A new report from the Ponemon Institute, IBM, and Arxan claims that just 20% of IoT apps are actually tested for vulnerabilities. In addition 46% were sure their organization experienced a breach due to an insecure IoT app. We encourage all of Tyco Security Products customers to take cyber-security seriously. That is why we have developed a Six Part Approach to Cyber Protection of Physical Security Products which includes on-going rigorous testing. Read about it and other cyber-security best practices on our Cyber Protection webpage and sign up to receive cyber-security advisories.
Penn State University wanted to move to a single security and event management platform for its residence halls and other group facilities on campus.
Penn State selected a unified Tyco Security Products solution to protect and manage its campus.
- Software House C•CURE 9000 access control system
- Software House iSTAR door controllers
- Illustra Pro mini-dome IP cameras
- American Dynamics victor video management system
- American Dynamics VideoEdge network video recorders
- Stanley Wi-Q wireless locks
- Improved image quality to quickly identify activity in a variety of lighting conditions
- Reduced expenses retooling locks and replacing lost cards
- Easily managed access rights and track activity of each user with powerful audit trail
- Accelerated investigation searches with intuitive video management system interface
- Streamlined and automated processes
Tyco Security Products announced that Software House C•CURE 9000, the access-control powerhouse, now integrates with Guardian Indoor Active Shooter Detection System by Shooter Detection Systems, the world leader in gunshot detection technology.
With gun violence reaching epidemic levels, this powerful combination of C•CURE 9000 and Guardian gunshot detection reduces the margins of human error, ensuring that there are no costly false alerts while enhancing the overall security of any school, business or public venue building.
In 2016, approximately 53,920 incidents related to gun violence took place in the U.S., ranging from injuries, accidental shooting up to defensive use. Out of 363 were related to mass shootings, killing 429 people and wounding 1,473, according to the Gun Violence Archive, which catalogues such incidents. A mass shooting is defined as a single shooting incident which kills or injures four or more people, including the assailant*.
In an active shooter event where every second counts, the Guardian Indoor Active Shooter Detection System combines an acoustic gunshot identification software with infrared camera gunfire flash detection. When combined with powerful C•CURE 9000 event management and access monitoring features, the system provides the ability for instant shot location information, lock down procedures, live and recorded video from cameras in the incident related areas, and provides immediate notification to first responders through C•CURE 9000’s event action and integrated notification platforms while alerting monitoring facilities around the globe.
The nation’s top 500 enterprise security executives surveyed named the Active Shooter as this year’s top security threat facing their enterprise. This highly anticipated integration complements Tyco Security Product’s offerings with an industry-leading solution to accurately detect gunshots and provide precise location information to first responders and security professionals within a second of the first shot, without the need for human interpretation.
For more information, please fill out this form and a sales representative will be in touch with you.
Cyber security breaches aren’t limited to high profile incidents such as credit card information theft from retail companies or personal information theft from government organizations. As recently reported by Reuters, ThyssenKrupp AG (TKAG.DE) was subject to various cyber attacks in their steel production and manufacturing plant design divisions earlier this year, resulting in loss of technical trade secrets and project data (http://www.reuters.com/article/us-thyssenkrupp-cyber-idUSKBN13X0VW) .
The gravity of these incidents serve as a reminder of the importance of Cyber Security. To help better protect your organization from similar attacks, Tyco Security Products has developed a Six Part Approach to Cyber Protection of Physical Security Products. Read about cyber security best practices for physical security on our Cyber Protection webpage and sign up to receive cyber security advisories.
PowerSeries Neo is perfectly suited to a variety of environments- from new, custom and historic homes, through to small businesses and right up to larger commercial-scale installations. PowerG wireless technology ensures the highest reliability of communications is maintained while supporting multiple partitions, which is paramount to the scalability of the system.
Learn how PowerSeries Neo addresses the security needs of a family-owned grocery store chain in Kansas and Colorado.
The Thrifty King Grocery Store chain needed a system that could reliably handle transmitting alarm signals throughout various buildings across two states.
Thrifty King Grocery Store and its security systems integrator of choice, Alert Alarm Co., chose the hybrid, scalable, PowerSeries Neo security system with industry-leading PowerG technology.
- Quick, wireless installation with minimal disruption to buildings and day-to-day operations
- Impressive wireless range through PowerG technology
- Compatibility with Alarm.com for convenient status remote notification on smart devices
A recent analysis of Internet of Things device traffic identified various IoT connected devices that were exhibiting potentially dangerous behaviors including using plain-text HTTP protocol for authentication or firmware updates, leaving them susceptible to sniffing and man-in-the-middle attacks.
As part of its Cyber Protection Program, Tyco Security Products considers security at the beginning of the product development process resulting in features and capabilities needed to secure the product in its environment. For example, VideoEdge NVRs provide a Security Audit page that allows integrators and end-users a single view of their security posture of the device.
The audit page is an important tool for customers, giving them visibility on all accounts with remaining default passwords, enable / disabled status of ports and protocols such as HTTP, TLS certificates, and user security configurations such as password complexity, auto logout, account lockout.
Tyco Security Products’ is committed to cybersecurity. Our holistic Cyber Protection Program combines best practices in secure product development, testing and evaluation, rapid response to potential vulnerabilities, and configuration guidelines for compliance.
In 2016, One Albert Quay, located in Cork City Centre, became the new global headquarters for Tyco. Tyco, will employ over 500 people in Sourcing, Procurement, R&D, IT, Compliance, HR and Finance.
From construction right through to operation, One Albert Quay and Tyco needed a solution that would ensure the strictest security on the site. In addition to managing the security aspects of their global headquarters, Tyco wanted the One Albert Quay building to be a showroom for Tyco technology.
From the construction phase of One Albert Quay through to the development and opening of this smart building, CEM Systems provided a range of security technologies that go beyond access control to ensure the highest levels of security, safety and convenience for all employees.
CEM Systems’ AC2000 is deployed as access control for the entire One Albert Quay building, used by all tenants including Tyco. AC2000 combined with emerald intelligent access terminals in the lobby area and throughout the offices provides the highest levels of access control and helps improve operational efficiency with a range of built-in features including VoIP intercom, Time & Attendance, room booking, advertising display and many more.
- AC2000 security management system
- emerald, intelligent access terminal
- Biometric security – emerald TS300f fingerprint terminals
- sPass, intelligent card readers
- Improved staff safety with emerald Checklist feature promoting Environmental H&S policies during the construction phase
- Increased security in high security areas with biometric verification
- Improved operational efficiency with emerald remote applications, built in audio intercom and room booking
- Improved user experience with AC2000 integrations to car park access and smart buttonless lift system
In a recent article published by PC World, the malware behind last month’s distributed denial-of-service attacks is losing its potency as hackers compete for control of IoT devices. As we reported in a recent Tyco Security Products Security Advisory, be sure to disable remote access if it’s not critical, change the password to a complex password, and reboot the device. Be sure to complete these steps in this order rather than reboot it first – as this article states, competing hackers are quickly re-infecting the devices, sometimes within 30 seconds of the device being rebooted and going back online. (Read the Article)
In a recent article published by eSecurity Planet, 43 percent of IT professionals admit that cyber-attacks could be prevented with better policies around potential vulnerabilities such as weak passwords; 58 percent prioritize heightened capabilities in perimeter-based controls such as ensuring that devices are properly configured and are running the most up-to-date software. (Read the Article)
Tyco Security Products has developed a Six Part Approach to Cyber Protection of Physical Security Products. Read about it and other cyber security best practices on our Cyber Protection webpage and sign up to receive cyber security advisories.
Tyco Security Products has teamed up with SIA Education @ ISC East to offer a free education session for attendees at the ISC East show in New York, November 16-17. The session qualifies for CE hours with many relevant industry bodies.
This will be an informative session to provide a basic understanding of the wireless protocols most commonly used in today’s smart buildings and homes. It will focus on the main open protocols and PowerG as an example of a proprietary protocol.
Attendees will gain an understanding of:
- The importance of the wireless protocol when planning a building automation and/or security & safety installation
- The main applicable network topologies
- An overview of each of the main wireless protocols used in building automation and building security, and their key applications
- The key considerations for building automation and security & safety
- Relative performance of each of the wireless protocols across key aspects of building automation and security
- Options for leveraging the different wireless protocols according to the primary application(s)
If you’ll be at the ISC East show, be sure to join the class and boost your knowledge of wireless protocols.
The wireless protocols education session qualifies for CE hours with:
- ALOA – Education Credits (AEU)
- ASIS – Continuing Professional Education Credits (CPE)
- NICET- Continuing Professional Development Points (CPD)
And, don’t forget to stop by the following Tyco Security Products booths at ISC East:
ISC East 2016
Javits Center North
655 West 34th Street
New York, NY