Access control systems & kits - Expert commentary

Protect physical assets from cyber-attacks
Protect physical assets from cyber-attacks

Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognise an attack can help mitigate the threat, as ABB’s Rob Putman explains. Edge devices and data analytics As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic. As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail. The chemicals sector, a high-value target for cyber-criminals Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage. Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely. Cyber security vulnerabilities put physical assets at risk The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk. Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event. Colonial Pipeline cyber-attack incident Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery. In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies. Outdated IT system elevates physical risk The increased interconnectivity between IT and OT can also create vulnerabilit Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure. As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky. For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not? Need to replace aging distributed control systems Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools. The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software. However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for. The human element There is a misconception that IoT-connected devices can open companies to risk There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame. Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use. Physical and human assets, key to robust cyber security Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets. The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem? At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line. User error and human-generated exposures Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior. Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people. Need to invest in new digital and automated technologies If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years? For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent. Robust cyber security is built on solid foundations When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure. The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk. Importance of maintaining and upgrading security controls However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organisation, with the requisite skill set, or the extra labour bandwidth, to operate, maintain and update those security controls, as they evolve. Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.

The robotic transformation of the security industry
The robotic transformation of the security industry

The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination. Transformation of the physical security industry One of the latest industries to be permanently transformed is physical security. The era of utilising security cameras is slowly changing into more advanced and more efficient technological applications - security robotic solutions. SMP Robotics is a California-based company, which is a pioneer in developing robotic technologies, powered by AI, to assist, improve and deliver on new expectations in today’s world. One of their services is smart surveillance systems. This represents a proactive approach to security. The company, SMP Robotics’ Founder and Chief Executive Officer (CEO), Leo Ryzhenko, stated “Autonomous robotic technologies will become a driving force in future security solutions.” Robotics and AI in autonomous security solutions The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards The company uses robotics and AI technology to implement autonomous security solutions, which reduce liability and overhead, as well as improving the quality of services. Robotic guards are capable of patrolling all types of facilities, in both urban and rural contexts. The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards. The inspection robots, deployed by SMP Robotics, are easily integrated with many existing security technologies, armed with obstacle avoidance and anti-collision measures, automatically recharge, and can recognise faces up to 50 metres. As the world grows increasingly complex, technology like this is essential to ensure safety for all. AI-enabled autonomous video monitoring ground vehicles The advancements in technological breakthroughs of SMP Robotics position the company and its AI-powered, autonomous video monitoring ground vehicles, to be the most adaptable to any industry, cost-effective for clients’ business needs, in providing various types of services from public safety, crime prevention, to asset protection and physical security. The last few years were very productive for the company. The latest generation of the autonomous models, which outperform in efficiency, dozens of security cameras, were deployed or in a process to be delivered to a number of key clients, in various industries throughout the globe, from oil & gas, nuclear power plants to data centres, healthcare facilities, and amusement parks. Smart security robots Tal Turner, the Vice President (VP) of Business Development and Partnerships, SMP Robotics, said “We provide autonomous, artificial intelligence, all-weather, all-surface, smart security robots that are turnkey and operate independently on their own, using real-time obstacle avoidance, face recognition, and other cutting-edge technological advancements.” According to Coherent Market Insights, the Robots as a Service (RaaS) market direction will grow by 15.9% by 2028 and reach the threshold of 41.3 billion dollars. SMP Robotics stands at the forefront of the security robotic revolution, making an impactful change to make the world a safer place.

How schools can make outdoor learning safe and secure
How schools can make outdoor learning safe and secure

Schools were never designed and built with social distancing in mind. So, it’s perhaps not surprising that as children returned to schools, for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible. Managing ‘class bubbles’, hygiene and ventilation While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff. It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage. Specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom. However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose? When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism. Perimeter security measures for schools How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards. Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress. Helping schools identify specific security needs Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed. Head teachers should prioritise solutions appropriate to their site’s specific risks It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritise solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures. School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorised entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behaviour, and reducing the risk of malicious damage, and acts of terrorism. Welded mesh panels for perimeter fencing Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic. Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view. Automated gates and access control Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates. Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic. Specifying access control system When specifying a school access system, it’s important to consider the areas of the school When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. . Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school. Timber acoustic barriers for security and privacy Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city centre schools or those located close to busy highways. There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions. DBS approved installers And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption. The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.

Latest Eaton news

Eaton launches a range of GRP cameras for use in hazardous area communications
Eaton launches a range of GRP cameras for use in hazardous area communications

Power management company Eaton announces the launch of a pioneering range of GRP cameras for use in hazardous area communications. Corrosion-free and much lighter in weight than their metal counterparts, the new GRP cameras offer end-users significant improvements in a lifetime performance, as well as reduced transportation, operating and maintenance costs. Eaton GRP cameras are ideally suited to remote monitoring of process and security activities in harsh environmental conditions or explosive atmospheres. Their Ex rating, light weight and durability make Eaton GRP cameras an excellent choice for offshore and onshore hazardous area installations, pipelines and processing plants: typically within the oil & gas, chemical and waste treatment industries. Hazardous area applications The cameras are also ideal in grain handling and marine environments such as sea ports, specialist ships and windfarms. Commenting on the launch Brian Taylor, Product Manager, explains: “No other camera manufacturer has launched an Ex camera product in composite material, so Eaton is once again leading the way.” No other camera manufacturer has launched an Ex camera product in composite material" “The use of GRP to replace 316 stainless steel or aluminium may seem like a radical move, but Eaton has developed its own, high-grade GRP specifically for use in hazardous area applications, which has been used as the housing material for over 25 years on our Ex range of MEDC sounders, beacons and speakers. Its proven performance in the field means we know that the new GRP cameras will really deliver in terms of durability and reliability, offering Eaton customers compact camera stations with significant weight and performance benefits.” Compact camera stations The new GRP camera station range will include three designs – fixed (XFG), dome (XDG) and next-generation PTZ (pan/tilt/zoom) cameras. The XFG is first to market and is certified IP66, IP67, NEMA 4x & 6: making it suitable for outdoor, corrosive, and indoor applications in Zone 1, 2, 21, 22, Class I Div 2 (Gas Groups A-D) and Class II Div 2 (Dust Groups F & G). In addition to the GRP cameras, Eaton offers a complete Ex product portfolio of washer tanks, beacons, sounders, speakers and junction boxes: enabling specifiers and installers to source a full range of hazardous area communication products from a single supplier.

Identiv shares details on why Bahnhof Data Centre is one of the world’s most secure buildings
Identiv shares details on why Bahnhof Data Centre is one of the world’s most secure buildings

Pionen is a former civil defence centre constructed in the White Mountains Södermalm borough of Stockholm, Sweden in 1943 to safeguard essential government functions. It was transformed into a data centre by the Swedish internet service provider, Bahnhof. Sweden’s Bahnhof Data Centre was officially opened on September 11, 2008, and the company continues to use the facility till now. The building is concealed under the mountain and is secured by a 15.75 in (40 cm) thick door and can only be reached by an entrance tunnel. Due to all of these features, the data centre can withstand even a hydrogen bomb. Constructing something exceptional The Bahnhof Data Centre is also a co-location centre. In 2010, WikiLeaks used its co-location services to store its servers. The facility is architected in such a way that it looks like a vision right out of a science fiction movie. Bahnhof purposefully planned its server environment to bring to mind the cinematic look and feel of science fiction movies like Silent Running and Logan’s Run. The company has preserved the place’s cold war moniker, Pionen White Mountains The Bahnhof Data Centre exists in a previous nuclear shelter about 100 ft (30 m) under the ground. The company has preserved the place’s cold war moniker, Pionen White Mountains, and some of its accoutrements. One of the signs near the entrance reads: these doors should be locked at DEFCON1. This extraordinary facility came to life thanks to a distinct design idea, thoughtful use of technology, and a strong aspiration to construct something exceptional. Hydrogen bomb explosion Bahnhof Data Centre facts are as follows: It took 20 months to design and construct the facility. The centre has an IT usable capacity of 800 kW. There are 140 cabinets with a power density of 5.7 kW average per cabinet. There is no particular maximum. Cooling, organised cabling, and electrical wiring are fitted under a 3.3 ft (1 m) deep raised flooring. The facility is located in a site that was initially an army bunker and nuclear shelter during the cold war. The shelter was designed to withstand a hydrogen bomb explosion. It houses the Network Operations Centre (NOC) for all of ISP’s operations. They have five (5) data centres in the country, with Pionen being the largest. The facility also serves as a co-location hosting centre, so one can really put their own servers here. It features two Maybach MTU diesel engines and Baltimore Aircoil fans. A team of only 15 senior technical employees work permanently in the facility. Former nuclear bunker The data centre is situated below 30 m of solid granite foundation The Bahnhof Data Centre is a Hollywood-style Swedish data centre situated in a former nuclear bunker, deep in the bedrock right beneath the city of Stockholm. It was constructed to be able to survive a blast by a hydrogen bomb. The building has a total area of 10,764 sq ft (1,000 sq m), with 5,382 sq ft (500 sq m) of hosting area and 2,153 sq ft (200 sq. m) for back-of-house systems. The residual area is for office and personnel spaces. It can tolerate a structural loading of 403 lbs per sq ft (2 tons per sq m). The data centre is situated below 30 m of solid granite foundation. Glass-walled room When one enters the facility, the first thing they will notice are two huge engines that automatically start in the event of a power cut. These are genuine German submarine engines. The mountain walls inside are covered with green plants that makes one feel as if they provide the site with extra oxygen. Excess heat created by the servers is recycled into the local district heating network There is also a massive insulated, circular glass-walled room that floats above the ground, serving as a conference room. The round carpet inside the conference room looks like the moon. For a pleasant work atmosphere, the facility has simulated daylight, conservatories, man-made waterfalls, and a massive 2600 lt saltwater fish tank. Excess heat created by the servers is recycled into the local district heating network, making this facility one of the most environmentally-friendly data centres across the globe. Co-location hosting According to Jon Karlung, CEO at Bahnhof, the exceptional design of the data centre makes it a much-talked-about facility worldwide. If one has been inside the building, they will certainly tell other people about it. The exclusive approach also aids the business to get the word out about their building. It makes them stick out, and as the building provides co-location hosting, they have consumers who often visit the site and work there. These individuals share what they see with others, which creates positive word-of-mouth marketing for the company. Server capacity services Bahnhof has delivered internet and hosting services since its establishment in 1994 Bahnhof has delivered internet and hosting services since its establishment in 1994. In 2006, it came across an exciting prospect to expand its premises and include a subterranean bunker initially serving as an army shelter and nuclear bunker during the Cold War era. In 2007-2008, Bahnhof Data Centre was totally repurposed to become the remarkable facility. Over 4,000 cubic m (141,300 cubic ft) of solid rock was blasted away to create the 1,200 sq m that the company required. The redesigned facility became operational in September 2008, accommodating a huge part of the company’s network operations and serving as a co-location centre for a range of businesses and people looking for server capacity services. Human-friendly atmosphere The Bahnhof Data Centre is different from all other hosting facilities across the globe. It was inspired by movies like The Empire Strikes Back and James Bond. The building has an exceptional human-friendly atmosphere, housing magnificent waterfalls, conservatories, a glass-walled meeting room floating above the ground, and artificial daylight. Bahnhof Data Centre is one of the best-connected sites in the North European region Bahnhof Data Centre is one of the best-connected sites in the North European region. It provides triple redundancy internet backbone access. The network has complete redundancy with both fibre optics and additional copper lines with several different physical ways into the mountain. The data centre depends on Eaton’s UPS protection to offer rock-solid network operations and co-location services. The backup power supply is guaranteed by two Maybach MTU diesel engines that were initially designed for submarines. They can generate 1.5 megawatts of power. A submarine sound-horn is fitted near the engines and alarms in case of a system breakdown. Rack-mounted servers The cooling is controlled by Baltimore Aircoil fans generating a cooling effect of 1.5 megawatts. This is sufficient to cool hundreds of rack-mounted servers at a time. With a massive 11,950 sq ft space, the facility houses a NOC for all of the ISP’s operations. The network of Global Switch includes numerous main production servers As one of five data centres, it is the biggest and is operated by a team of 15 senior technical employees. The network of Global Switch includes numerous main production servers, backup servers, and administrative, standby, and dedicated servers. Pionen is Bahnhof’s largest data centre and can house over 6,000 server computers. Subterranean data centre What makes Bahnhof Data Centre one of the most secure buildings? As the world becomes increasingly dependent on online services, internet service providers are going above and beyond to protect their systems. This fact is more obvious at the subterranean data centre run by Bahnhof. When Karlung secured a former nuclear shelter below 100 ft of Stockholm bedrock as the location for a data centre, he believed it would be suitable to bring his love of 1970s science fiction to the design of the site. The facility is a server housing centre that can endure a hydrogen bomb explosion. In case of power failure, backup power is delivered by a few German submarine engines. Fabricated waterfalls, interior jungle plants, lowland smog, and a meeting room with an image of the moon’s surface on the flooring provide the preferred effect of a sci-fi dream pad. Access control system Its working atmosphere is made more liveable for workers with artificial daylight Constructed 30 m underneath a granite mountain, the building was initially used as a cold war shelter and was planned to provide security from a nuclear conflict between Soviet and Western forces. With servers situated deep within the mountain and only reachable through one tunnel sheltered by a 40 cm thick steel door and can run independently of the national grid because of two submarine engines that serve as backup generators. Although the data centre is acknowledged to be one of the most secure facilities across the globe because of its underground location, its working atmosphere is made more liveable for workers with artificial daylight, conservatories, and a saltwater fish tank. Identiv’s flexible physical access control system (PACS) and video intelligence solutions provide the highest security at the lowest cost possible. Regardless of the physical location, one can easily manage access control through the robust, feature-rich systems, hardware, and software. Their technology integrations deliver high-security physical security solutions in partnership with other providers.

CSL adds another variant for Eaton to its CSL connected range
CSL adds another variant for Eaton to its CSL connected range

CSL is delighted to announce that they have added another variant for Eaton to their award-winning CSL Connected range. The CSL Connected range has been extended to include a GSM variant for Eaton. Their GSM variant is now available to order from your chosen ARC. In partnership with the Panel Manufacturers, CSL Connected combines their Critical Connectivity with the chosen alarm panel and the added option of an end-user App. This offers Installers professionally monitored signalling designed to discourage self-monitored systems that bypass ARCs. Providing customers with latest solutions CSL would also like to remind its user of all the options they currently have available across the 4 product variants and 6 manufacturers. CSL’s Sales Director, Rob Evans, commented: “CSL Connected has been really well received by Installers since its launch and to now add another variant for Eaton is great news for the industry. It is part of our ongoing commitment to provide our customers with the latest solutions to support their businesses.”

Related white papers

Top 5 ways to ensure visitor safety and security

Moving to mobile: A guide for businesses switching to mobile access control

Attention OEMs: 5 Ways RFID Readers Can Secure Your Markets