Tag Archives: access control security

Expand Policy Enforcement and Increase Operational Efficiencies with C•CURE 9000 v2.60

C•CURE 9000 v2.60 includes features that are invaluable to airports, government buildings and other large-scale facilities because they automate processes improving operational efficiencies, and provide process and procedure accountability for meeting compliance standards. This latest version of the C•CURE 9000 security and event management platform also supports IPV6 address protocols for the iSTAR Ultra door controller and introduces a new C•CURE 9000 Web Client user interface.

CC9000-iSTAR-Ultra_p3_07_na_v

  • Customizable access control workflows for more efficient management of access credentials
  • Visitors can easily look up an appointment and register using a self-service kiosk
  • Funnel card holder access after-hours through a central entry point for visual identity by security personnel
  • Allow users to add expiration dates to clearances reducing the need for multiple clearances
  • Automate screening selection for high security areas with random screening feature
  • Restrict access to sensitive areas with n-person rule and team rule
  • iSTAR Ultra support for IPv6 network protocol standards
  • And much more!

Cyber Security Assessment

Today’s businesses are faced with unprecedented threats from sabotage, theft of intellectual property and compromised sensitive data. Have you considered how your physical security products affect your cyber security?

TSP Cyber Protection Program Flowchart

Take a look at our infographic and assessment quiz to see if you are asking the right questions and taking the next step to be cyber secure.

Access the InfographicTake the Assessment Quiz
Learn more about Tyco’s industry-leading Cyber Protection Program.

Cyber Security Language

Security breaches are in the news today more than ever before. Security integrators and security officers must work with IT departments to ensure the physical security system is successfully deployed, maintained and upgraded on the network with minimal impact and without compromising network security.

cyber crime

To create a complete cyber secure environment, IT and security departments must effectively work together. However, physical security and IT often use the same words to mean different things – resulting in everyone being confused. Sometimes security integrators and security officers even avoid the IT department due to the misunderstanding.

For example, IP may mean intellectual property to a corporate security officer but internet protocol to IT security professionals. Or perimeter may mean the exterior building wall to the security officer and network connection to the outside to the IT professional.

To make sure all departments are speaking the same, common language, we suggest developing a list of terminology definitions that everyone can use.

Terms to be Clearly Defined:

  • IP
  • CredentialsTyco Security Products Cyber Protection Program
  • Key
  • Patch
  • Firewall
  • Vulnerability
  • Social engineering
  • Perimeter
  • Intrusion detection
  • Bandwidth
  • Directory
  • Security logs
  • Revocation
  • Signature

Having a common subset of terms will help you understand how to ask the right questions and quickly comprehend the answers. After establishing your company common language, clearly explain the information you need from IT to be able to define the network and security requirements.

Learn more about the Tyco Security Products Cyber Protection program.