Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

IoT increases connected devices, but cyber threat arises

IoT increases connected devices, but cyber threat arises
The Internet of Things (IoT) has improved ease of connecting devices, but cyber threats are growing along with it. Today, physical security manufacturers are developing ways to secure enterprises by minimizing the threat of cyber attacks.
The Internet of Things (IoT) has improved ease of connecting devices, but cyber threats are growing along with it. Over the last couple of years, security solutions have adopted digital technology. Components which were physically seperated before, are now interconnected together over networks, enabling remote access, which brings convenience to users, but not without the risk of cyber threats as well.

Today, physical security manufacturers are developing ways to secure enterprises by minimizing the threat of cyber attacks. In the following, we listed a selection of products that have enhanced their features to reduce cyber threats.

Viscount Systems Freedom Enterprise Access Control Platform
Viscount's Freedom is a new approach to access control that can easily integrate with IT infrastructure, leverage advanced cloud computing methodologies, enable virtualization and mobility, and minimize threats from cyber attacks. Freedom offers a new paradigm from both a technology and deployment model, enabling a unique opportunity to move physical access control out of the realm of “facilities” and into the enterprise IT infrastructure where it is more easily managed by IT security managers and CSOs. Viscount’s Freedom Enterprise is an open platform, web-based software solution designed to integrate identity management (IDM) and video surveillance.

Key features:
  • Cyber-secure: no local panels or databases, increasing cyber security
  • Instantly changes privileges based on threat levels
  • Software is installed on a nonproprietary server and can be virtually deployed across multiple servers or in the cloud
  • Physical and logical security applications share a common database for perfect synchronicity
  • Output mapping: one card presentation can affect all doors
  • Virtual mustering: providing safety in emergency situations


Bosch Building Integration System (BIS) Software Version 4.2
Bosch Building Integration System (BIS) software version 4.2 offers seamless integration with the Bosch digital public address and emergency sound/mass notification system Praesideo, as well as enhanced cyber protection. Especially well-suited for mission or business critical applications such as government facilities, data management companies and critical infrastructure, Bosch's BIS 4.2 also pushes ahead of security standards to improve cyber protection in access control and alarm management systems. New OSDP (Open Supervised Device Protocol) v2 Secure Channel controller-reader encryption is combined with established client-server and card-reader encryption to create continuous data security throughout each step of the access control process.

Key features:
  • Integration of Bosch and third-party systems through deployment of OPC
  • All relevant information in one user interface
  • Fully embedded access control
  • Full event log for forensic investigations
  • Scalable system that grows with user needs

Wurldtech OpShield Network Security Detection and Prevention
OpShield is an operational technology (OT) cyber security solution that delivers visibility across complex OT networks, enforces OT policy at the protocol command level and deploys with minimal or no operational disruption. OpShield monitors and blocks malicious activity and unintended disruptions to promote OT safety and protect productivity.

Key features:
  • Enables safe OT connectivity to protect people, processes and equipment
  • Preserves valuable production uptime
  • Protects OT efficiently, even with limited security staff and resources
  • Combines the protection of an OT protocol inspection engine, threat and vulnerability signatures and non-disruptive network segmentation
  • Easy-to-use graphical user interface to easily manage security and policy and vulnerability signatures
Genetec Omnicast VMS
Genetec's Omnicast provides users with the flexibility to grow their systems over time, ensuring that they are never locked into a proprietary solution. With fielded deployments of up to 150,000 cameras and support for an unrestricted number of workstations, its powerful architecture allows users to reliably scale with the assurance that day-to-day operations will not be disrupted. Built-in and advanced security mechanisms prevent unauthorized access and protect users’ privacy.

Key features:
  • Hybrid cloud service enables organizations to transfer archived video recorded on-premises to the cloud
  • GPU-accelerated decoding displays more cameras and reviews video with greater fluidity from a single workstation with the ability to leverage graphic cards and embedded GPU to rapidly decode high resolution videos
  • Highly scalable VMS to reduce on-site hardware
  • Failover and redundancy protection against hardware failure or network interruptions
  • Provides real-time notification of system status and health-related events
  • Offers greater security of sensitive data with secured communications between clients, servers and edge devices, the ability to encrypt video in transit or at rest, and exported video
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: