Vanderbilt Industries

The rapid gains technology has made into everyday living has also changed how the security industry operates. In short, systems have moved from being very simple inputs and outputs that turn on bells, to now being always-connected devices making the industry very much part of the IoT world. Of course, this leads to the question - how does physical security protect itself from cyber vulnerabilities? Who protects the protector, so to speak.

This ethos has changed how Vanderbilt think over the last few years when designing and developing their own security systems, in particular SPC. FlexC, the company’s communications protocol, was redesigned from the ground up solely with cybersecurity in mind. The entire protocol has been designed to ensure everything is encrypted, all communications are monitored, and multiple types of attack are considered for defensive purposes to provide the best security possible.

Multiple lines of defence

SPC has built-in protection mechanisms whereby if the system is attacked, it will go into protection mode. The system will remain operational and it will still be able to communicate out, but it will start to shut down elements of itself to protect the system from the attack.

SPC has been designed so that should an attack penetrate, the system has multiple communication paths available as backup

Again, no system is completely invincible. SPC has also been designed so that should an attack penetrate, the system has multiple communication paths available as backup. Therefore, if one server is taken down, the system can immediately switch to a backup server and then switch communication paths to bypass the attack and ensure messages are still operating successfully.

Choosing equipment with built-in cybersecurity

Technology in day-to-day life might be growing at a rapid rate leading to fears of potential security breaches. But one must remember that technology’s growth also means that security defences are developing in parallel. At its core, security is about being continuously observant, always following best practices, and being ready and able to react against a security issue.

Best practices to combat the threat of a cyberattack can be quite straightforward. The most obvious place to start is to choose equipment from reliable suppliers that have a knowledge and interest in cybersecurity and are focused on protecting data. It might sound simple but buying products with a built-in security focus greatly reduces the risk of a cyber attack. When your security system is designed from the ground up to protect against cyberattacks, then naturally your organisation will be in a much better place.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Vanderbilt Industries news

What is the role of manufacturers in providing after sales support?

Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delic...

Vanderbilt adds Facial Recognition Terminals with Temperature Detection to the access control portfolio

Vanderbilt, a provider of state-of-the-art security systems, announces the induction of Facial Recognition Terminals with Temperature Detection by ZKTeco into their access control portfolio. These products are touchless technology that enables skin temperature measurement and masked individual identification during facial and palm verification at access points. They interface with Vanderbilt’s ACTpro on-premise and ACT365 cloud-based access control solutions, and communicate with the syst...

Which security technology is most misunderstood, and why?

The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misundersto...

Vanderbilt Industries case studies

Vanderbilt’s SPC Wireless devices are the perfect match for retail establishments

Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...

Vanderbilt ACT365 addresses access control security concerns at Study Abroad University, London

Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of...

Vanderbilt’s ACT365 cloud-based access control solution protects Work.Life facility in London

Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. The ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realising late-on the benefits available from cloud management. Essentially, the client needed unified management of access poi...