Vanderbilt Industries

Thanks to technology, the world we live in today can be quite a simple one. For instance, home appliances such as TVs, heating systems, air conditioners, and lighting systems can now be controlled remotely using smart devices. We can also grocery shop, buy concert tickets, rent a movie, and order pizza via smartphones without having to leave the house.

The dark side of the coin in this fast-growing, technology-driven world, however, is the threat of cyberattack. The danger of cybercriminals is genuine. Last year, a ring of hackers called the Carbanak gang was discovered by the Kaspersky Lab, where it was reported the ring had stolen over $1 billion from financial institutions around the globe.

Cybersecurity

With this in mind, vulnerability testing of your security solutions is a must. A security vulnerability in a product is a pattern of conditions in the design of the system that is unable to prevent an attack resulting. This will result in perversions of the system such as mishandling, deleting, altering, or extracting data.

With more connectivity over the internet, IP physical security systems can be vulnerable to attacks. Hacking an IP security system can take place through a variety of forms, some being quite simple. For example, in a brute-force attack, a hacker just "guesses" passwords. Given that most people choose easy-to-remember passwords, many can be deduced via simple algorithms.

Denial-of-Service cyberattacks A standard method of cyber attack is a Denial-of-Service

Another standard method of attack is a Denial-of-Service. Here the offender attempts to overload the system by flooding the target with excessive demands and prevent legitimate requests from being carried out. This effectively makes it impossible to stop the attack by blocking a single source.

For instance, if a Denial-of-Service were to barrage and sink a Vanderbilt SPC panel successfully, the panel wouldn’t send any alarms. The Denial-of-Service would cause the panel to reset, rendering the alarm silent.

So, from this point-of-view, vulnerability testing is a must, and Vanderbilt always incorporates this into the development phase of products from day one onward. This thought process includes analysis of the type of cyberattacks that can potentially attack, breach, and disable a system. You then have the option to try and hack your product from within the organisation or hire a third party professional group to attempt to do it for you.

Identifying and tackling security vulnerabilities

Essentially, this form of testing puts the product through its paces, and once weaknesses are exposed, they can be patched up, and the cycle of attack-and-defense can take place again until eventually, a watertight ship is in place and ready for market.

This is standard practice as even the Pentagon brought in hackers to help identify more than 100 security vulnerabilities in their systems. Reportedly, hackers that could locate security issues were awarded up to $15,000 each, with approximately 1,400 hackers taking part in the project.

While approaches like the Pentagon’s might seem dramatic, given the cash incentives they put up for grabs, when you consider how much people depend on online channels in today’s interconnected world, any security breach could lead to a devastating loss in customer confidence and therefore revenue.

Vulnerability and security testing

Testing is the critical discipline that helps identify where corrective measures need to be taken to rectify gaps in security

Testing is the critical discipline that helps identify where corrective measures need to be taken to rectify gaps in security. The more extensive an organisation’s security testing approaches are, the better are its chances of succeeding in an increasingly volatile technology landscape.

Due to the practice of vulnerability testing, Vanderbilt has been able to change their thought process when approaching the design and development of security systems, in particular, SPC. This intruder detection system has been designed so that should an attack penetrate, such as Denial-of-Service, the system has multiple communication paths available as a backup.

SPC intrusion detection system

Therefore, if one server is flooded and taken down, the system can immediately switch to a backup server and then change communication paths to bypass the attack and ensure messages still operate successfully. So, the system will remain operational, and it will still be able to communicate out, but it will start to shut down elements of itself to protect the system from further damage in the attack.

Unfortunately, vulnerability testing isn’t something that can just be tried and tested for in the development phase and then forgotten about. Cyberattacks must also be prepared for long after the product is released to market.

This is because, as technology continues to advance, so too do would-be hackers innovation in creating methods and means to tackle and take down a security system. As such, Vanderbilt creates regular firmware updates to keep a product in the field readily prepared to revoke the latest critical bugs that can flood the market, such as the recent Meltdown and Specter bugs.

Data security strategy A robust data security strategy must involve recognition of your product’s potential weaknesses

A robust data security strategy must involve recognition of your product’s potential weaknesses. With IP physical security systems, it is now an endless game of cat and mouse in staying ahead of the latest threats and hacking innovations. Therefore, vulnerability testing is a valuable weapon in your overall defensive arsenal. As well, as vulnerability testing its systems, Vanderbilt has various other forms of obstacles and barriers to deter and deceive would-be hackers.

The groundwork for many of the cloud’s security worries is that organisations are ceding control of their data and depending on cloud service providers to preserve it for them. But cloud encryption delivers additional levels of defense, providing a useful antidote to this anxiety.

FlexC communications protocol

FlexC, Vanderbilt’s communications protocol, was built from the ground up solely with cybersecurity in mind. The protocol is a bespoke design that ensures everything is encrypted, all communications are monitored, and multiple types of attack are considered for defensive purposes to provide the best security possible.

So, essentially what this means is, that this makes our cloud security extremely secure. The encryption used by FlexC communications between panels and the cloud is an AES 256-bit SSL encryption – basically, a 128-digit number that would need to be decoded to breach.

Cloud security

By encrypting anything before you send it to the cloud, it adds an extra cushion of control and power over that data

By encrypting anything before you send it to the cloud, it adds an extra cushion of control and power over that data. It not only provides an added defensive structure around a company's information, but it also adds peace of mind to the equation when relaying this data to the cloud.

With cybersecurity, you must act every week. It is not something where you can say, “we’re safe, we’re secure, let’s forget about it.” Every time you release a product or release an update, you must centralise your mindset on cybersecurity. Vanderbilt’s fundamental way of approaching this issue is to stay in the mindset of assuming someone is currently trying to attack one of our systems.

SPC Connect

So, when you look at the way our security solutions, like SPC Connect, are designed, you will see that they are built with that mentality in mind. To conclude, people have a misconception that vulnerability announcements are a terrible thing. However, on the contrary, they can and should be viewed as a positive thing.

Having an environment within the software industry of open disclosures only means that we can learn from mistakes, we can see how hackers are attempting to breach systems, and ultimately, it can help us stay ahead of the curve and one-step clear of hackers’ latest intentions. Finally, when system vulnerabilities are reported, it just means that vulnerability testing down the line will improve; the bar will continue to rise.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Vanderbilt Industries news

Looking back at 2020: Cloud systems expand in shadow of COVID

The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look ba...

Vanderbilt highlights important features and uses of their Enterprise Security Management System

Enterprise-level security requires a streamlined approach to access management — and for many of organisations, having a single-source location for integrating a facility’s access control technologies, digital video and alarm monitoring systems is the ideal approach. This is where the Vanderbilt Enterprise Security Management System (SMS) shines. But what else can SMS do for customers? Additional screening measures Here are five little-known functions and facts that one may not kn...

Wisenet WAVE integrated with ACT Enterprise to combine video surveillance and access control

The integration developed between Vanderbilt’s ACT Enterprise access control software platform and Hanwha Techwin’s Wisenet WAVE video management software (VMS), means operators are now able to instantly visually verify access control activity and events directly from ACT Enterprise. ACT Enterprise is a role-based software platform which streamlines the monitoring and management of ACTpro access control systems comprising web-enabled door controller interfaces and MiFare and/or DESf...

Vanderbilt Industries case studies

Oliver Law Security installs Vanderbilt ACT365 security system to protect one of Doncaster’s largest gyms, The Fitness Village

Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to rec...

Vanderbilt secures a hospital in Ireland with access control integrated solutions

St. James Hospital in Dublin, Ireland, which has more than 1,000 beds, is a teaching hospital that specialises in not only treatment but health promotion and preventative services at its central location. It is also a central location for the treatment of COVID-19 patients. Tasked with keeping patients and staff safe from the threat posed by the COVID-19 pandemic, St. James Hospital needed a way to add additional screening capabilities to its facility alongside its existing access control termi...

Vanderbilt integrates ACT365 with Mobile BankID to enhance supermarket security at ICA Sweden

Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. Mobile BankID is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. The integration with ACT365 comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Web API for integration Tobias Olofsson, Proj...