Category Archives: Company News

YMCA OF CENTRAL FLORIDA CHOOSES SOFTWARE HOUSE SECURITY SOLUTIONS

The Challenge

The Dr. P. Phillips YMCA is the largest among the 25 locations operated by the YMCA of Central Florida. The center received an $11 million renovation. About 26,000 square feet was added to the center and another 30,000 square feet renovated. It now serves some 11,000 active members. A key part of the renovation project was to upgrade to an access control system that would address the issues related to tracking and verifying visitors, and ensuring that these visitors entering the facility were current registered members.

The Solution

To address the major issues – increasing security by restricting access of non-members and verifying member identity – the Dr. P. Phillips YMCA selected an access control system that deploys both physical barriers and biometrics, riding on Software House C-CURE 9000 security and event management platform to control the flow of people and the accuracy of data.

Benefits

  • Easy management through one integrated system
  • iDentytech biometric readers for more accurate member identification
  • Automatic Systems glass turnstiles to hold people until information is verified

Read the entire case study

Introducing the Innometriks and Software House Fully Integrated End-to-End High Assurance Solution

The Software House C•CURE 9000 and Innometriks High Assurance Solution is a fully integrated platform providing a robust system for the stringent identity validation needs of the Federal Government and security conscious commercial businesses. Available with the C•CURE 9000 Version 2.7 Service Pack 2 release, the updated and enhanced offering provides streamlined setup and configuration making the deployment of High Assurance systems quicker and less complicated.

Personnel Enrollment has also been greatly improved with the updated High Assurance solution. Enrollment is now done through the familiar C•CURE 9000 user interface without the need for an additional application thus reducing system complexity and enhancing the user experience.

The High Assurance Solution supports the enhanced portfolio of Innometriks purpose-built, High Assurance readers, including the new lower cost Cheetah SE. These readers cover the breadth of security levels with multiple authentication options and centralized management of settings and firmware. In addition, support for third-party readers from several manufacturers has been added as well. All of these readers connect directly to Software House iSTAR Ultra and iSTAR Ultra SE ACMs without the need for additional hardware

One of the most significant improvements to the High Assurance solution is the deep integration within C-CURE 9000. With many “bolt on” solutions, the use of multiple vendors for main system components makes solving potential issues a nightmare increasing potential downtime. With all major system components coming from Johnson Controls, the solution can be tested thoroughly as updates are made to make sure the entire system continues running smoothly.

 

Key Features

  • Complete end-to-end High Assurancesolution
  • Updated solution is now easier to install and configure
  • Supports OSDP High Assurance readers from several manufacturersas well as advanced readers from Innometriks including the new Cheetah SE.
  • Readers connect directly to an iSTAR Ultra/UltraSE ACM. No additional hardware is required.
  • Native C•CURE 9000 enrollment

Visit our webpage for more information about the Integrated High Assurance Solution.

Innometriks Cheetah SE High Assurance Smart Card Reader. Small footprint. Big features.

The Innometriks Cheetah SE High Assurance Smart Card Reader delivers centralized reader management and FICAM solution compliance in a low cost, compact footprint. The Cheetah SE is designed to meet implementation paths recommended by NIST SP800-116, which provides Federal agencies and non-governmental organizations with risk-based guidelines for the incremental rollout of PIV-enabled access points. Cheetah SE Reader’s advanced architecture allows seamless integration into a range of existing physical access control systems for authentication and network environments for administration.

In addition, the Cheetah SE supports Software House RM Reader functionality for new and existing installations making it a great choice for users who wish to upgrade to a high assurance solution over time. The Cheetah SE supports the full capabilities of RM communications such as arming and disarming intrusion, locking and unlocking groups of doors while displaying their current mode and status, and with simple RM Reader keypad commands you can remotely activate cameras, doors, and other events as well as trigger a duress call right from a reader. Keypad commands can be configured to require card presentation and/or a PIN to validate the command.

Key Features

  • Cost effective high assurance reader for installations requiring two-factor authentication
  • Easy to deploy, flexible and highly secure authentication solution for physical access
  • Web-based, centralized reader management
  • Supports Software House RM reader functionality including intrusion and local door control
  • OSDP and OSDP Secure Channel RS-485 connectivity for broad industry compatibility
  • Contactless and contact + contactless models available
  • Indoor and outdoor configurations

Visit our webpage for more information about the Innometriks Cheetah SE.

SOFTWARE HOUSE PROVIDES CLOUD DEPLOYMENT AND ENHANCED SECURITY FOR C-CURE 9000 V2.70 SP1

C•CURE 9000 v2.70 SP1 provides software improvements for C•CURE 9000 v2.70 and new capabilities to enhance the security and safety of a facility and improve system administration.

C•CURE 9000 can now be deployed under an Infrastructure-as-a-Service (IaaS) model, reducing or eliminating the need for onsite server hardware. As demand for cloud deployments continues to grow, Johnson Controls offers a solution that enables customers to take advantage of the flexibility and resilience provided by this technology. C•CURE 9000 v2.70 SP1 provides a cloud deployable solution that can be used by enterprise companies to support the security and safety of people, buildings and assets globally while at the same time lowering system management costs.

In addition to fixes and solutions that are driven by the Software House Customer Support team and prioritized by severity and impact, C•CURE 9000 SP1 delivers additional capabilities that enhance security. While previous versions of C•CURE 9000 had the capability to designate dynamic area managers for added oversight, it didn’t meet the needs of some security teams. The addition of Area Supervisor ensures that one or more personnel designated as supervisors must accompany personnel designated as supervised into an area at all times. For example, Area Supervisor is used in retail banking when a supervisor must be in the area at all times during cash counting procedures.

Additional features in C•CURE 9000 v2.70 SP1 that elevate a site’s security are Automatic Door Unlock Control per controller and the ability to monitor disarmed events.

For more information on C-CURE 9000 v2.70 SP1, click here to download the data sheet and New Product Announcement under the Documents tab on the Software House website.

SOFTWARE HOUSE ENHANCES CENTRALIZED POLICY MANAGEMENT WHILE DELIVERING SERVICE ORIENTED CAPABILITIES WITH C•CURE 9000 v2.70

C•CURE 9000 v2.70 from Software House is one of the industry’s most powerful security management systems providing 24×7 mission critical security and safety protection for people, buildings and assets. This new version provides up-to-date capabilities and technologies that enable security departments to meet the changing requirements of corporate facility protection. C•CURE 9000 v2.70 provides security staff with a consistent, standardized approach to meet critical access control and visitor management needs for enterprises adopting agile workplace strategies.

C•CURE 9000 v2.70 makes obtaining access clearances faster and less prone to errors, with an Access Management consistent process. A card holder can now request access to a space and that request is directed to the correct personnel for approval, replacing long email chains and long response times common for access approvals. The system provides a complete audit trail of the approval or decline of the clearance for compliance purposes all natively within C•CURE 9000.

Enhanced Visitor Management capabilities within C•CURE 9000 are designed to reduce reception desk workload and speed visitor processing. New in v2.70 is the addition of visitor badge printing from the self check-in kiosk, group add which easily allows users to add a group of visitors for events, classes and conferences, and new host instructions. To increase the safety and security of a site, internal watchlists have been added for personnel and visitor management. In addition, an assistance button is now available for personnel to send an alert to the security team with one click to help provide a quick response to visitor or other personnel issues.
Enhanced management on C-CURE 9000 Platform
C•CURE 9000 v2.70 also include enhancements to C•CURE Web with support for Swipe and Show, which visually confirms a card holder with a picture in their record to reduce identity theft and social engineering attacks. This allows users to increase security using any web-enabled workstation or mobile device with C•CURE 9000.

Watch the “What’s New in C•CURE 9000 version 2.70” video for more details.

IP-ACM v2 Ethernet Door Module for a More Secure Access Control Option

IP-ACM v2 is the latest version of the IP-ACM Two-Reader Ethernet Door Module, enhancing the original IP-ACM by providing a secondary Ethernet port to connect an additional network device such as a biometric reader on the same LAN segment. The maximum lock output amperage has been increased to 0.75A per lock, allowing the IP-ACM to directly power a wider range of locking devices, plus, the output connector size has increased, for easier installation. In addition, IP-ACM v2 now supports 801.1X and TLS 1.2 secure network protocols for added protection against the threat of cyberattacks.

Like its predecessor, the IP-ACM v2 enables a pure IP edge-based access control architecture. IP-ACM acts as the interface between the local field wiring/devices and the IP network, communicating to iSTAR Ultra and iSTAR Ultra SE door controller GCM or iSTAR Ultra LT for all access decisions.

IP-ACM utilizes a customer’s network infrastructure to reduce installation costs, requiring just a single Cat 5/6 cable to each door. IP-ACM also offers compelling benefits in a hybrid solution where IP and traditional wired doors are required. Embedded lock power is provided through PoE (Power over Ethernet) for further installation savings (primary port only).

Visit our webpage for more information.

C•CURE 9000 Integration with Innometriks High Assurance Security Solution for Strong Identity Authentication

C•CURE 9000 security and event management system now integrates with the Innometriks High Assurance Security Solution, a FICAM approved software, for strong identity authentication. The integrated solution includes FICAM (Federal Identity, Credential, and Access Management) software, Cheetah and Rhino Smart Card Readers and ID Server for FICAM continuous vetting.

The C•CURE 9000 integration with the Innometriks FICAM software provides users with a seamless, high-assurance access control solution, which is important for government agencies that need to deploy a secure and interoperable access control solution for high security areas. Strong authentication verifies an individual’s identity using technologies including biometrics, smartcards, Public Key Infrastructure (PKI) and digital signatures to provide a level of assurance above and beyond that available through non-smartcard ID card mechanisms.

With Innometriks’ FICAM software as part of the physical access control system, integrators benefit from installing an already integrated solution through reduced installation time and implementation complexities. End users will see faster transaction times and a reduced overall cost of the system when compared with systems that take a bolt on approach.

Innometriks FICAM software is built on an open architecture platform. It integrates with many third-party readers and supports Open Supervised Device Protocol (OSDP) authentication. OSDP is a communications protocol that enables peripheral devices such as card readers and biometric readers to interface with physical access control system panels. OSDP provides another layer of sophistication through directional communication and read/write capabilities.

Software House C•CURE 9000 now includes an end-to-end approach, providing the security market with a solution that includes card registration capabilities, validation and integration with HSPD-12 (Homeland Security Presidential Directive) complaint readers.

Visit our website to learn more about Innometriks High Assurance Security Solution.

Why it’s Critical to Take a Multi-Faceted, Multi-Layered Approach to Mass Notification

By Jim Stankevich

The size, scope and inherently open nature of hospitals and healthcare facilities make them particularly challenging cases for notifying the masses of an event or incident. Hospitals face myriad threats from inside and outside, and thus need to be able to communicate quickly, accurately and effectively when faced with a crisis.

However, hospital personnel don’t always have or are even allowed ready access to their personal phones to receive text or voice messages, nor are many of them likely to be sitting at a desk viewing their email or viewing social media.

Instead, the bustling healthcare setting requires a multi-faceted, multi-layered network-based mass notification process so staff, patients and visitors can receive targeted, accessible information. A process like this is crucial regardless of whether there is an active shooter in the emergency department, a weather-related situation that requires action involving the whole complex and its inhabitants or a domestic dispute incident affecting specific patients, visitors or staff.

Currently many healthcare facilities are opting for text-based notification systems, which are sometimes funded by grant monies, and can work well enough if staff members have a hospital-issued phone readily available or if they are allowed to use their personal phone on the job. But some healthcare organizations don’t allow the use of personal phones being used at work, thus eliminating this major means of crisis communications.

correctional_officer_radio_istock_000006315938xlarge_ms

Another traditional way of alerting personnel has been via public address announcements (PA) using a series of codes or fictional names or codes to alert them about a particular situation. Since hospitals have PA systems that reach almost every area within the facility this is still a viable way to notify those within the building of a situation. The PA may not be ideal for every emergency situation but it is used often every day and should be connected to your automated mass notification system for that should be communicated via the PA as one means of notification.

Even when healthcare facilities have mass notification protocols in place, if the messaging can’t be delivered in a timely manner, or isn’t read immediately on a phone or email, the effectiveness is lost. Having to send messages by text or email can mean a notification that needs to be delivered quickly so staff can react accordingly is taking too long to be disseminated among the long list of employees and staff members who need to receive it. And once sent, the message could sit in someone’s inbox for minutes or even hours before they have the opportunity to see it.

Thus, a multi-layered approach tied in with a network-based access control system is critical in a setting where people are constantly on the move. Along with individual texts and emails, messages that appear as a pop-up message on computer screens at nurses’ stations even when logged off and on computers and tablets used on mobile workstations within patients’ rooms can better convey a message during a crisis. Likewise, with a highly critical situation such as an active shooter, a mass notification system should be able to incorporate a public address, visual public monitors throughout the facility, SIP IP phone system, and radios used by security personnel to reach the most people in the quickest manner possible.

An effective mass notification system should also be a “two-way system,” so personnel who are in a duress situation or are seeing a crisis unfold have the ability to send an alert to get help, not just receive an alert. With some systems, the ability to send such a message can be as simple as using two keys on a computer keyboard that, when used together, constitute a panic alarm. Additionally, computer screens or phones can be set up with icons that when used, trigger a panic or notification alarm as well.

These types of alerts not only work well in that they quickly disseminate information from someone in crisis to the appropriate responders, but if that person is being confronted by an abuser or someone who is armed, it is much less obvious to press a couple of keys than it is to pick up the phone and call for help which might escalate the situation with the person listening to the call.

Additionally, highly useful mass notification schemes are being tied into access control systems and other security monitoring systems such as video surveillance, HVAC, fire and burglar alarms, and infant abduction systems to provide a holistic approach to security.

An employee in the emergency department who is dealing with a potential gang confrontation has the ability, through the push of a button, to alert security and activate video of the incident or even lockdown doors. And if an infant abduction alarm sounds, through the integrated mass notification system, security has the ability to send messages to key personnel around the facility or within the parking structure so the chances of that child being removed from the premises is greatly reduced as well as to lock specific doors and view relevant video.

Of course, a system is only effective if everyone is familiar with it and it is working properly. It is important, therefore, to make testing and supervision of the mass notification system a requirement of the product. This not only keeps it working for when it’s desired most, but also reminds hospital staffers that they have this vital tool readily available should they need it and how to use it.

Jim Stankevich is the Global Manager for Healthcare Security & Lynx for Tyco Security

Products and is a past IAHSS board member. He can be reached by email at: JStankevich@tycoint.com

Tyco Security Products Technology Partner for NIST Cybersecurity Best Practices Guide for the Financial Services Sector

The National Institute of Standards and Technology (NIST) developed an IT asset management and cybersecurity best practices guide for the financial services sector.  Tyco Security Products served as a collaborating vendor for the creation of this guide. The guide provides a comprehensive view of how to implement standards-based cybersecurity technologies to reduce vulnerabilities, improve response to security alerts and increase resilience. Security engineers and installers will find examples of installation, configuration and integration tips to increase cybersecurity resilience.NIST

Cybersecurity Risk Factors

IT asset management (ITAM) lays the foundation to implementing an effective cybersecurity strategy. Consider risk factors like size, sophistication, risk tolerance and threat landscape. Often the challenge users face is tracking a diverse set of hardware and software. Lack of control of the entire system is another challenge confronted by companies. Many have several different third-party technologies and various contractors involved, which makes a standard across the products a challenge.

Financial Services NIST Cybersecurity Practice Guide

The guide details security characteristics and best practices for addressing security controls that should be considered by security program managers. Learn more about:

  • Managing assets connected to the enterprise network
  • Developing accountability
  • Detecting and alert authorities
  • Develop software restriction policies
  • Tracking assets on the system
  • Reducing risk on data encryption, authentication, incident reporting, scanning and more

13ITL002_nccoe_logoIf you have feedback on the guide or further questions email financial_nccoe@nist.gov.

The National Cybersecurity Center of Excellence, part of NIST, addresses businesses’ most pressing cybersecurity problems with practical, standards-based example solutions using commercially available technologies.

Download the guide.

Learn more about Tyco Security Products cyber protection program.