Our new Cyber Protection Program infographic highlights the importance of a mitigating security risks. Learn more about the Tyco Security Products Cyber Protection Program here.
Safran Morpho biometric readers provide fingerprint and turnstile application access control for sensitive, high-traffic environments where convenience, speed and security are a priority.
The C•CURE 9000/Safran Morpho solutions are ideal for security critical areas such as server rooms, pharmacies, bank vaults and more. Doors fitted with Safran Morpho biometric solutions are integrated to C•CURE 9000 with MorphoManager.
- MorphoAccess Sigma Series – best-of-breed finger identification terminal with time & attendance option
- MorphoAccess Sigma Lite Series – finger identification terminal designed to equip narrow mounting surfaces
- MorphoWave Tower – contactless access control with a wave of a hand
The National Institute of Standards and Technology (NIST) developed an IT asset management and cybersecurity best practices guide for the financial services sector. Tyco Security Products served as a collaborating vendor for the creation of this guide. The guide provides a comprehensive view of how to implement standards-based cybersecurity technologies to reduce vulnerabilities, improve response to security alerts and increase resilience. Security engineers and installers will find examples of installation, configuration and integration tips to increase cybersecurity resilience.
Cybersecurity Risk Factors
IT asset management (ITAM) lays the foundation to implementing an effective cybersecurity strategy. Consider risk factors like size, sophistication, risk tolerance and threat landscape. Often the challenge users face is tracking a diverse set of hardware and software. Lack of control of the entire system is another challenge confronted by companies. Many have several different third-party technologies and various contractors involved, which makes a standard across the products a challenge.
Financial Services NIST Cybersecurity Practice Guide
The guide details security characteristics and best practices for addressing security controls that should be considered by security program managers. Learn more about:
- Managing assets connected to the enterprise network
- Developing accountability
- Detecting and alert authorities
- Develop software restriction policies
- Tracking assets on the system
- Reducing risk on data encryption, authentication, incident reporting, scanning and more
If you have feedback on the guide or further questions email firstname.lastname@example.org.
The National Cybersecurity Center of Excellence, part of NIST, addresses businesses’ most pressing cybersecurity problems with practical, standards-based example solutions using commercially available technologies.
Learn more about Tyco Security Products cyber protection program.
As with any industry, there are a slew of acronyms that are used. Cybersecurity is no different. To completely understand the standards and best practices for cybersecurity, you must understand the various groups and terminology being used.
Tyco Security Products Cyber Protection Program
Developed over five years from providing critical solutions to the U.S. Government and other multi-national customers, Tyco Security Products Cyber Protection Program is one of the first in the industry to offer a holistic, six-part approach to cyber security for physical security products. We have effectively worked with government agencies to meet the appropriate standards and validations. Below is an explanation of many of the various cyber security groups and common terminology used.
Federal information Processing Standards (FIPS) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with agencies.
Having a FIPS validation ensures that encryption completed properly. Test results are validated by the United States National Institute of Standards and Technology (NIST), yet another acronym.
The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against threats. View the Tyco Security Products FISMA-ready configuration guidelines. These guidelines apply to Software House CCURE 9000 and American Dynamics victor video management system (VMS) software and VideoEdge network video recorders.
The North American Electric Reliabilty Corporation (NERC) is a non-profit organization that works with all stakeholders to develop standards for power system operation, monitoring and enforcing compliance with those standards.
NERC Critical Infrastructure Protection (CIP) is 9 standards and 45 requirements covering the security of electronic perimeters and the protection of critical cyber assets as well as personnel and training, security management and disaster recovery planning. View the Tyco NERC-CIP V5 ready configuration guidelines for Software House CCURE and iStar.
The Defense Information Systems Agency (DISA) is a United States Department of Defense (DoD) agency that provides information technology (IT) and communications support to any individual or system contributing to the defense of the United States.
Security Requirement Guide (SRG) is compilation of singular, actionable statements that comprise a security control or security best. An SRG is used by DISA field security operations and vendor guide developers to build security technical implementation guides (STIGs). I know we cannot stop with the acronyms. A STIG is a guide for implementing IT systems within the DoD. View the Tyco DISA security requirements for VideoEdge using the General Purpose Operating System SRG.
System Administration Networking and Security (SANS) released Top 20 security vulnerabilities. These are security controls for protecting a network. VideoEdge and victor have been designed and have had the necessary features implemented to assist our installers and users with configuring their networks in the manner they need to implement the SANS controls they elect.
Learn more about our cyber protection program.
Software House C•CURE 9000 security and event management solution is now integrated with NEDAP AVI vehicle and driver identification technology .
When integrated with the C•CURE 9000, NEDAP AVI identification readers can identify vehicles and/or people from long-range distances, making the readers ideal for parking access applications, managing logistics and for weighing installations and mining safety applications. NEDAP AVI identification systems ensure that only vehicles with authorized drivers can access restricted areas while keeping traffic moving through access gates. Vehicles and their operators can be authorized for entry while their vehicles are still moving, and can be identified by the readers through closed windows, increasing passenger safety and overall efficiency.
“The NEDAP AVI identification solution is an integral component in our intelligent physical access control portfolio,” said Rafael Schrijvers, Access Control Product Marketing Manager, EMEA, Tyco Security Products. “With the integration of NEDAP AVI with C•CURE 9000, we offer the most convenient and secure solution for identifying vehicles and persons entering and exiting your protected area.”
The C•CURE 9000-integrated NEDAP AVI identification solution uses UHF tags that can be deployed as passive, battery-operated tags. The UHF tags can be read from distances up to 33 feet and use a circular polarized antenna to provide freedom of tag placement and orientation. NEDAP AVI’s license plate reader automatically reads number license plates and uses an all-in-one camera, analyzer and IR illuminator. The reader is embedded with onboard processing software that can be configured through a web interface and has a range of up to 19 feet. The NEDAP AVI reader supports a large range of IR-reflective license plates, including most European countries.
The NEDAP AVI readers feature easy installation and user set up and can be configured through a web interface. An optional Wiegand Interface Module for the camera is also included.
For more information on this integration, visit the Software House Nedap AVI Long Range Identification System page.
Developed over five years, Tyco Security Products Cyber Protection Program is one of the first in the industry to offer a holistic approach to cybersecurity for physical security products. We’re committed to cybersecurity through a product’s entire lifecycle — from requirements through obsolescence.
We’ve developed our cybersecurity expertise after many years of providing critical solutions for the United States government and large multinational customers, and we hold several industry firsts, including FISMA-ready access control and video solutions.
Six Part Approach to Cyber Protection
Our Cyber Protection Program’s six -part approach to cyber protection for physical security products looks far beyond components and devices and cyber security hardening. The scrutiny begins with the initial product concept and requirements, continues through analysis of system design and programming, and culminates with final testing, integration and evaluation.
- Secure Product Development Practices – Secure coding and testing reduces the possibility of inadvertently introducing vulnerabilities during product development
- Inclusive Protection of Components and Systems – Include range of capabilities to complement diverse security needs
- Configuration Guidelines for Compliance – Provide comprehensive procedures on how to configure C•CURE 9000, VideoEdge and victor systems
- Testing Procedures – Products undergo rigorous, continuous testing both internally and with an independent test house, to minimize the risk of security updates and new configurations in our cyber-compliant products
- Rapid Response to Vulnerabilities – Quickly assesses the situation, distributes an advisory bulletin and follow up with fully qualified patches
- Education and Advocacy – Maintain critical training and development certifications, speaks and advocates for cyber protection for security systems
Tyco’s Cyber Protection Team
Our autonomous cyber protection team, an independent branch of the development group, has deep process control knowledge and specialized expertise in cyber concerns with physical security systems.
Learn more about our Cyber Protection Program and how we are working to protect physical security products from attacks, damages, disruptions and misuse.
Tyco International PLC received Safety Act designation for Software House C•CURE 9000 and iSTAR controllers. According to the U.S. Department of Homeland Security, the Safety Act provides important legal liability protections for providers of Qualified Anti-Terrorism Technologies – whether they are products or services.
The goal of the SAFETY Act is to encourage the development and deployment of effective anti-terrorism products and services by providing liability protections. A rigorous review of the products, our development processes, documentation, training, tech support, and more is required in order to receive the designation.
The Tyco Security Products Connected Program integrates with a range of third-party technology partners to create valuable security systems. View all of our approved integrations on our new connected program compatibility matrix.
The new Connected Program compatibility matrix allows you to:
- Select any integrated technology partner solution including access control, intrusion, video, fire alarm, RIFD and more
- Quickly view integration details including driver version, certifications, supported server and client operating systems and more
- Download integration details, release notes, user guides and additional resources
If you have any questions or comments, contact the Connected Program team at email@example.com.
Tyco Security Products announced as of 13 May 2016, it has acquired substantially all of the assets of Innometriks and 2DogsStudios, developers of high assurance readers, software and mobile solutions for FIPS-201 (Federal Information Processing Standard) smart card credentials.
This acquisition strengthens Tyco Security Products’ position in the federal market by adding the Innometriks team’s open, seamless high-assurance solution integrated directly into Tyco Security Products’ Software House C•CURE 9000 access control and security management ecosystem, as well as enabling the ability to integrate with systems from other manufacturers. This is achieved with an open architecture that moves government credential authentication directly into the physical access panel, and leveraging OSDP (Open Supervised Device Protocol) capable readers. These combined technologies will become part of Tyco Security Products’ access control solution portfolio.
The combination of Tyco Security Products and Innometriks creates an offering that provides a fast, open, modular, and cost effective solution for high assurance needs. The benefits of this acquisition not only extend to the government market, but also to commercial customers who require high assurance access control systems. We are very excited to have the Innometriks and 2DogStudios become a part of our access control solutions and future roadmaps.