02.07.2019 Views

PSI July 2019

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Open Door<br />

You are the<br />

future of security<br />

The security industry is<br />

changing. It’s digitising.<br />

Customers are more tech-savvy than ever before.<br />

Security installers need to add more value and be<br />

more efficient just to keep up. To face this<br />

challenge head on Texecom has created the<br />

Texecom Academy.<br />

Designed to help security professionals get<br />

ahead of the curve, Texecom Academy redefines<br />

what it means to be a ‘security professional’. It<br />

does this by providing the skills, tools and<br />

mindset that will define the future of security – for installers and their customers.<br />

The first courses will be aimed at those just entering the security industry or new to Texecom equipment. Texecom has<br />

partnered with industry-leading training provider Tavcom to provide a BTEC Level 3 course in Perimeter and Intruder Alarms.<br />

This interactive online course gives installers the underpinning knowledge and understanding required to be able to design<br />

cost-effective alarm and perimeter detection systems that conform to current international and national standards.<br />

With no prerequisites to join, it’s perfect for those who are entering the intruder alarm industry for the first time or looking to<br />

improve their skills and gain an industry recognised qualification. After completing the course, installers should have a basic<br />

knowledge of all the component parts which go together to make a successful intruder and hold-up alarm system and, more<br />

importantly, the pitfalls to avoid.<br />

In addition to the BTEC Level 3 course, there is also a free ‘bitesize’ course on Detection Devices. Also commonly referred to<br />

as sensors, detection devices utilise a wide range of technologies and must be capable of reliably detecting intruders while also<br />

having a high resistance to false activations. They may be passive, such as a basic switch or contact, or they may be powered<br />

active devices that have onboard signal processing to determine whether an intrusion<br />

is taking place. This free course will help installers understand everything they need to<br />

know to get started with these devices.<br />

Visit: www.academy.texe.com/<br />

Does your access control system offer<br />

robust cyber security too?<br />

Access control systems are a huge asset for security, offering<br />

integrated and intelligent responses to events on site. But the<br />

best access control systems guard against cyber as well as<br />

physical threats to ensure more robust safety and security for<br />

people and places. Inner Range General Manager Tim<br />

Northwood blogs on the Inner Range Open Door platform<br />

about what to look for in your access control system to ensure you have robust cyber as well as physical security in place.<br />

Secure communications are paramount for cyber security, whether that’s via in-house private communication networks or<br />

between access control system controllers, servers and door modules, or when the core system integrates with third-party<br />

products, such as CCTV. A robust level of end-to-end encryption across all these communications channels and interfaces is<br />

vital. Data encryption ensures secure LAN communications at all times and continuous monitoring will detect any fault or<br />

attempted module substitution. Ensuring the communications network is isolated also helps reduce the risk of interception.<br />

Sandboxing is a software management strategy that isolates applications, such as your access control system, from critical<br />

system resources and other programs, such as other products integrated with your core access control system. It provides an<br />

extra layer of security that prevents malware or harmful applications from negatively affecting your access control system.<br />

Without sandboxing, an application may have unrestricted access to all system resources<br />

and user data on a computer. A sandboxed app, on the other hand, can only access<br />

resources in its own ‘sandbox’. An application’s sandbox is a limited area of storage space<br />

and memory that contains the only resources the program requires. If a program needs to<br />

access resources or files outside its sandbox, permission must be explicitly granted.<br />

Read the full article at www.innerrange.co.uk/does-your-access-control-system-offer-robust-cyber-security-too/<br />

38<br />

www.psimagazine.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!