Download PDF version Contact company

Integrated Control Technology Ltd (ICT®), a global manufacturer of intelligent access control and security solutions, announced it has been authorised by the Common Vulnerabilities and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), becoming the second New Zealand organisation to be accepted into the programme.

The mission of the CVE programme is to identify, define, and catalogue publicly disclosed cybersecurity vulnerabilities. This aligns with ICT’s commitment to providing customers with the tools and resources needed to harden systems against the latest cybersecurity threats.

Information about cybersecurity threats

Vulnerabilities that are discovered are assigned and published to the CVE List. CVE Records published in the catalogue enable programme stakeholders to rapidly discover and correlate vulnerability information used to protect systems against attacks.

Daniel Tolcher, IT & Cybersecurity Manager for ICT, said, “At ICT we’re dedicated to providing our customers with the information needed to protect against the latest cybersecurity threats, ensuring their systems are always kept up to date."

Gold standard

ICT joins 358 organisations from 40 countries that have been accepted into this programme

ICT joins 358 organisations from 40 countries that have been accepted into this programme. Sponsored by the Cybersecurity and Infrastructure Security Agency of the U.S. Department of Homeland Security, CVE is considered the gold standard for publishing vulnerabilities.

ICT takes on this responsibility alongside major tech brands, Microsoft, Google, Amazon, IBM, and others, who are authorised to assign CVE IDs to vulnerabilities affecting products within its scope.

Addressing IT and cybersecurity vulnerabilities

Daniel Tolcher continues, “The global average cost of a data breach in 2023 was USD 4.45 million, a 15%increase over 3 years. The international, community-based effort of the CVE Programme is dedicated to supporting the efforts of the Information technology and cybersecurity professionals who address these vulnerabilities and ICT is proud to be welcomed.”

In addition to the CVE list, ICT welcomes the identification of vulnerabilities, which can be lodged via the ICT website Security Advisories, ICT - Integrated Control Technology.

Download PDF version Download PDF version

In case you missed it

Choosing the right fingerprint capture technology
Choosing the right fingerprint capture technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

Morse Watchmans: Texas State University boosts security to keep pace with rapid growth and expansion
Morse Watchmans: Texas State University boosts security to keep pace with rapid growth and expansion

In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mis...

Koning Willem College implements ASSA ABLOY wireless Aperio access control
Koning Willem College implements ASSA ABLOY wireless Aperio access control

Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 lo...