Tag Archives: security

Cyber Security Assessment

Today’s businesses are faced with unprecedented threats from sabotage, theft of intellectual property and compromised sensitive data. Have you considered how your physical security products affect your cyber security?

TSP Cyber Protection Program Flowchart

Take a look at our infographic and assessment quiz to see if you are asking the right questions and taking the next step to be cyber secure.

Access the InfographicTake the Assessment Quiz
Learn more about Tyco’s industry-leading Cyber Protection Program.

Cyber Security Language

Security breaches are in the news today more than ever before. Security integrators and security officers must work with IT departments to ensure the physical security system is successfully deployed, maintained and upgraded on the network with minimal impact and without compromising network security.

cyber crime

To create a complete cyber secure environment, IT and security departments must effectively work together. However, physical security and IT often use the same words to mean different things – resulting in everyone being confused. Sometimes security integrators and security officers even avoid the IT department due to the misunderstanding.

For example, IP may mean intellectual property to a corporate security officer but internet protocol to IT security professionals. Or perimeter may mean the exterior building wall to the security officer and network connection to the outside to the IT professional.

To make sure all departments are speaking the same, common language, we suggest developing a list of terminology definitions that everyone can use.

Terms to be Clearly Defined:

  • IP
  • CredentialsTyco Security Products Cyber Protection Program
  • Key
  • Patch
  • Firewall
  • Vulnerability
  • Social engineering
  • Perimeter
  • Intrusion detection
  • Bandwidth
  • Directory
  • Security logs
  • Revocation
  • Signature

Having a common subset of terms will help you understand how to ask the right questions and quickly comprehend the answers. After establishing your company common language, clearly explain the information you need from IT to be able to define the network and security requirements.

Learn more about the Tyco Security Products Cyber Protection program.

C•CURE Go Reader Mobile App

The innovative C•CURE Go Reader mobile app extends the reach of your C•CURE 9000 system more powerfully than ever before. An inspired evolution of the C•CURE Go mobile app, C•CURE Go Reader lets you grant or deny access in even the most remote, disconnected areas such as construction sites, offline events and roaming security checkpoints.

ccure-go-reader

Using an Android device, C•CURE Go Reader pairs with a multi-technology read head to mimic a full-fledged iSTAR door, complete with schedules, clearances and holidays. As a virtual “door” in C•CURE 9000, C•CURE Go Reader inherits all clearances of an associated iSTAR door group, ensuring strict security even if you are far away from your nearest iSTAR controller.

C•CURE Go Reader provides peace of mind in many different situations:

  • Construction sites can be dangerous areas and, long before the walls of the buildings are built, security is compulsory.
  • Offsite events pose unique security challenges for companies who need to safeguard employees and visitors with limited physical boundaries.
  • Roaming security checkpoints allow your guards to spontaneously check access badges in hallways or near secured areas.
  • Roll calls are extremely important, to make sure employees have evacuated during emergency situations.
  • C•CURE Go Reader makes it easy to verify that employees have reached the designated areas during the emergency.

Visit our webpage for more information.

Cyber Protection Program – Security Features

What Comes After Device Hardening?

It’s common knowledge that encrypted communication and other device hardening features are necessary for cybersecurity, but it’s vitally important to think beyond hardening.  Now that the security industry has adopted IP technology, manufacturers and integrators must consider not only the security operator’s needs, but also those of the IT manager.

An unsecured device can be the target of a cyber attack that might affect the entire network. While IT managers in government agencies, utilities, transportation, retail operations and financial enterprises are most acutely aware of the dire consequences of a successful hack, IT managers in all sectors are demanding security measures that go well beyond hardening before accepting devices onto their networks.

Here are four features that Tyco Security Products offers to achieve network acceptance for our Software House C•CURE 9000 Access Control Systems and American Dynamics victor Unified Video Management Systems that incorporate iSTAR controllers:

 

  1. Archive and Failover featuresto ensure continual operation and fast recovery
  1. LDAP Support to manage credentials.
  1. FIPS 140-2, Level 2, end-to-end validated encryption
  1. Network Storm Protection that ensures an iSTAR controller continues to operate during a denial of service attack.

Not every industry or enterprise requires the same security features for network acceptance. Our application specialists are available to advise which features are relevant to a specific application.

Learn more about our Cyber Protection Program and how we’re working to protect our physical security products from attacks, damage, disruptions and misuse.

Responding Rapidly to Security Vulnerabilities

While hardening is important, it does not guarantee that the device you install today will be secure tomorrow. Potential problems can lie dormant for years and then provide easy access for hackers when uncovered. For example, Shellshock was actually introduced as a product feature in 1989. Its vulnerability existed undetected in numerous products — including “hardened” versions of Linux and Unix operating systems — for 25 years. But within a single day of the vulnerability announcement in 2014, hackers reportedly were taking advantage of this critical bug.

At Tyco Security Products, we understand that a vulnerability discovered in one of our security products could potentially put your entire business at risk. That’s why we’ve put a team and process in place designed to deliver a fast, actionable response to help protect your investments from harm.

Our Cyber Protection Team continuously monitors for vulnerabilities using multiple resources. When a new bug is discovered, the Cyber Protection Team and key product engineers work quickly to tackle and resolve security concerns before they become critical to your operation.

This dedicated response enables us to create a security advisory, typically within 24 hours. The notification includes information about which products are vulnerable along with mitigation steps. It also lists products that we have confirmed are not vulnerable for greater peace of mind.

In the case of significant vulnerabilities, advisories are updated as needed until the issues are resolved. Quality engineers ensure that software patches are fully tested and validated. While we cannot predict how long it will take to resolve an issue, it took the team just two weeks to deliver patches for ShellShock and Heartbleed, both critical vulnerabilities.

BugHeart

Learn more about our Cyber Protection Program and how we’re working to protect our physical security products from attacks, damages, disruptions and misuse. You can also sign up to receive security advisories.

EyeLock nano NXT Advanced Iris Reader Integration with C•CURE 9000

High Security Made Simple

The integration of C•CURE 9000 security and event management system and EyeLock nano NXT biometric iris reader gives you powerful identity authentication and security capabilities for a complete biometric access control management system.Eyelock Integration

The integration with C•CURE 9000 allows cardholder names and card numbers setup in C•CURE 9000 to be seen in EyeLock Identity Suite so that this information does not have to be re-entered during the iris enrollment process. Once enrollment is complete, the information stays synced. The integration also allows for the intelligent distribution of iris templates to nano NXT iris readers and will only be stored on devices at doors that each cardholder has access to according to C•CURE 9000.

Unparalleled Efficiency

The nano NXT authenticates up to 20 people per minute, in-motion and at-a-distance with unparalleled accuracy. EyeLock’s advanced technology converts the unique characteristics of each iris into a complex encrypted code that maximizes security and minimizes breach potential. With a false accept rate of only 1 in 1.5 million for a single eye, EyeLock’s iris identity authentication ensures both unparalleled accuracy and security.

Visit our webpage for more information.

Software House Launches Safran Morpho Biometric Readers

Safran Morpho biometric readers provide fingerprint and turnstile application access control for sensitive, high-traffic environments where convenience, speed and security are a priority.

The C•CURE 9000/Safran Morpho solutions are ideal for security critical areas such as server rooms, pharmacies, bank vaults and more. Doors fitted with Safran Morpho biometric solutions are integrated to C•CURE 9000 with MorphoManager.

  • MorphoAccess Sigma Series – best-of-breed finger identification terminal with time & attendance option
  • MorphoAccess Sigma Lite Series – finger identification terminal designed to equip narrow mounting surfaces
  • MorphoWave Tower – contactless access control with a wave of a hand​

Visit our webpage for more information.

Software House Now Integrated with NEDAP AVI Vehicle/Driver Identification Readers

Software House C•CURE 9000 security and event management solution is now integrated with NEDAP AVI vehicle and driver identification technology .

NEDAPWhen integrated with the C•CURE 9000, NEDAP AVI identification readers can identify vehicles and/or people from long-range distances, making the readers ideal for parking access applications, managing logistics and for weighing installations and mining safety applications. NEDAP AVI identification systems ensure that only vehicles with authorized drivers can access restricted areas while keeping traffic moving through access gates. Vehicles and their operators can be authorized for entry while their vehicles are still moving, and can be identified by the readers through closed windows, increasing passenger safety and overall efficiency.

“The NEDAP AVI identification solution is an integral component in our intelligent physical access control portfolio,” said Rafael Schrijvers, Access Control Product Marketing Manager, EMEA, Tyco Security Products. “With the integration of NEDAP AVI with C•CURE 9000, we offer the most convenient and secure solution for identifying vehicles and persons entering and exiting your protected area.”

NEDAPThe C•CURE 9000-integrated NEDAP AVI identification solution uses UHF tags that can be deployed as passive, battery-operated tags. The UHF tags can be read from distances up to 33 feet and use a circular polarized antenna to provide freedom of tag placement and orientation. NEDAP AVI’s license plate reader automatically reads number license plates and uses an all-in-one camera, analyzer and IR illuminator. The reader is embedded with onboard processing software that can be configured through a web interface and has a range of up to 19 feet. The NEDAP AVI reader supports a large range of IR-reflective license plates, including most European countries.

The NEDAP AVI readers feature easy installation and user set up and can be configured through a web interface.  An optional Wiegand Interface Module for the camera is also included.

For more information on this integration, visit the Software House Nedap AVI Long Range Identification System page.