SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

Euralarm highlights next step in cybersecurity for connected alarm systems

19 Sep 2022

Euralarm highlights next step in cybersecurity for connected alarm systems
Contact company
Contact Euralarm
icon Add as a preferred source Download PDF version
Related Links
  • BSIA expands its membership in Euralarm
  • Communicating the value of security to the public

Alarm systems are essential for the economic success of almost all sectors of European markets. Rapid technological developments and policy developments have brought new challenges for alarm systems and the alarms systems’ market.

One of these challenges is the cyber security of the connected alarm systems. Euralarm members are involved in these challenges via the CENELEC Technical Committee 79 (TC 79). Within Europe the CENELEC Technical Committee 79 (TC 79) is developing and maintaining standards for detection, alarm, and monitoring systems for protection of persons and property, and for elements used in these systems.

Connected alarm systems

The scope includes in particular intruder and hold-up alarm systems, access control systems, periphery protection systems, combined alarm - fire alarm systems, social alarm systems, Video Surveillance systems (formally known as CCTV systems), other monitoring and surveillance systems related to security applications, as well as associated and dedicated transmission and communication systems. Its standard publications also include the services aspects, such as planning and design, engineering, installation, and handover.

The scope of the activities includes all functional elements of alarm systems as mentioned above

Within TC 79 one specific Working Group (WG17) focusses on the cyber security aspects of the connected alarm systems. The Working Group was originally set up in 2018 by TC79 as an ad-hoc group to address the growing concerns of cybersecurity in connected alarm systems. The scope of the activities includes all functional elements of alarm systems as mentioned above.

Shared local interconnections

The objectives of the Working Group are to research and collate the existing initiatives in the field of cyber security as well as develop best practice guidance related to this topic. The know-how is shared with members of TC79.

Apart from the research the Working Group has already developed a set of security policies based on best practices for adoption within the connected alarm systems. Also, a cyber task group has been set up to report on important developments from cyber-related regulation impacting on alarm systems.

Alarm systems consist generally of devices that are located locally within supervised premises. The devices communicate together using dedicated or shared local interconnections. The system itself communicates away from the local site via a gateway, often controlled by a fire wall. For the communication, a public data communication system is often used, such as a cloud system.

Encryption and technical functions

Many legacy systems still use analogue connectivity, e.g., PSTN or other landline (non IP) technology

Many legacy systems still use analogue connectivity, e.g., PSTN or other landline (non IP) technology. The data storage and the processing may be hosted remotely or can be shared as a cloud resource. The operations, maintenance and 3rd party services are undertaken at a remote location.

Based on the comprehensive research of European and global initiatives, standards, and best practices the TC79 WG17 developed a database citing over four hundred standards relating to many facets of cybersecurity. The database now covers both vertical markets, such as cybersecurity aspects of power plants and automotive as well as horizontal markets such as IT systems, ICAS.

Some of the standards and best practices cover principles, such as management systems and procedures while others cover techniques, such as encryption and technical functions. The Working Group decided to focus on linking the relevant standards to threats and defences.

IoT cyber security

Another finding of the Working Group is that the EU led activities are accelerating. Two examples of this acceleration can be found in the EU Cyber Security Act and ENISA’s Cyber Security Certification Schemes. The Working Group also noted that the Joint Technical Committee 13 (JTC13) of CEN and CENELEC develops ‘homegrown’ ENs, where gaps exist, in support to EU regulations (RED, eIDAS, GDPR, NIS, etc.).

These gaps need to be avoided for presumption of conformity to these regulations. The basis for this is laid among others by the IEC 62443 (Cyber security for Industrial Automation and Control Systems), the ISO 2700x family of standards helping organisations to keep information assets secure and ETSI 303645 the globally applicable standard for consumer IoT cyber security. The figure below shows the strategy for cyber security for industrial automation and control systems according to IEC 62443.

the ISO 2700x family of standards helping organisations to keep information assets secure
Strategy for cyber security for industrial automation and control systems

Cyber security topics

Based on the research and findings the Working Group concluded that cyber security is a holistic process. It also published ‘Reference Standards and Guidance on Best Practice Cyber Security for Alarm Systems’. This best practice document, of which the second edition was released last June, provides a summary of cyber security topics and standards that are relevant to alarm systems.

With over sixty pages in the guide, the Working Group felt the need to simplify the document for each of the audiences. Among these are manufacturers, designers, integrators, and MARC’s. To simplify the document the Working Group used the Taxonomy pillars that were presented in the brochure ‘Cybersecurity – Threat or Opportunity’ that Euralarm and CoESS published in 2019. For each of these Taxonomy pillar flow diagrams are being developed.

For each of these Taxonomy pillar flow diagrams are being developed
The Working Group felt the need to simplify the document for each of the audiences

Service-related cybercrime

Also, a dedicated Cyber task group was created within the Working Group. This task group shares key cyber-related issues impacting alarm systems, such as RED Essential Requirements impacting alarm systems and certification schemes developed by ENISA as part of the Cyber Security Act. Apart from the new task group, there is also close contact with JTC13 to consider the impact of their work and to provide input for as well as receive input from this committee to streamline the activities.

The group is made up of member companies and other stakeholders from a range of industry sub-sectors

Within the BSIA the activities of the Working Group on cyber security aspects of connected alarm systems have led to the launch of the Cyber Security Product Assurance Group (CySPAG). The group is made up of member companies and other stakeholders from a range of industry sub-sectors, and subject matter experts who are focused on reducing the risk of product and service-related cybercrime.

Support product manufacturers

This interest group is actively engaged in developing industry codes of practice, guidance, certification schemes, and education to support product manufacturers, specifiers, and installers with managing their cybersecurity risks.

The group endeavours to take a practical approach and recognise that there is a combined stakeholder effort in providing a cyber secure solution, i.e., it takes some effort from the manufacturers, designers, installers working in collaboration along with ongoing support and maintenance to provide a cyber-secure solution.

Managing cyber impacts

End users also play a huge part in cybersecurity and must be made aware of their role in keeping their system secure, not only in practically managing cyber impacts on their installed system, but also in making an informed choice when selecting an appropriate company to supply, install and maintain their connected security system.

The cybersecurity landscape of risks and threats is continually evolving; therefore, the challenge is to support innovation in our industry while preventing the introduction of unacceptable risks.

CySPAG’s core focus is to evaluate the cyber security landscape and develop ways in which these risks and threats can be mitigated. Likewise, initiatives are started in other European countries as well. Euralarm supports these initiatives and contributes where possible.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Office surveillance
  • Retail surveillance
  • Digital video surveillance
  • Remote video surveillance
  • IP video surveillance
  • Electronic security systems
  • Campus security systems
  • Remote security
  • Perimeter security
  • Security policy
  • Security devices
  • Security installation
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Network monitoring
  • Asset tracking
  • Video analytics
  • Remote video monitoring
  • Electronic access control
  • Network cameras
  • Door access control
  • IP Surveillance
  • Security service
  • Industrial surveillance
  • Green security
  • Outdoor video surveillance
  • Physical Security Information Management (PSIM)
  • Indoor surveillance
  • IP security solutions
  • Covert Surveillance
  • Perimeter protection
  • Cyber security
  • Fire Safety
  • Data Security
  • Network Video Recorders
  • Warning Devices
  • Security Assessments
  • Infrared Surveillance
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Video surveillance
  • GDPR
  • Machine Learning
  • Touchless Security
  • Related links
  • HID Access control software
  • Biometric Access control software
  • LCD Intruder alarm system control panels & accessories
  • Access Control Software Access control software
  • Biometric Access control systems & kits
  • LED CCTV monitors
  • LED Intruder alarm system control panels & accessories
  • TFT LCD CCTV monitors
  • Broadcast Messenger Access control software
  • Proximity Access control systems & kits
  • Standalone / Networked Access control systems & kits
  • Network IP cameras
  • Indoor/Outdoor IP Dome cameras
  • Contact Access control software
  • Mifare Access control software
  • Carpool Anti-passback Access control software
  • Central Monitoring Option Access control software
  • Centrally managed access solution Access control software
  • Combined online/offline solution Access control software
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • High Level Interface Access control software
  • ID Badging Software License Access control software
  • License Access control software
  • Management Systems Upgrade Access control software
  • Redundant System Software Access control software
  • Remote software for telecode door entry phone system Access control software
  • Serial Interface Option Access control software
  • Server software for MSDE Access control software
  • Version Upgrade Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
  • Intruder alarm system control panels & accessories
  • IP cameras
  • IP Dome cameras
  • CCTV monitors
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec