Brivo Access Control and Brivo Door Station

Brivo Access Control is a comprehensive and innovative security solution that replaces traditional lock and key systems with modern, cloud-based access control technology. It’s designed to provide a flexible and scalable solution for securing physical spaces, such as office buildings, warehouses, schools, and more. Brivo offers a wide range of features and benefits that make it a preferred choice for organizations and individuals looking to bolster their security measures.

Brivo Door Station is a next-generation access control platform that combines video, AI, access control, and intercom into a single device.

Key Features of Brivo Access Control with Brivo Door Station

  1. Cloud-Based Management: One of the standout features of Brivo is its cloud-based management system. It allows users to remotely control and monitor access to their premises from anywhere with an internet connection. This means you can manage security even when you’re away from the physical location.
  2. Mobile Access: Brivo offers mobile access control, enabling users to use their smartphones as digital keys. This feature is not only convenient but also enhances security by reducing the need for physical keycards and the associated risks of loss or duplication.
  3. Real-Time Monitoring: Brivo provides real-time monitoring of access control events. You can receive instant alerts and notifications, allowing you to respond swiftly to security incidents or breaches.
  4. User Permissions: Brivo allows you to define user permissions with precision. You can grant access to certain areas for specific timeframes, ensuring that only authorized personnel can enter sensitive zones.
  5. Brivo Door Station catalogues video of every access event and timestamps that video to be paired with the access log. The event video automatically appears in the event tracker software.
  6. Performs facial authentication requiring only a badge photo.
  7. Condenses the platform into a single reader, requiring no outside integrations. Brivo Door Station has POE and Brivo connectivity built-in, so it can be added to new or existing doors in minutes.

Benefits of Brivo Access Control

  1. Enhanced Security: Brivo’s modern access control system significantly enhances security by reducing the risk of unauthorized access. With features like mobile access and real-time monitoring, you can respond to security threats quickly and effectively.
  2. Convenience: The mobile access feature makes it easy for employees and visitors to enter secure areas without the need for physical keys or access cards. It streamlines the entry process and reduces the risk of lost cards or key duplication. With Brivo Door Station, what used to require integration between separate video and access control platforms is now concentrated into a single device.
  3. Cost-Efficiency: Brivo eliminates the need for extensive physical infrastructure and personnel required to manage traditional lock and key systems. This leads to cost savings over time.
  4. Remote Management: The ability to manage your security system remotely is a major advantage, especially for businesses with multiple locations or those that require frequent access updates.
  5. Event/Video Logs: Brivo’s event-driven video capture shines a light on every corner, empowering facility monitors with a crystal-clear view of potential vulnerabilities and ensuring proactive security measures.

Whether you’re a small business owner looking to enhance the security of your office or a large corporation with complex access control needs, Brivo can be tailored to fit your requirements. Security Technology of South Texas is an authorized Brivo dealer and integrator for the South Texas area with wide exposure integrating access control in various commercial settings. Contact us today to begin the process of securing your facility or business.

Emotet Computer Worm

 

 

Security researchers have detected a new form of the famous malware loading program Emotet. This modified version of the worm spreads through Wi-Fi networks that are protected only by weak passwords. What makes this malware a worm as apposed to a virus is that while viruses must be triggered into activation by their host, worms can self-replicate and propagate independently as soon as they have breached a system.

According to Binary Defense, the main executable used for this process is called worm.exe.

“Upon startup of Worm.exe, the first action it takes is to copy the service.exe string to a variable that will be used during file spreading. Next, it steps into the main loop and immediately begins profiling the wireless network using wlanAPI.dll calls in order to spread to any networks it can access,” the firm explained.

Before it can infect a system, the malware must first defeat the password through a brute-force attack. By profiling the networks in this way beforehand, the worm maximizes its efficiency and can compromise more systems. If your password is not sufficiently robust, it is certainly possible that a simple brute force or dictionary attack against your network could succeed.

Once inside the network, Emotet begins searching for all non-hidden shares – either brute forcing these as well or doing the same for the administrator account within the network resource.

When individual user accounts have been accessed, it then modifies its binary which installs Windows Defender System Service to gain persistence.

Researchers noted that a worm.exe timestamped for 4-16-2018 indicates that the module may have been running without being detected for a considerable amount of time. It is possible that this is due to its infrequent use by attackers or because for it to show up researchers would have to have a Wi-Fi card in their sandbox environment.

The main takeaway and the good news for businesses is that stronger passwords make brute forcing entry incredibly processor intensive and is the best protection against such attacks.

“Detection strategies for this threat include active monitoring of endpoints for new services being installed and investigating suspicious services or any processes running from temporary folders and user profile application data folders,” the vendor concluded.

“Network monitoring is also an effective detection method, since the communications are unencrypted and there are recognizable patterns that identify the malware message content.”

In the increasingly network connected world, having your IoT devices infected can take your business totally offline depending on what you do. That is why is it critical to use passwords that take into consideration best practices for information security. Most all attacks against our systems rely on some element of user error or negligence, so consider making information security a part of your organization’s culture.

 

Automatic Systems Turnstiles

 

The events of the last year have created a demand for products that function not only as physical security measures, but also create an environment that is conducive to COVID rule adherence. While mask detection and temperature readings are being done in the video surveillance market, the access control industry has moved to “contactless” interfaces and designs that put distance between people. Here we will take a look at a world class manufacturer of such technology; Automatic Systems.

Automatic Systems flagship Slimlane turnstiles features bi-directional glass panels with stainless steel, giving them a sleek but discreet look that fits in to just about any environment aesthetically. The Slimlane comes in different configurations and heights from 600mm to 1700mm, single or twin lanes. These contactless glass turnstiles eliminate the physical manipulation of classic “Tripod” turnstiles that require a person to push through each time and can be configured for several access control protocols, including facial recognition and RFID cards. This appeals to those businesses that have a high rate of pedestrian traffic and want to minimize physical interaction.

Given that the Slimlane is a glass barrier, it is not meant as your only line of defense with respect to access control, but rather as a traffic control measure and people counter, allowing you to create a database of who went in and out and at what times.  The turnstiles would likely be paired with overview cameras to tie a visual record to the foot traffic.

At STST Inc., we are one of few dealers in the area certified by Automatic Systems to install their products and were trained in person by their technical staff. We have successfully completed projects at major corporations involving their turnstiles and the result is efficient and aesthetically satisfying. In the post-COVID world, businesses all want to at least appear as though they are doing something and are moving quickly to adopt contactless infrastructure. While they are a significant investment, organizations recognize the paradigm social shifts we are undergoing and are looking to add products like this to their facilities.

Security Technology of South Texas Inc. is a South Texas commercial video surveillance and access control integrator. We use high-end, quality products like the bigger corporations but have the responsive service of a small business. We have completed projects of all sizes and types. Call us today to get started on securing your facility.

 

210-446-4863

admin@gostst.com

https://securitytechnologyofsouthtexas.com/contact-us/

Access Control Systems Based on Physical Attributes

The ultimate access control system would uniquely identify a person and admit that person and only that person independent of whether the person possessed a particular coded card or token and/or knew a particular code. This ultimate identification system would be based on one or more physical characteristics.

Nonautomated physical attribute identification systems have long been the primary method of verifying the identity of a person: the signature (as used on personal checks and credit card slips); the fingerprint (as used by the FBI); pictures (as used on ID badges, passports, driver’s licenses, which have become the preferred form of identification for banking and credit transactions);and, to a limited extent in some criminal proceedings, the voiceprint. Digital Network Architecture may be next.

 

Types of Systems

The equipment that is now available for access control in some cases measures the physical attributes that are well-known and of accepted legitimacy, and in others relies on attributes that the manufacturers themselves have represented as being unique. A discussion of the current offerings follows; other techniques will doubtless come and go.

 

Facial Recognition.

There has never been a fully automated system using the face as a physical attribute, although for twenty years semi-automated systems have been available that store a person’s picture on microfilm, videotape, videodisk, or digital memory. Such systems are a sort of nonportable picture badge, with the image retrieved by an automated identification means such as a card or a PIN. Another simple and economic form of face-based non-automated access control that has become popular is the video intercom, which was originally developed for entry lobbies in apartment buildings. This device allows the occupant to both speak with and see the face of a visitor before opening the door (usually electronically).

 

Signature Comparison

The signature is the basis for personal identification in hundreds of millions of financial transactions every day. There are machine-assisted methods for presentation of a stored signature image to the bank teller, but these are not used for access control. There has never been a fully automated system for signature comparison, although for twenty years there have been fully automated systems that are based on the manner in which the person writes the signature (e.g., pressure, acceleration, speed), rather than on the appearance of the finished signature.

 

Fingerprint Comparison

Fully automated fingerprint access control systems have been marketed for 25 years by a continually changing series of unsuccessful vendors originally driven by work for the FBI and the Air Force. The technology is similar to that used in the FBI fingerprint search operation, which makes 15,000 searches a day through a file of 25 million prints. Fingerprint-based access control can be installed for a price that is little more than that for a top-end card access or proximity system.

 

Hand Geometry

Hand geometry as a unique physical attribute stems from a 1971 study by Stanford Research Institute on the efficiency of manufacturing and inventorying gloves for Air Force pilots. An access control system based on this physical attribute was introduced in 1972. It was successfully sold and widely used under the aegis of several companies, but was abandoned by a major player in the security electronics field in 1988 as a business area not worth pursuing. New systems are on the market today, at prices that are competitive with those for card access systems.

 

Voice Recognition

Voice recognition was the subject of extensive research activities in the early 1970s, but no serious voice-based products were marketed until the late 1980s. Voice input has a natural cost advantage over other physical attribute-based access control systems in that the data-entry mechanism is an inexpensive telephone handset and the workings are all electronic. However, it has suffered from suspicions of unreliability and fear of being easily outwitted by recording and playback devices, and from government reports openly stating these concerns. There have been a number of products on the market from time to time, at prices competitive with those for card access systems. One rudimentary form of voice-access control is the telephone entry system, which is actually a machine-assisted voice-plus-keypad system. Like the video intercom, it is intended for multi-unit residences and requires that the person on the inside recognize the voice of the prospective admittee.

 

Blood Vessel Patterns

Other systems analyze the patterns of blood vessels on various portions of the human anatomy. One system that was introduced in 1983 is based on the conclusion of a 1935 medical paper that the pattern of the blood vessels on the retina of the eye is unique. Another uses the blood vessels on the wrist. A question is legitimately raised about whether any one physical attribute provides a more dependable basis for identification than the others. Fingerprints certainly have the most solid legal precedent and endorsement through long-term use, and there is only one chance in a billion that two randomly selected fingerprints will match. Signatures are also well accepted as identification for financial transactions. Voiceprints have acquired some legitimacy in the courts. Faces have never been measured in an automated identification system. The uniqueness of the other attributes is validated only by the claims of the companies that sell the equipment. In practice, however, all of the products have accuracy rates in the one-in-a-thousand category because of the problems in measuring the attribute, and no attribute has been demonstrated to be superior.

 

These methods of biometric access control can be paired with other forms of authentication such as PINs, passwords, proximity or I-class cards to add another layer of assurance. Because biometrics are still not at the point of 100% accuracy, the room for error they leave necessitates, generally, the use of another method in conjunction with them. In the near future however we can expect the accuracy of these methods to improve and eventually become primary access control measures.

 

Security Technology of South Texas is a local leader in access control, video surveillance, and community management systems in the South Texas area. Get in touch with us today to see what we can do to help secure your location.

 

STST Inc.

Please contact us through email at admin@gostst.com

Through our website form :

www.securitytechnologyofsouthtexas.com/contact-us/

Or by phone at 210-446-4863     24/7