IDIS video technology’s industry-beating reputation for robust cybersecurity was given a further boost last month in a series of ethical hacking attempts at the ESS+ International Security Trade Fair in Bogotá, Columbia, which attracted over 15,000 visitors and 150 exhibitors. IDIS was one of only three vendors willing to submit their technology for a public Video Security Product Hacking event and defeated all attempted attacks.
Every company is vigilant in preparing for and staying aware of the many cybersecurity risks in the modern world, and will undoubtedly have a variety of measures in place to protect against online attacks. Unfortunately, some attack vectors are less well-known or expected because they combine the physical and the digital. One example is physical mail, which can contain digital devices that pose a threat to cyber security.
Boon Edam continues to reinforce their position as the preeminent provider of secured entry solutions for the logistics industry with thousands of successful deployments around the globe.Boon Edam’s comprehensive lineup of secured entry solutions is proven to be effective in preventing unauthorized access to high-security areas, mitigating theft and liabilities, while maintaining compliance and reducing costs related to supervised labor, energy conservation, and more.
LenelS2 has achieved three key accomplishments demonstrating its commitment to cybersecurity. The company has attained compliance with the NIST SP 800-53 cybersecurity standard, had its Elements™ cloud-based solution accepted into the Cloud Security Alliance’s (CSA) Security, Trust, Assurance, and Risk (STAR) Level 1 Registry, and has been selected as a winner of the Global InfoSec Award by Cyber Defense Magazine. LenelS2 is a part of Carrier Global Corporation (NYSE: CARR), global leader in intelligent climate and energy solutions.
Vector Flow is demonstrating its powerful range of automation solutions at ISC West 2023, March 29-31 in Las Vegas. Most notably, Vector Flow is highlighting the new science of Physical Identity Access Management (PIAM) automation wherein organizations can autonomously manage individual identities over the entirety of their lifecycle under one platform.
Sielox is unveiling several new product and business initiatives alongside their extensive range of pre-emptive layered physical security solutions at ISC West 2023 in booth 12109. Among them, the announcement of a new exclusive partnership with Kterio that brings a never-before-seen level of integrated system control and management to the physical security and building management markets.
Genetec announced that it has been authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA) . The mission of the CVE® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. It is sponsored by the Cybersecurity and Infrastructure Security Agency (CISA) of the U.S. Department of Homeland Security (DHS) and is operated by the MITRE Corporation in close collaboration with international industry, academic, and government stakeholders.
Intrinsic ID announced a new software-only solution that enables every connected device to have a unique identity and hardware-based security anchor, improving the reliability and trustworthiness of these devices, their networks and communications. The IoT security lately has been the subject of international legislation, underscoring the importance of the challenge for worldwide cybersecurity.
Physical security is a crucial aspect of cyber security as it deals with the protection of the tangible components of a computer system. Given that it involves safeguarding the actual physical parts of a computer system, physical security is an essential component of cyber security. The elements of physical security include protecting workstations, servers, storage systems, and other pieces of gear. To guarantee the privacy, accuracy, and availability of the data stored and processed on these systems, these assets must be physically protected.
Genetec has achieved a number of certifications underscoring its unwavering commitment to ensuring the cybersecurity of its solutions and the ISMS (information security management systems) that govern them. Genetec maintains ISO 27001 certification for the 6th consecutive year and obtains ISO 27017 certification. Genetec has maintained ISO 27001 certification for the 6th consecutive year and exemplifies its commitment to cybersecurity by also implementing ISO 27017 standards.
Elite Interactive Solutions has compiled three years of data spanning from 2020 to 2022 that details criminal activity and outcomes at three of the company’s customer locations. The data confirms that Elite has been successful in preventing criminal behavior in 96% of non-violent incidents when trespassers were detected on customers’ properties without the need for police intervention. In over 1,400 documented security related events in this study, Elite’s Digital Guards™ solution resulted in one of three positive outcomes: the criminal behavior stopped or the police detained or arrested the subject(s) – with zero false alarms generated to law enforcement during the three-year survey time frame.
In a testament to the positive impact of unifying security systems, Genetec shared the experience of the Albuquerque Police Department (APD). APD has chosen Genetec™ Security Center, Genetec Citigraf™, and Genetec Clearance™ to enhance public safety in the most populated city in New Mexico. The open, scalable Security Center platform enabled the city to combine all their video and public safety technologies into a single solution.
With the ever-increasing rise in cybercrime, Genetec is cautioning organizations of all sizes to be vigilant about the cybersecurity risk posed by legacy access control systems. Vulnerabilities in legacy access control systems can introduce cybersecurity weaknesses that may put an entire organization at risk. Cybercriminals can exploit weaknesses in access control system credentials, controllers, servers, readers, or workstations connected to the network.
Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC). The 12 published NERC standards are aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America. A subset of the full guidance follows.
Precisely announced that Devon and Cornwall Police leveraged its GIS software to enhance safety measures during the 2021 G7 Summit – the annual gathering of policy leaders from seven of the world’s major democracies. The local police force combined MapInfo Pro with third-party 3D visualizations to create a digital twin that enabled precise contingency planning – based on a model that had an accuracy of up to five millimeters.
Revelstoke has prtnered with BreachRx to unify automated incident response and compliance capabilities with the Revelstoke next-generation enterprise Security Orchestration, Automation, and Response (SOAR) platform. BreachRx has created the security industry’s first incident reporting and response automation solution. It is designed to help people find answers to security and regulatory compliance questions in real-time and at the height of a crisis. Similarly, Revelstoke has developed a next-level-SOAR solution that allows Security Operations Centers (SOCs) to sift through incoming data and identify the most dangerous cyber threats. The two solutions together give organizations an off-the-shelf solution that holistically addresses problems like no other product currently on the market.
As retailers integrate their digital and physical shopping experiences to future-proof their business models, it’s never been more important to be aware of the cybersecurity vulnerabilities that can be created by digital transformation. As cybersecurity awareness month becomes a focus of discussion in October, Interface Systems shares best practices on how to prevent retail cyber-attacks and mitigate fraud. Retail chains face a variety of security challenges, from connected POS (Point of sale) systems and devices to online ordering and delivery applications. Retailers’ data lakes, which combine their customers’ data with credit card information, make them particularly attractive targets for cybercriminals.
i-PRO to join with the U.S. Department of Homeland Security Cyber and Infrastructure Security Agency (DHS CISA) to raise awareness around cybersecurity for NCSAM (National Cyber Security Awareness Month). The world has seen significant increases in cyber-attacks aimed at critical infrastructure and security products in the last few years, with IIoT (Industrial Internet of Things) devices such as security cameras, becoming prime targets for hackers. According to a Kaspersky analysis of its telemetry from honeypots shared with Threatpost, in first half of 2021 alone, there were over 1.5 billion IoT breaches.
TDSi announced it has achieved Cyber Essentials Plus Certification following its initial Cyber Essentials certification back in June. Cyber Essentials Plus further demonstrates the company’s dedication to fully securing its operations, as well as its products and services, with a hands-on technical verification by an independent assessor, following an earlier self-assessment. Backed by the UK Government through the National Cyber Security Centre (NCSC), Cyber Essentials helps any size or type of organisation to protect itself, its customers and partners, and anyone else that relies on it from a range of common and potentially dangerous cyber-attacks.
Genetec announced a major new release of its flagship unified security platform, Security Center. With version 5.11, customers will have access to every module of Security Center, including Omnicast™ (video monitoring), Synergis™ (access control), AutoVu™ (automatic license plate recognition), Sipelia™ (intercom) and intrusion monitoring, right out-of-the-box. Beyond simplifying the path to unification, Security Center 5.11 includes a wide spectrum of powerful features as standard, including KiwiVision™ analytics