise using a “quick-to-deploy Avigilon Blue Connect device that stores all video locally while sending video analytics clips to the cloud.” (Avigilon.com)
This cloud-based, software-as-a-service platform is easy to set up, configure, and link to the cloud. This process takes only minutes and uses universal “plug-and-play” network protocols with an intuitive web-based user interface.
Once logged in to the system, the administrator can access Avigilon’s Subscription Center to view real-time account and subscriber information. The dashboard, viewable on any typical Internet connected device, allows quick identification of trends and system behaviors to isolate problems without dispatching personnel to the site being monitored.

The platforms also supports both Avigilon and ONVIF compliant cameras, using real-time alarm notifications on any desktop or mobile device to bring attention to critical events requiring the most immediate attention.
Probably the greatest asset of Avigilon Blue is its simplicity. What looks like a cable-box or router, the compact blue box that houses Avigilon Blue can be located anywhere in the facility reachable by network cabling. The software is intuitive and easy to configure even for IT novices. Furthermore, Avigilon Blue is highly scalable. As the need for expansion arises, Avigilon Blue can keep pace.

The platform is powered by Microsoft Azure and leverages cloud services that are built, deployed, and managed through a global network of trusted datacenters, providing enterprise-grade security right out of the box.
Avigilon Blue aims to be a game changing security platform for enterprises both great and small. As the industry moves more and more into the cloud, Avigilon Blue will be leading the way on the bleeding edge of hosted security services for the coming years.

Security Technology of South Texas is an Authorized Dealer and Integrator for Avigilon. We have the experience and commitment to excellence to give your business the security measures  it needs to keep your product, employees, and site safe.
 Call Us 24/7 at (210)-446-4863
 or email at
Source: Avigilon.com