PSI July 2019
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Open Door<br />
You are the<br />
future of security<br />
The security industry is<br />
changing. It’s digitising.<br />
Customers are more tech-savvy than ever before.<br />
Security installers need to add more value and be<br />
more efficient just to keep up. To face this<br />
challenge head on Texecom has created the<br />
Texecom Academy.<br />
Designed to help security professionals get<br />
ahead of the curve, Texecom Academy redefines<br />
what it means to be a ‘security professional’. It<br />
does this by providing the skills, tools and<br />
mindset that will define the future of security – for installers and their customers.<br />
The first courses will be aimed at those just entering the security industry or new to Texecom equipment. Texecom has<br />
partnered with industry-leading training provider Tavcom to provide a BTEC Level 3 course in Perimeter and Intruder Alarms.<br />
This interactive online course gives installers the underpinning knowledge and understanding required to be able to design<br />
cost-effective alarm and perimeter detection systems that conform to current international and national standards.<br />
With no prerequisites to join, it’s perfect for those who are entering the intruder alarm industry for the first time or looking to<br />
improve their skills and gain an industry recognised qualification. After completing the course, installers should have a basic<br />
knowledge of all the component parts which go together to make a successful intruder and hold-up alarm system and, more<br />
importantly, the pitfalls to avoid.<br />
In addition to the BTEC Level 3 course, there is also a free ‘bitesize’ course on Detection Devices. Also commonly referred to<br />
as sensors, detection devices utilise a wide range of technologies and must be capable of reliably detecting intruders while also<br />
having a high resistance to false activations. They may be passive, such as a basic switch or contact, or they may be powered<br />
active devices that have onboard signal processing to determine whether an intrusion<br />
is taking place. This free course will help installers understand everything they need to<br />
know to get started with these devices.<br />
Visit: www.academy.texe.com/<br />
Does your access control system offer<br />
robust cyber security too?<br />
Access control systems are a huge asset for security, offering<br />
integrated and intelligent responses to events on site. But the<br />
best access control systems guard against cyber as well as<br />
physical threats to ensure more robust safety and security for<br />
people and places. Inner Range General Manager Tim<br />
Northwood blogs on the Inner Range Open Door platform<br />
about what to look for in your access control system to ensure you have robust cyber as well as physical security in place.<br />
Secure communications are paramount for cyber security, whether that’s via in-house private communication networks or<br />
between access control system controllers, servers and door modules, or when the core system integrates with third-party<br />
products, such as CCTV. A robust level of end-to-end encryption across all these communications channels and interfaces is<br />
vital. Data encryption ensures secure LAN communications at all times and continuous monitoring will detect any fault or<br />
attempted module substitution. Ensuring the communications network is isolated also helps reduce the risk of interception.<br />
Sandboxing is a software management strategy that isolates applications, such as your access control system, from critical<br />
system resources and other programs, such as other products integrated with your core access control system. It provides an<br />
extra layer of security that prevents malware or harmful applications from negatively affecting your access control system.<br />
Without sandboxing, an application may have unrestricted access to all system resources<br />
and user data on a computer. A sandboxed app, on the other hand, can only access<br />
resources in its own ‘sandbox’. An application’s sandbox is a limited area of storage space<br />
and memory that contains the only resources the program requires. If a program needs to<br />
access resources or files outside its sandbox, permission must be explicitly granted.<br />
Read the full article at www.innerrange.co.uk/does-your-access-control-system-offer-robust-cyber-security-too/<br />
38<br />
www.psimagazine.co.uk