Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/micron_edge_storage_for_video_security/
INSIGHTS

How to minimize cyberthreats in IP-based physical security systems

How to minimize cyberthreats in IP-based physical security systems
Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.
Companies have gradually started to change the architecture of their solutions in order to avoid cyberthreats. One approach is to change the security solution architecture in a way that will minimize the number of potential breach points.

In access control systems, the distributed control panels are the main vulnerability. “For example, if you have 160 doors with PoE, these are 160 points of potential breach,” explained Scott Sieracki, CEO of Viscount Systems. In addition, since each panel manufacturer uses proprietary technology, the IT department’s conventional IT protection systems ...


Product Adopted:
Others
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: