Category Archives: Blog

High-end Multi-zone London Development Chooses Tyco Security Products’ C•CURE 9000 Security and Event Management System

The Challenge
The new Ludgate site, a high-end central London multi-zone development,  required a new integrated security solution. Systems such as video surveillance, access control and video door intercoms combining to create a total security solution using a single interface.

New Ludwig
The Solution
Together, Universal Security Systems and Land Securities chose Tyco Security Products’ C•CURE 9000 Security and Event Management system to unite the New Ludgate buildings’ management, access control and video surveillance systems for comprehensive management of the site’s physical security.

Benefits
  • Rich integration with victor Unifying Client improved – access, video, and intrusion
  • Single server for managing security and events for video, access control, intrusion, central station, fire, real-time location, and other supported systems
  • Visitor management web portal for appointment management that expedites the visitor check-in/out process at the front desk
  • Conditional Access and Dynamic Area Management for areas needing supervised entry and occupancy for increased security
  • Enterprise multi-version software upgrades remain operational while progressively upgrading each server node without needing to take an entire system out of service
  • Event linking and cross-product association for event activations across dispersed security systems with associated time-synchronized video

Proximex Surveillint Enterprise and Surveillint Essentials Change Notification

Notification date: January 20, 2017

This letter serves as official notification from Tyco Security Products that Proximex Surveillint Enterprise and Surveillint Essentials will be entering Maintenance Mode. Tyco Security Products will continue to provide support services, critical software patches, and integration updates for Releases 7.1, 8.0 and 8.1 until May 31, 2020 for customers covered by a software support agreements (SSAs). After this date, all support services for the products are unavailable and the products will be obsolete.

If you have a software support agreement (SSA) you will continue to receive support until the end date of the agreement. You may continue to renew your SSA in one (1) year increments until January 31, 2019. Support agreements will no longer be available for sale after this date.

If you need any further clarification or have any questions please contact your local sales representative

Sincerely,

Jeffrey Barkley
Product Manager

80% of IoT apps not tested for vulnerabilities, report says

Tyco Security Products Cyber Protection Program

A new report from the Ponemon Institute, IBM, and Arxan claims that just 20% of IoT apps are actually tested for vulnerabilities.  In addition 46% were sure their organization experienced a breach due to an insecure IoT app. We encourage all of Tyco Security Products customers to take cyber-security seriously. That is why we have developed a Six Part Approach to Cyber Protection of Physical Security Products which includes on-going rigorous testing. Read about it and other cyber-security best practices on our Cyber Protection webpage and sign up to receive cyber-security advisories.

Penn State Upgrades Security System with Tyco Security Products Solution

The Challenge
Penn State University wanted to move to a single security and event management platform for its residence halls and other group facilities on campus.

Penn State

The Solution
Penn State selected a unified Tyco Security Products solution to protect and manage its campus.

Benefits
  • Improved image quality to quickly identify activity in a variety of lighting conditions
  • Reduced expenses retooling locks and replacing lost cards
  • Easily managed access rights and track activity of each user with powerful audit trail
  • Accelerated investigation searches with intuitive video management system interface
  • Streamlined and automated processes

Tyco Security Products Launches Shooter Detection System Integration

Tyco Security Products announced that Software House C•CURE 9000, the access-control powerhouse, now integrates with Guardian Indoor Active Shooter Detection System by Shooter Detection Systems, the world leader in gunshot detection technology.

With gun violence reaching epidemic levels, this powerful combination of C•CURE 9000 and Guardian gunshot detection reduces the margins of human error, ensuring that there are no costly false alerts while enhancing the overall security of any school, business or public venue building.

In 2016, approximately 53,920 incidents related to gun violence took place in the U.S., ranging from injuries, accidental shooting up to defensive use. Out of 363 were related to mass shootings, killing 429 people and wounding 1,473, according to the Gun Violence Archive, which catalogues such incidents. A mass shooting is defined as a single shooting incident which kills or injures four or more people, including the assailant*.

Mass Shootings in US*Source: http://www.gunviolencearchive.org/

In an active shooter event where every second counts, the Guardian Indoor Active Shooter Detection System combines an acoustic gunshot identification software with infrared camera gunfire flash detection. When combined with powerful C•CURE 9000 event management and access monitoring features, the system provides the ability for instant shot location information, lock down procedures, live and recorded video from cameras in the incident related areas, and provides immediate notification to first responders through C•CURE 9000’s event action and integrated notification platforms while alerting monitoring facilities around the globe.

The nation’s top 500 enterprise security executives surveyed named the Active Shooter as this year’s top security threat facing their enterprise. This highly anticipated integration complements Tyco Security Product’s offerings with an industry-leading solution to accurately detect gunshots and provide precise location information to first responders and security professionals within a second of the first shot, without the need for human interpretation.

For more information, please fill out this form and a sales representative will be in touch with you.

Cyber Security in the News

Cyber security breaches aren’t limited to high profile incidents such as credit card information theft from retail companies or personal information theft from government organizations. As recently reported by Reuters, ThyssenKrupp AG (TKAG.DE) was subject to various cyber attacks in their steel production and manufacturing plant design divisions earlier this year, resulting in loss of technical trade secrets and project data (http://www.reuters.com/article/us-thyssenkrupp-cyber-idUSKBN13X0VW) .

cyber protection

The gravity of these incidents serve as a reminder of the importance of Cyber Security.  To help better protect your organization from similar attacks, Tyco Security Products has developed a Six Part Approach to Cyber Protection of Physical Security Products. Read about cyber security best practices for physical security on our Cyber Protection webpage and sign up to receive cyber security advisories.

PowerSeries Neo’s Partitioning Ability Proves Perfect as a Retail Store Solution

PowerSeries Neo is perfectly suited to a variety of environments- from new, custom and historic homes, through to small businesses and right up to larger commercial-scale installations. PowerG wireless technology ensures the highest reliability of communications is maintained while supporting multiple partitions, which is paramount to the scalability of the system.

Learn how PowerSeries Neo addresses the security needs of a family-owned grocery store chain in Kansas and Colorado.

The Challenge
The Thrifty King Grocery Store chain needed a system that could reliably handle transmitting alarm signals throughout various buildings across two states.

Thrifty King Grocery Store
The Solution
Thrifty King Grocery Store and its security systems integrator of choice, Alert Alarm Co., chose the hybrid, scalable, PowerSeries Neo security system with industry-leading PowerG technology.

Benefits

  • Quick, wireless installation with minimal disruption to buildings and day-to-day operations
  • Impressive wireless range through PowerG technology
  • Compatibility with Alarm.com for convenient status remote notification on smart devices

Tyco Security Products’ Cyber Protection Program’s Security Audit Tools Address Device Vulnerabilities

A recent analysis of Internet of Things device traffic identified various IoT connected devices that were exhibiting potentially dangerous behaviors including using plain-text HTTP protocol for authentication or firmware updates, leaving them susceptible to sniffing and man-in-the-middle attacks.

security-audit-docx

As part of its Cyber Protection Program, Tyco Security Products considers security at the beginning of the product development process resulting in features and capabilities needed to secure the product in its environment.  For example, VideoEdge NVRs provide a Security Audit page that allows integrators and end-users a single view of their security posture of the device.

The audit page is an important tool for customers, giving them visibility on all accounts with remaining default passwords, enable / disabled status of ports and protocols such as HTTP, TLS certificates, and user security configurations such as password complexity, auto logout, account lockout.

Tyco Security Products’ is committed to cybersecurity.  Our holistic Cyber Protection Program combines best practices in secure product development, testing and evaluation, rapid response to potential vulnerabilities, and configuration guidelines for compliance.

One Albert Quay, Ireland’s Smartest Building, Secured by CEM Systems’ AC2000 Access Control Solution

In 2016, One Albert Quay, located in Cork City Centre, became the new global headquarters for Tyco. Tyco, will employ over 500 people in Sourcing, Procurement, R&D, IT, Compliance, HR and Finance.

The Challenge
From construction right through to operation, One Albert Quay and Tyco needed a solution that would ensure the strictest security on the site. In addition to managing the security aspects of their global headquarters, Tyco wanted the One Albert Quay building to be a showroom for Tyco technology.

One Albert QuayBenefits
The Solution
From the construction phase of One Albert Quay through to the development and opening of this smart building, CEM Systems provided a range of security technologies that go beyond access control to ensure the highest levels of security, safety and convenience for all employees.

CEM Systems’ AC2000 is deployed as access control for the entire One Albert Quay building, used by all tenants including Tyco. AC2000 combined with emerald intelligent access terminals in the lobby area and throughout the offices provides the highest levels of access control and helps improve operational efficiency with a range of built-in features including VoIP intercom, Time & Attendance, room booking, advertising display and many more.

AC2000 Ablbert Quay
Benefits
  • Improved staff safety with emerald Checklist feature promoting Environmental H&S policies during the construction phase
  • Increased security in high security areas with biometric verification
  • Improved operational efficiency with emerald remote applications, built in audio intercom and room booking
  • Improved user experience with AC2000 integrations to car park access and smart buttonless lift system

Read the entire case study.

Contact our sales team to learn more about how to utilize our solution for your environment.

Competing hackers dampen the power of Mirai botnets

In a recent article published by PC World, the malware behind last month’s distributed denial-of-service attacks is losing its potency as hackers compete for control of IoT devices. As we reported in a recent Tyco Security Products Security Advisory, be sure to disable remote access if it’s not critical, change the password to a complex password, and reboot the device.  Be sure to complete these steps in this order rather than reboot it first – as this article states, competing hackers are quickly re-infecting the devices, sometimes within 30 seconds of the device being rebooted and going back online.  (Read the Article)

Cyber Security

Sign up to receive Tyco Security Products Cyber Security Advisories and read about other cyber security best practices on our Cyber Protection webpage.