Category Archives: Blog

Kantech simplifies multi-door access control with KT-400’s Standalone Mode

Kantech has introduced a new standalone mode for the Kantech KT-400 four door controller, allowing smaller access control systems of up to four doors to be controlled and managed using embedded and intuitive web based software, with no EntraPass access control software required. Used in conjunction with Kantech’s ioSmart card readers and cards, these controllers provide a unique, highly secure encrypted solution for small installations.

With no dedicated software or PC hardware to purchase and maintain, the KT-400 standalone provides an economical choice for small businesses with basic access control needs, such as assigning card access and running reports. Using a web browser, customers can configure and manage their security anywhere and at any time, via a desktop computer or a mobile device.

Used in conjunction with Kantech’s ioSmart Card Readers and Cards, KT-400 standalone controllers provide highly secure encryption measures for even the smallest systems. Communications between the ioSmart card and ioSmart reader employs AES 128-bit encryption, with RS-485 secure communication in use between the ioSmart reader and the KT-400 controller.

With an easy-plug-and play set up, the system is up and running in minutes following a simple configuration wizard, which eliminates the need for training or certification of dealers and installers.

New Product Announcement

VIDEOEDGE NETWORK VIDEO RECORDER (NVR) BECOMES FIRST PRODUCT TO ATTAIN UL 2900-2-3 LEVEL 3 CYBERSECURITY READINESS CERTIFICATION FROM UL

VideoEdge Receives the Highest UL Cybersecurity Assurance Program Certification

Resilience to cyber-attack has become an important acceptance criteria for customers to base product selection on. Until now there hasn’t been an independent validation for both product and business practices designed to address the cybersecurity readiness of physical security products. When Underwriter Laboratories (UL) introduced the UL 2900-2-3, Tyco Security seized the opportunity and became the first vendor to submit a product (namely, the VideoEdge Network Video Recorder) to undergo this new certification. On March 22, 2018, VideoEdge version 5.2 became the first product to obtain UL 2900-2-3 Level 3 (L3) certification.

For more information on the UL 2900-2-3 Level 3 Cybersecurity certification, please visit http://blog.tycosp.com/ad/.

Become Our Next Technology Partner

Become Our Next Technology Partner

The Connected Partner Program brings together Tyco’s industry leading security products with innovative technology manufacturers and developers to offer integrated solutions that address our common customer’s needs.

Connected Partner Program

Interested in becoming our next Technology Partner?  Come meet us at ISC West Booth no. 20005 on April 11 – 13, 2018 in Las Vegas, NV.

For more information or to book a meeting, please email us at tspconnect@tycoint.com.

A simplified access control solution with KT-1’s Standalone Mode

Kantech’s innovative KT-1 single door controller is now available with embedded simplified access control software for one door systems, the ideal choice for those seeking a cost-effective, easy-to-use, single-door application.

With KT-1’s Standalone Mode, using a dedicated web browser, the popular KT-1 Ethernet-ready single door controller now has the option to be controlled and managed via simple and intuitive web based software – no EntraPass software is required. This makes the KT-1 a viable option for small businesses and individuals with basic access control needs such as being able to assign card access and run reports.

Full-fledged security management can be daunting for small businesses,” said Rajeev Dubey, Director of Distribution Access Control Product Management, Building Technologies & Solutions, Johnson Controls, “but KT-1 Standalone removes the complexity from that process by giving users a web-based system that ups the ante on security, while bypassing the investment required for computers and software.


With no software to install, KT-1’s Standalone option broadens the horizon for dealers and installers as well. With a simplified and quick installation option, KT-1 Standalone is appealing to an installer base beyond the traditional access control installers who can forgo having to attend training to learn a new software system or receive special certification. The wizard-based platform walks installers through the process in minutes.

Users with growing access control needs can easily migrate to the next level with Kantech EntraPass or hattrix software.

New Product Announcement

Kantech streamlines scheduling and account maintenance with EntraPass v7.40

The latest version of EntraPass Security Software launches with new features developed to streamline scheduling and account maintenance for operators.

Available in EntraPass Corporate and Global Editions, operators managing premise access control can add to security capabilities by creating actions and tasks on a daily, weekly or monthly basis with the new Action Scheduler under the Operation menu. The Action Scheduler is ideal for locations where meetings can happen at sporadic times such as town halls or other types of special events. The actions are based on the door and relay behaviors such as locking and unlocking doors, arming alarm systems and toggling relays. Users can customize actions completely by combining Action Scheduler with the powerful Smartlink Task option.

EntraPass can now intuitively automatically deactivate operators that have not logged in for a pre-determined amount of days, allowing for easier account maintenance with the Operator Auto-Deactivate feature.

The latest version of EntraPass software integrates with American Dynamics Video Edge version 5.1 and now supports exacqVision version 9.0.2, bringing added control for premise security and management.

In addition, administrators who also use Kantech’s hattrix, a cloud-based access control solution utilizing EntraPass security management software, can now more easily manage account service types and view and change account statuses with color coding for easy viewing.

New Product Announcement

ioSmart Smart Card and Multi-Technology Readers for an end-to-end encrypted access control solution

ioSmart Smart Card Readers and Cards provide a cost-effective migration from proximity cards to advanced smart card technology. The ioSmart family provides enhanced security through end-to-end AES-128 encryption over RS-485 when used with Kantech’s KT-1 or newer KT-400 door controllers but can also be used with any other access controllers using Wiegand protocol.

The readers offer an optional capacitive touch backlit keypad for enhanced security, illuminated keypad brightness and adjustable color programmable LED bar giving the ioSmart card readers an ecofriendly and esthetically pleasing design. ioSmart card readers are field firmware upgradable and have BLE hardware included, making them future proof. With both Mullion and Single Gang mounting options available, ioSmart card readers will fit any indoor or outdoor application globally. The new readers and cards are also now available in several Starter and Expansion kits.

Kantech ioSmart cards come with encrypted sectors for pre-programmed card credentials to simplify installation and have sufficient sectors open for end customers to use for other applications.* [Software to program card sectors not sold/supported by Kantech]

The ioSmart family of products is proof that end users don’t have to sacrifice usability and easy installation for higher level of security for their access control systems,” said Rajeev Dubey, Director of Distribution Product Management, Building Technologies & Solutions, Johnson Controls. “ioSmart is also a standout when it comes to esthetics enhancing the overall ambience of the facility. Apart from offering end-to-end encryption on supported Kantech products over RS-485, ioSmart readers’ ability to read several card formats over Weigand makes it an attractive option for non Kantech access control systems as well

The RS-485 configuration connected to the Kantech controllers provides additional inputs and outputs such as door contact, Request-to-Exit and/or lock output saving considerably on wiring and labor costs. The ioSmart family supports ioSmart SSF MIFARE Plus EV1 encrypted cards in addition to MIFARE Plus ISO/IEC 14443A and 14443B card serial numbers. Other supported formats include Kantech’s ioProx (XSF) and HID Prox 125KHz (Kantech Secure Format KSF, standard 32-bit format, standard 26-bit format and Corporate 1000).

New Product Announcement

Kantech Launches EntraPass v7.30 with ioSmart Technology

Introducing the latest version of the Kantech EntraPass Security Software with support for Kantech’s ioSmart Card Readers and Cards, as part of an end-to-end encrypted access control solution. EntraPass v7.30 also includes integration with HID Mobile Access® for quick and easy access to doors using a mobile phone while maintaining management of credentials through EntraPass.

Along with the newly added support for the ioSmart Smart Card Readers and Cards, EntraPass v7.30 will continue to support the ioProx Card Readers and Credentials. With the mult-technology options available on ioSmart Readers, the migration from Proximity cards to smart cards is easy with Kantech. EntraPass v7.30 now supports HID Mobile Access credentialing. The integration makes it possible for users to gain access to a facility using a credential on their smartphone from a BLE-enabled HID reader. The user receives an invitation from security personnel on their smartphone and can quickly download the credential. All credentialing is managed through the EntraPass Corporate and EntraPass Global Edition software.

“The ongoing evolution of EntraPass, with the addition of our ioSmart technology, reflects our continued focus on and acknowledgement of the changing needs of our customers,” said Rajeev Dubey, Director of Distribution Product Management, Building Technologies & Solutions, Johnson Controls. “EntraPass v7.30 is the link that puts modern, easy-to-understand and scalable access control technology into the hands of security administrators.”

This latest edition of EntraPass software offers several enhancements to the EntraPass Go, EntraPass Go Pass and EntraPass Install apps. Added to EntraPass Go, which allows remote use of the software, is a link to “auto populated fields” that assists operators by bypassing the need to filling out configuration details to start using the app. EntraPass Go Pass, the mobile credential feature, now works with Android as well as iOS devices (including Apple Watch) and supports widget use, so users can unlock doors from a widget rather than having to open an app. EntraPass Go Install has been updated with a reader driver list and the ability to switch accounts without having to log in and out. There is also a new tutorial for EntraPass Go Install with additional user information.

EntraPass v7.30 is available on Special, Corporate, and Global Editions as well as hattrix.

C•CURE 9000 Integration with Innometriks High Assurance Security Solution for Strong Identity Authentication

C•CURE 9000 security and event management system now integrates with the Innometriks High Assurance Security Solution, a FICAM approved software, for strong identity authentication. The integrated solution includes FICAM (Federal Identity, Credential, and Access Management) software, Cheetah and Rhino Smart Card Readers and ID Server for FICAM continuous vetting.

The C•CURE 9000 integration with the Innometriks FICAM software provides users with a seamless, high-assurance access control solution, which is important for government agencies that need to deploy a secure and interoperable access control solution for high security areas. Strong authentication verifies an individual’s identity using technologies including biometrics, smartcards, Public Key Infrastructure (PKI) and digital signatures to provide a level of assurance above and beyond that available through non-smartcard ID card mechanisms.

With Innometriks’ FICAM software as part of the physical access control system, integrators benefit from installing an already integrated solution through reduced installation time and implementation complexities. End users will see faster transaction times and a reduced overall cost of the system when compared with systems that take a bolt on approach.

Innometriks FICAM software is built on an open architecture platform. It integrates with many third-party readers and supports Open Supervised Device Protocol (OSDP) authentication. OSDP is a communications protocol that enables peripheral devices such as card readers and biometric readers to interface with physical access control system panels. OSDP provides another layer of sophistication through directional communication and read/write capabilities.

Software House C•CURE 9000 now includes an end-to-end approach, providing the security market with a solution that includes card registration capabilities, validation and integration with HSPD-12 (Homeland Security Presidential Directive) complaint readers.

Visit our website to learn more about Innometriks High Assurance Security Solution.

Our Shared Role in Protecting National Infrastructure from Cyber Threats

After covering cybersecurity from both a personal and business perspective, this final post for National Cyber Security Awareness Month (NCSAM) expands to security in our nation’s critical infrastructure theme – “Protecting Critical Infrastructure from Cyber Threats”.

The link between infrastructure and cybersecurity

Critical infrastructure includes the many essential systems that sustain our economy and way of life, such as electricity, railways, roadway traffic control, communication, sewage and water systems, and financial institutions. All of these essential systems have become more reliant on networked technology over the last several years, making them a target to cyber threats.

Building cyber resilience will help keep our critical infrastructure safe

Our critical infrastructure underpins our way of life, and securing these systems and technologies is essential for the nation.  Here are some suggestions to help keep the systems we depend on more secure.

  1. Start by protecting your company. The private sector owns the vast majority of the nation’s critical infrastructure and resources.* As such, one of the first steps in protecting critical infrastructure is to protect your organization’s infrastructure. Start by developing a comprehensive and coordinated business continuity plan at your company. Consider aspects such as your electricity supply, communications links, water supply and waste disposal, as well as your physical supply, storage and distribution for fuel, raw materials and products.nce you have business continuity plan in place, you should continually monitor, and improve analysis and warning capabilities for both cyber and physical threats.
  2. Secure your supply chain. Make sure hardware and key infrastructure components are secured and protected. While software vulnerabilities can cause substantial loss, they can also be fixed relatively easily when identified by updating the latest patches, firmware, or product upgrades. Hardware updates for improved security can be a more cumbersome process and often the only answer is to replace each piece of offending hardware. It’s also recommended that you implement supply chain protection measures around your products and services to help protect against both cyber and physical attacks that could comprise the integrity of the hardware and software components that may become part of the critical infrastructure. Partnering with the right product manufacturers and integrators, those with a communicated focus on cyber security, will enable critical control systems to continue to operate.
  3. Build public-private partnerships. By working together, private enterprises and public organizations can effectively confront security problems that jeopardize infrastructure. Information exchanges and cooperation can allow both sides to address awareness, vulnerability remediation, and recovery operations.

As National Cyber Security Awareness Month concludes, we encourage you to look back at the tips and strategies we’ve covered over the past month. Share them with colleagues and friends, and start implementing them.

We also encourage you to stay up-to-date by registering on the Cyber Protection Program website for product advisories and resources on topics related to your cybersecurity.

*The Department of Homeland Security (DHS), Critical Infrastructure Sector Partnerships https://www.dhs.gov/critical-infrastructure-sector-partnerships July 11, 2017.

Become a Pro About Cybersecurity

If you’ve been following our recent posts that tie in with National Cyber Security Awareness Month (NCSAM), you might be thinking “there’s a lot to know about cybersecurity!”

Truth be told, there is. And it’s relevant to every type of business and organization, in every sector. It’s not surprising that there is strong demand for cybersecurity professionals. In fact, according to a study by the Center for Cyber Safety and Education, ‘the demand for cybersecurity workers will outpace supply, by 2022 North America will have 265K more cybersecurity jobs than skilled workers, a 20% increase over the forecast made in 2015.’*

So, in line with the week 4 theme of National Cyber Security Awareness Month, if you know a student or a business professional looking for a career change, let them know – The Internet wants YOU: Consider a career in cybersecurity.

Cybersecurity knowledge gives you an edge

To increase your knowledge, there are a few smart steps you can take towards making yourself more cybersecurity savvy.

  • Take a course. Just because you don’t have experience as a computer systems analyst or network administrator doesn’t mean you can’t learn more, or contribute to your company’s cybersecurity. There are a wide variety of cybersecurity specific courses available across multiple formats and platforms (such as classroom, computer-based, and training videos). You can take them simply to educate yourself or to make a career leap, say from a database administrator to a Certified Information Systems Security Professional (CISSP).
  • Get certified. As you strengthen your cybersecurity knowledge, you may want to move towards certification. CompTIA Security+ certification and (ISC)² System Security Certified Practitioner (SSCP) are two entry-level certifications to consider. For CompTIA Security+ two years of IT administration with a security focus is recommended, not required. If you are moving towards a career change a (ISC)² SSCP certification requires a minimum of one year full-time work in one or more of the seven fields covered.
  • Get Connected. Reach out and connect with people already working in the cybersecurity field to gain more exposure and knowledge. Consider joining one of the professional organizations focused on cybersecurity, such as ISACA or (ISC)².  Attending local and national cyber security conventions such as OWASP will also help you gain insight.  You can also look for online groups focused on cybersecurity, or LinkedIn groups including the Cyber Security Forum Initiative and Information Security Careers Network. We also recommend connecting with cybersecurity experts in your city to learn more about the issues your peers are dealing with.

A little education goes a long way. All of the above are great ways to increase your knowledge while making your company, yourself and your customers more cyber safe.

In next week’s blog, we will focus on things you can do to protect critical infrastructure from cyber threats. If you missed our previous National Cyber Security Awareness Month blogs, click the links below:

>> Week – The basics of staying safe online

>> Week 2 – Cybersecurity in your workplace

>> Week 3 – Smart use of smart devices

Have you registered yet with the Cyber Protection Program for security products? Register to receive security advisories and resources on topics related to your cybersecurity.

* Center for Cyber Safety and Education – 2017 Global Information Workforce Study Benchmarking Workforce Capacity and Response to Cyber Risk – A Frost & Sullivan Executive Briefing.

** CISSP, ISACA, (ISC)², SSCP are trademarked and owned by (ISC)² all rights reserved.

*** OWASP is trademarked and owned by the OWASP Foundation all rights reserved.