All posts by Tyco Security Products

Tyco Security Products Launches Shooter Detection System Integration

Tyco Security Products announced that Software House C•CURE 9000, the access-control powerhouse, now integrates with Guardian Indoor Active Shooter Detection System by Shooter Detection Systems, the world leader in gunshot detection technology.

With gun violence reaching epidemic levels, this powerful combination of C•CURE 9000 and Guardian gunshot detection reduces the margins of human error, ensuring that there are no costly false alerts while enhancing the overall security of any school, business or public venue building.

In 2016, approximately 53,920 incidents related to gun violence took place in the U.S., ranging from injuries, accidental shooting up to defensive use. Out of 363 were related to mass shootings, killing 429 people and wounding 1,473, according to the Gun Violence Archive, which catalogues such incidents. A mass shooting is defined as a single shooting incident which kills or injures four or more people, including the assailant*.

Mass Shootings in US*Source: http://www.gunviolencearchive.org/

In an active shooter event where every second counts, the Guardian Indoor Active Shooter Detection System combines an acoustic gunshot identification software with infrared camera gunfire flash detection. When combined with powerful C•CURE 9000 event management and access monitoring features, the system provides the ability for instant shot location information, lock down procedures, live and recorded video from cameras in the incident related areas, and provides immediate notification to first responders through C•CURE 9000’s event action and integrated notification platforms while alerting monitoring facilities around the globe.

The nation’s top 500 enterprise security executives surveyed named the Active Shooter as this year’s top security threat facing their enterprise. This highly anticipated integration complements Tyco Security Product’s offerings with an industry-leading solution to accurately detect gunshots and provide precise location information to first responders and security professionals within a second of the first shot, without the need for human interpretation.

For more information, please fill out this form and a sales representative will be in touch with you.

Tyco Security Products’ Cyber Protection Program’s Security Audit Tools Address Device Vulnerabilities

A recent analysis of Internet of Things device traffic identified various IoT connected devices that were exhibiting potentially dangerous behaviors including using plain-text HTTP protocol for authentication or firmware updates, leaving them susceptible to sniffing and man-in-the-middle attacks.

security-audit-docx

As part of its Cyber Protection Program, Tyco Security Products considers security at the beginning of the product development process resulting in features and capabilities needed to secure the product in its environment.  For example, VideoEdge NVRs provide a Security Audit page that allows integrators and end-users a single view of their security posture of the device.

The audit page is an important tool for customers, giving them visibility on all accounts with remaining default passwords, enable / disabled status of ports and protocols such as HTTP, TLS certificates, and user security configurations such as password complexity, auto logout, account lockout.

Tyco Security Products’ is committed to cybersecurity.  Our holistic Cyber Protection Program combines best practices in secure product development, testing and evaluation, rapid response to potential vulnerabilities, and configuration guidelines for compliance.

One Albert Quay, Ireland’s Smartest Building, Secured by CEM Systems’ AC2000 Access Control Solution

In 2016, One Albert Quay, located in Cork City Centre, became the new global headquarters for Tyco. Tyco, will employ over 500 people in Sourcing, Procurement, R&D, IT, Compliance, HR and Finance.

The Challenge
From construction right through to operation, One Albert Quay and Tyco needed a solution that would ensure the strictest security on the site. In addition to managing the security aspects of their global headquarters, Tyco wanted the One Albert Quay building to be a showroom for Tyco technology.

One Albert QuayBenefits
The Solution
From the construction phase of One Albert Quay through to the development and opening of this smart building, CEM Systems provided a range of security technologies that go beyond access control to ensure the highest levels of security, safety and convenience for all employees.

CEM Systems’ AC2000 is deployed as access control for the entire One Albert Quay building, used by all tenants including Tyco. AC2000 combined with emerald intelligent access terminals in the lobby area and throughout the offices provides the highest levels of access control and helps improve operational efficiency with a range of built-in features including VoIP intercom, Time & Attendance, room booking, advertising display and many more.

AC2000 Ablbert Quay
Benefits
  • Improved staff safety with emerald Checklist feature promoting Environmental H&S policies during the construction phase
  • Increased security in high security areas with biometric verification
  • Improved operational efficiency with emerald remote applications, built in audio intercom and room booking
  • Improved user experience with AC2000 integrations to car park access and smart buttonless lift system

Read the entire case study.

Contact our sales team to learn more about how to utilize our solution for your environment.

Competing hackers dampen the power of Mirai botnets

In a recent article published by PC World, the malware behind last month’s distributed denial-of-service attacks is losing its potency as hackers compete for control of IoT devices. As we reported in a recent Tyco Security Products Security Advisory, be sure to disable remote access if it’s not critical, change the password to a complex password, and reboot the device.  Be sure to complete these steps in this order rather than reboot it first – as this article states, competing hackers are quickly re-infecting the devices, sometimes within 30 seconds of the device being rebooted and going back online.  (Read the Article)

Cyber Security

Sign up to receive Tyco Security Products Cyber Security Advisories and read about other cyber security best practices on our Cyber Protection webpage.

Many Cyber Attacks Are Preventable

In a recent article published by eSecurity Planet, 43 percent of IT professionals admit that cyber-attacks could be prevented with better policies around potential vulnerabilities such as weak passwords; 58 percent prioritize heightened capabilities in perimeter-based controls such as ensuring that devices are properly configured and are running the most up-to-date software. (Read the Article)

cyber awareness

Tyco Security Products has developed a Six Part Approach to Cyber Protection of Physical Security Products. Read about it and other cyber security best practices on our Cyber Protection webpage and sign up to receive cyber security advisories.

Learn about wireless protocols for building automation and security at ISC East

Tyco Security Products has teamed up with SIA Education @ ISC East to offer a free education session for attendees at the ISC East show in New York, November 16-17. The session qualifies for CE hours with many relevant industry bodies.

This will be an informative session to provide a basic understanding of the wireless protocols most commonly used in today’s smart buildings and homes. It will focus on the main open protocols and PowerG as an example of a proprietary protocol.

Attendees will gain an understanding of:

  • The importance of the wireless protocol when planning a building automation and/or security & safety installation
  • The main applicable network topologies
  • An overview of each of the main wireless protocols used in building automation and building security, and their key applications
  • The key considerations for building automation and security & safety
  • Relative performance of each of the wireless protocols across key aspects of building automation and security
  • Options for leveraging the different wireless protocols according to the primary application(s)

ISC East 2016 Banner

If you’ll be at the ISC East show, be sure to join the class and boost your knowledge of wireless protocols.

Register

The wireless protocols education session qualifies for CE hours with:

  • ALOA – Education Credits (AEU)
  • ASIS – Continuing Professional Education Credits (CPE)
  • NICET- Continuing Professional Development Points (CPD)

And, don’t forget to stop by the following Tyco Security Products booths at ISC East:

ISC East 2016
Javits Center North
655 West 34th Street
New York, NY

Smart Card Considerations Revealed

With the threat of card cloning and door controller interceptions ever increasing, the industry recommendation is to use smart cards to secure credentials; but for many companies the move is daunting. For small companies the concerns are about cost, knowledge and selecting the best solution to meet their needs. Larger companies will have the additional concern of scale and how they physically manage the migration process and roll out of the new smart cards; especially if multiple sites and systems are deployed globally.

CEM Systems

There are four major factors for companies to consider:

1. COST
While cost was a prohibitive factor in the beginning, we are now starting to see this change. The industry’s drive towards more secure technologies with multiple layers of encryption is pushing the cost of smart cards down. This not only offers a future proof technology platform for access control and other business functions but immediately protects against the growing threat of authentication breaches.

2. SECURITY
Although smart cards typically offer strong layers of security, companies must consider the entire security of their smart card solution from the credential right down to the reader level at the door. It is no good having a highly encrypted smart card when the card number is easily played back across a vulnerable Wiegand interface from a third party reader at the door. The communication channel between the card reader and controller must be secure. This can be achieved using secure RS485 communication protocol, as well as industry standard Open Supervised Device Protocol (OSDP), which also means customers are not tied to one manufacturer.

3. COMPATIBILITY
Think about more than just the physical security of your building or site. Ask yourself “Is this smart card technology compatible with my existing security systems, products and technology?” Choosing the right smart card solution is definitely not clear cut.

For example at some large organisations not all sites will have access control readers from the same manufacturer and crucially not all manufacturers can read from an encrypted area of a smart card. Every company has different challenges and questions such as “Can I integrate with other products using the new cards?” and ‘Will my secure card work with my other business systems?”. These are just some of the important questions you need to ask yourself and your solutions provider before choosing your smart card.

4. KEY MANAGEMENT
Ok, so you have chosen the smart card technology and solution that is right for your business. The next consideration is whether you should manage your own smart card keys? You can buy blank smart cards and self-manage your own keys or you can opt for pre-personalised smart cards from the manufacturer. Again there is no one size fits all answer here. The pros and cons need analysed depending on your business and resources. Carefully look at resources needed for self-key management, as well as the security considerations of storing your keys on site. For some projects the cost of managing their own cards could far outweigh any other cost savings made.

Other technical considerations also need to be made, for example do you want your solution to read the Unique Identifier (UID) of the cards or the Private Secure Number (PSN) and should you use diversified keys or static keys?

There are many benefits of opting for smart cards already pre-personalised. It’s the manufacturer who takes responsibility for ensuring compatibility of smart cards with third party readers and other security systems. They manage the key security and storage securely offsite and they absorb the costs associated with smart card key management – including the sourcing of NDA’s (Non-Disclosure Agreements) from external system providers.

In many cases however organizations consider control of their own keys for physical access control and other applications an essential element to security. If you do decide that user defined personalisation is the way to go, then speak to your manufacturer to see if they support you buying your own blank smart cards and if the cards are compatible with their products. Also ask your security manufacturer if they have a software utility or application within their security management system that enables you to create your own encrypted keysets in a manageable, intuitive and step-by-step way. This very often will eradicate any pitfalls of smart card encryption and transition.

CEM Systems Launches New Website

CEM Systems website has been revamped to improve user experience and share valuable CEM Systems’ industry knowledge and resources.
CEM Webpages

VISIT THE SITE NOW

What’s New?

  • Responsive site, mobile friendly
  • CEM Systems blog sharing industry topics and knowledge
  • Updated Support/Login section
    • Greater access to software and hardware installation manuals
    • Training “how-to” videos
    • Product Knowledge webinars
    • Consultant zone and AC2000 specification builder tool

Get Registered
Are you registered on the CEM Systems support section? Register today!

Harland and Wolff Chooses Tyco Security Products AC2000 Access Control Solution

The Challenge
As a large scale and potentially hazardous environment, with large numbers of people, the Harland and Wolff site presents a unique range of security challenges. Environmental Health and Safety Management is a vital part of Harland and Wolff’s business, so selecting the right security management solution was of paramount importance.

Harland and Wolff Cranes
The Solution
CEM Systems’ AC2000 access control software with key modules including Mustering and Zone Monitor, combined with S610 readers in turnstiles and S3040 portable readers for the dry dock, provided a solution that could not be circumvented and ensured accurate person count data in case of an emergency.

CEM AC2000 Security Hub Family

Benefits

  • Increased staff visibility with real time monitoring of card holder movements
  • Improved asset tracking with emerald Checklist feature
  • Mustering time reduced from 45 minutes to 9 minutes
  • Increased security in high security areas with biometric verification
  • Improved operational efficiency with emerald remote applications and built in audio intercom