Tag Archives: intrusion security

PowerSeries Neo’s Partitioning Ability Proves Perfect as a Retail Store Solution

PowerSeries Neo is perfectly suited to a variety of environments- from new, custom and historic homes, through to small businesses and right up to larger commercial-scale installations. PowerG wireless technology ensures the highest reliability of communications is maintained while supporting multiple partitions, which is paramount to the scalability of the system.

Learn how PowerSeries Neo addresses the security needs of a family-owned grocery store chain in Kansas and Colorado.

The Challenge
The Thrifty King Grocery Store chain needed a system that could reliably handle transmitting alarm signals throughout various buildings across two states.

Thrifty King Grocery Store
The Solution
Thrifty King Grocery Store and its security systems integrator of choice, Alert Alarm Co., chose the hybrid, scalable, PowerSeries Neo security system with industry-leading PowerG technology.

Benefits

  • Quick, wireless installation with minimal disruption to buildings and day-to-day operations
  • Impressive wireless range through PowerG technology
  • Compatibility with Alarm.com for convenient status remote notification on smart devices

Tyco Security Products’ Cyber Protection Program’s Security Audit Tools Address Device Vulnerabilities

A recent analysis of Internet of Things device traffic identified various IoT connected devices that were exhibiting potentially dangerous behaviors including using plain-text HTTP protocol for authentication or firmware updates, leaving them susceptible to sniffing and man-in-the-middle attacks.

security-audit-docx

As part of its Cyber Protection Program, Tyco Security Products considers security at the beginning of the product development process resulting in features and capabilities needed to secure the product in its environment.  For example, VideoEdge NVRs provide a Security Audit page that allows integrators and end-users a single view of their security posture of the device.

The audit page is an important tool for customers, giving them visibility on all accounts with remaining default passwords, enable / disabled status of ports and protocols such as HTTP, TLS certificates, and user security configurations such as password complexity, auto logout, account lockout.

Tyco Security Products’ is committed to cybersecurity.  Our holistic Cyber Protection Program combines best practices in secure product development, testing and evaluation, rapid response to potential vulnerabilities, and configuration guidelines for compliance.

National Cyber Security Awareness Month

October was National Cyber Security Awareness Month. As a trusted global leader, Tyco Security Products has developed a Cyber Protection Program and dedicated cyber protection team to lead the way in identifying, informing and developing cyber secure physical security products.

cyber awareness month_Future-threats

 

In case you missed any of our resources, here they are again:

Follow us to engage in the cyber security conversation and learn more about Tyco Security Products cyber protection program.

Cyber Security Assessment

Today’s businesses are faced with unprecedented threats from sabotage, theft of intellectual property and compromised sensitive data. Have you considered how your physical security products affect your cyber security?

TSP Cyber Protection Program Flowchart

 

Take a look at our infographic and assessment quiz to see if you are asking the right questions and taking the next step to be cyber secure.

Access the InfographicTake the Assessment Quiz
Learn more about Tyco’s industry-leading Cyber Protection Program.

Cyber Security Language

Security breaches are in the news today more than ever before. Security integrators and security officers must work with IT departments to ensure the physical security system is successfully deployed, maintained and upgraded on the network with minimal impact and without compromising network security.

cyber crime

To create a complete cyber secure environment, IT and security departments must effectively work together. However, physical security and IT often use the same words to mean different things – resulting in everyone being confused. Sometimes security integrators and security officers even avoid the IT department due to the misunderstanding.

For example, IP may mean intellectual property to a corporate security officer but internet protocol to IT security professionals. Or perimeter may mean the exterior building wall to the security officer and network connection to the outside to the IT professional.

To make sure all departments are speaking the same, common language, we suggest developing a list of terminology definitions that everyone can use.

Terms to be Clearly Defined:

  • IP
  • CredentialsTyco Security Products Cyber Protection Program
  • Key
  • Patch
  • Firewall
  • Vulnerability
  • Social engineering
  • Perimeter
  • Intrusion detection
  • Bandwidth
  • Directory
  • Security logs
  • Revocation
  • Signature

Having a common subset of terms will help you understand how to ask the right questions and quickly comprehend the answers. After establishing your company common language, clearly explain the information you need from IT to be able to define the network and security requirements.

Learn more about the Tyco Security Products Cyber Protection program.

PowerSeries Neo Delivers Around-the-Clock Security for Millworks Custom Manufacturing

Learn how PowerSeries Neo overcomes tough installation challenges to meet the evolving needs of a Toronto furniture manufacturer

Challenge

Millworks Custom Manufacturing needed to secure its 140,000 square foot facility, but the building shape, steel construction, and expansion plans ruled out a traditional security system.

Solution

Millworks Custom Manufacturing and All Seasons Security chose Tyco Security Products’ DSC PowerSeries Neo; a scalable, hybrid wired-wireless intrusion system with PowerG technology.

PoweerSeries Neo

Benefits

  • Quick, wireless installation minimized disruption to production
  • Robust protection against lost alarm messages, signal interference or frequency blocking
  • Highly flexible solution, offering remote monitoring and easy expansion to adjacent buildings

Read the full case study to learn how the special features of PowerSeries Neo holistically addressed Millworks Custom Manufacturing’s unique needs.

Camosun College Utilizes Tyco Security Products for Complete Security Solution

Challenge

Camosun College is a multi-campus, community college with a student population of approximately 16,000. Located in Victoria, British Columbia, the college offers more than 160 academic programs and includes two campuses.

With new construction taking place on campus along with renovation, Camosun College sought an integrated security solution that could integrate with their existing Kantech access control system and existing cameras while also cost-effectively upgrading to newer, easier to use IP technology.

Camosun College

Solution

Camosun College selected Tyco Security Products to provide a complete security solution. Tyco’s video surveillance, intrusion and access control system allowed the college greater control to operate all security systems from one, easy-to-use interface.

EntraPass

Benefits

  • Saves time and money with faster response to critical alarms
  • Quicker investigations and simpler for employees to navigate
  • Easy operation through one integrated interface
  • Cost-effective migration from analog to IP video system
  • Support for entire security system from one company
  • Protect campus’ students, staff and visitors
Camosun Case Study

Commercial Wireless Intrusion: It’s Becoming Reality

Often integrators and systems installers don’t think of wireless intrusion as a first option for a commercial customer. Historically, wireless intrusion solutions have been seen as unreliable, plagued by interference and offering a short battery life. But it’s time to reconsider wireless intrusion’s suitability for commerce and examine just what current systems have to offer, given recent technological advances.

Poor reliability and substantial interference have been the two biggest complaints about wireless intrusion. The introduction of frequency hopping within wireless devices has solved some of this. Frequency hopping allows an intrusion device to hop around channels within the specified frequency at a constant pace to find the clearest signal, making it difficult to hack or penetrate. Frequency hopping divides a large frequency band into 50 channels, which translates to less interference and increased reliability. Adaptive path technology then finds the most efficient path to the intrusion panel so that, together with frequency hopping and 128-bit encryption, devices can communicate to one another easily and securely.

Another technology that benefits wireless intrusion is two-way synchronous communication or TDMA. With traditional one-way devices, there is no communication between an alarm device and the panel. Two-way devices allow for back and forth communication and result in less noise, which can be a problem when using a large number of devices.

Neo Collage Feb20 2015 update

Ease of installation and low maintenance are musts for the commercial intrusion market. The adaptability of cutting-edge wireless intrusion systems makes installation even easier. Already simple to install because wireless systems do not require installers to pull wire, installers can now install or update devices at any time. In addition, new technology in wireless devices can help an installer identify signal strength issues before mounting a sensor, for example.

Along with providing powerful analytic options and remote management, two-way communication makes maintenance and troubleshooting easier. Remote management allows installers and end users to solve problems without having to visit each device in person. Technology like this saves both the installer and end user time and money, providing faster troubleshooting and less down time.

The efficiency of all these advancements, including adaptive path technology and frequency hopping, results in battery savings. Battery power is no longer eaten up by signals that go nowhere or are inefficient, one-way communications. Plus these systems do not require high-capacity batteries. Add to this a longer batter life, typically five to eight years, and the user sees significant cost savings with wireless intrusion technology when it comes to battery power.

PowerG circle graphic

As technology in general has evolved, so too has wireless technology. Personal computers, which at one time required an Ethernet cord to connect to the Internet, now rely on wireless technology to transmit information. The same is true for the movies we watch, which can now be streamed wirelessly and directly to the television set.

As the use of wireless intrusion systems has grown it has provided the commercial user with the convenience of easier installation and maintenance, battery savings, and most importantly, high reliability. With these evolutions in technology and reliability, wireless intrusion is becoming not only a viable option in the commercial market, but could become the preferred choice of the future.

Learn more about PowerG 2-way wireless communication and the technologies from Tyco Security Products enabling this move into the commercial space.