Brivo: A Fully Integrated Security Platform

Brivo systems for building security and access control are able to automate security and management of access control systems for buildings. These systems are fully scalable and are cloud-based.

The features of a Brivo access control system are robust and extensive. With general access control, building access control can be automated and include reports to your phone. Brivo offers a mobile management platform which allows administrators to enable users to access doors with their phones remotely. Visitor management is also a focus, and a comfortable and welcoming environment is maintained while still automating tracking of visitors.

Video surveillance cameras will offer real-time visual access to critical areas and simple access to visual records. Identity management updates the user identity across multiple IT systems. Elevator control is also available. This allows a view of who has access to what floors as well as the ability to manage elevator traffic in taller tower buildings.

Brivo uses a unique security platform called Brivo Onair API. This cloud-based solution allows building access control to be custom designed with centralized management. Of course, without solid cybersecurity, electronic systems such as these are vulnerable to attack and exploitation. Brivo builds their products to use 256 bit AES encryption, with no open inbound ports to allow for attacks. Real-time alerts allow administrators to see DDos and Bot attacks and begin to take action against the attack.

AES 256 bit encryption is the same protocol used in banks, and Brivo also employs a SHA256 certificate with a 4096-bit key. Control panels communicate on just a single outbound port (443), which greatly reduces the “attack surface” that open ports create in a network. The Onair Cloud service also has components to detect bots and DDos attacks, with every production component having a redundant counterpart. This includes firewalls, load balancers, web servers, application servers and database servers. Furthermore, an independent auditor conducts annual SOC 2 audits to verify full security and compliance of Brivo Onair systems.

This is a small summation of the technology behind Brivo’s industry leading access control and video surveillance technology. By putting total control in your hands, this cloud-based system allows simple, time-efficient management of systems of any scale remotely.

The user can feel safe in the knowledge that Brivo is aware of potential risks and attack vectors, and has taken measures to protect against them. While these details of cybersecurity are not often looked at in depth in articles about access control, they are critical in ensuring the safety and viability of the system, and without them, an access control system may merely be creating new vulnerabilities to a buildings security and safety.

 

 

Security Technology of South Texas is an authorized integrator for many surveillance and access control manufacturers and has designed systems with this kind of functionality.

Please contact us at admin@gostst.com on our website

or via phone at 210-446-4863 24/7

SALTO XS4 GEO Cylinder and The JustIN  Mobile Interface

SALTO’s range of compact electronic cylinder locks are designed for doors where fitting a full-sized conventional handle and lock is not possible or needed. These cylinder locks, like the other SALTO products, are totally free of wires and are networked through the SALTO Virtual Network and SALTO Wireless network.

 

Several models are available including half cylinder, cylinder with thumb turn, double cylinder, padlock, and with a wide variety of profiles, e.g., Euro profile, UK oval, Swiss Round, Australian oval, Scandinavian profiles, ANSI profiles.

 

These locks can be integrated into existing Brivo infrastructure, among other manufacturers. It is also common for SALTO secured facilities to include interior facing panic bars to equip emergency exit doors with the ability to trigger a panic alarm as soon as they are pushed open.

 

In order to bring smartphones into the access control environment, SALTO uses their JustIN technology to integrate smartphones with their locks. JustIN Mobile BLE permits doors to be opened via smartphone, turning the phone into an update terminal for credentials.

 

This is accomplished through Bluetooth Low Energy (BLE), a standard for communicating between a smartphone and electronic locks. The mobile key is provided Over the Air (OTA) from proprietary management software to an installed JustIN Mobile app on a registered and verified smartphone. After this, the user will receive a message that a new key has been provided and information on which doors he now has the access rights to.

 

After this, the user only needs to present the smartphone to the lock in order to gain access. All data including the mobile key are encrypted and secured against cloning.

 

Because users can get these mobile keys at any time and any place, access control solutions are given greater flexibility when issuing and receiving rights without losing out on security.

 

This system can be used in conjunction with or as a replacement of RFID credentials.

 

Another SALTO protocol for phone based access control integration is JustIN mSVN.

 

JustIN mSVN (mobile SALTO Virtual Network), is technology for updating access rights for any credentials using mobile communications. It makes use of the mSVN app and the NFC interface of smartphones. Through this technology, the SVN can be expanded to spots with no online wall reader. Access rights are updated via direct communication between the phone and the credential instead.

 

Any new access rights or blacklist information are communicated to the user from a server to the mSVN app. The smartphone will then serve as the update point for any new credentials moving forward, taking the place of what an XS4 online reader would usually do. All data is encrypted and secured using Mifare DESFire EV1 technology.

 

Security Technology of South Texas is an authorized integrator for many surveillance and access control manufacturers and has designed systems with this kind of functionality.

 

Please contact us at  admin@gostst.com on our website

 

or via phone at  210-446-4863   24/7

Salto Systems: XS4

From its beginning in 2001, SALTO has had one objective: to create an industry leading access control system that is both simple to use and highly efficient. SALTO systems gives users the ability to control their access needs and secure all points of entry without complex and costly wiring build-outs. Their solutions are simple to install, cost-effective, and designed to be future-proof. SALTO’s SVN platform was the result–the world’s first stand-alone, battery powered electronic locks for access control systems.
————————————————————————————————————————————————-
Since then, SALTO has continued to introduce innovations with a major impact on electronic security. With both online and real-time technology, SALTO’s XS4 access control platform augments the security of any building environment through securing nearly any door and allowing the monitoring and control of every user. These systems are networked wirelessly to enable integration with existing systems without running a new backbone through the facility.
————————————————————————————————————————————————-
The SALTO Virtual Network (SVN) is the back-end of wireless connection which allows and access control system to grow from just a small number of doors and users to beyond, seamlessly. Locks can read, receive and write through an encrypted data-on-card system through RFID. A smartcard is used for user authentication.
————————————————————————————————————————————————-
When the card is presented even to an off-line door, access control is maintained and the door also writes data such as blacklist information and battery status onto the card. This smartcard can then transmit this information to a server through online wall readers which can receive information from these cards at any location on-site.
————————————————————————————————————————————————-
Here is a breakdown of the access control chain when the smartcard interacts with the wall reader:
————————————————————————————————————————————————-
-A user access event occurs, the card transmits to the system via wall reader.
————————————————————————————————————————————————-
-Wall reader now transmits back to the card: This includes deleted card list, updated user access rights, and expiry date renovation.
————————————————————————————————————————————————-
-Through the server the following functions can be performed: Users added or deleted remotely, User profiles updated, event audit trail created, device battery report initiated.
————————————————————————————————————————————————-
In review, the benefit of a SALTO lock is in their ability to affordably and quickly be integrated into an access control environment with rapid ability to scale. The locks, wall readers, and smartcards can communicate wirelessly and securely, and there is no need to endure the costly and time-consuming process of drilling, running, and testing wires. These locks are used across all access control environments, from schools and hospitals to businesses and government sites.
————————————————————————————————————————————————-

Security Technology of South Texas is an authorized integrator for many surveillance and access control manufacturers and has designed systems with this kind of functionality.

————————————————————————————————————————————————–

Please contact us at

admin@gostst.com on our website


or via phone at  210-446-4863   24/7

Methods for Enhancing Building Access Control

Whether you have a building that has successfully used the same access control protocols for years or one that needs change, this coming quarter of 2019 is a good time to consider reassessing the system and procedures you use. Critically, if you are not using any form of access control, consider adding it as part of your security plan sooner rather than later.

Having a solid access control system and policies in place will help keep your occupants, assets, and property safe by ensuring secure access for the right people to the right segments of your property.

Sitting next to surveillance and maintaining a human presence on-site, a system of electronic access control completes a triad of safety, and will be designed to take into account the design of the building, any complementary security systems, and training for those who will use it. Following are three things to think about when working with a security integrator to design and implement electronic access control on your properties.

 

1. Setting Access Levels

Borrowing a page from the “Zero-Trust” doctrine of info-sec administrators, it is important to think with the mind of the potential aggressors you are implementing the system to protect yourself against. There will be people who simply do not need access to all levels of a building, and before deciding who should have what level of access, the building itself should be examined to determine points of exposure.

It can be useful to take a map of the structure and break it down into zones of different colors according to the access or security level needed. Then you can decide who can have access and associate time and date restrictions to those identities.

It will generally make sense for the majority of employees to enter and exit through a single point of entry, so as to more easily monitor who is in and out of the building. From there, branch out and look at the rooms inside. Set a protocol in place to make sure everyone has the right level of access for their needs, but nothing more. Modern systems will create a “digital fingerprint” for each person granted access, able to track their movements and any times they accessed specific areas.

 

2. Audit Access

A common trap to fall into is an over-issuing of key fobs or cards over time. As people report losing cards or forget them, it is often simplest to issue another right then and there. Of course, this creates significant security concerns overtime with duplicate access cards potentially being available for malicious use. To manage this, facility admins must either audit the system regularly or set automatic time-out features to the cards.

 

These features could include:

-Access denied if the card has not been used within a set amount of time

-Self-expiration of the card

-The direct connection of the card to a database that will be managed personally or by an administrator

 

In the event that third-party employees require access, a separate database can be created. Using a specific search term for these contractors will differentiate them within the database.

 

3. Perform Periodic Testing and Protocol Assurance

Just like any other electronic system, regular testing and updating of drivers is necessary. Security flaws are repaired through patches by the vendor, and if you fail to update, the potential for threat actors to take advantage of that failure exists.

Furthermore, without the assurance of procedures and protocols surrounding the use of these systems, their value is greatly reduced. For instance, a simple but popular method of building intrusion called “tailgating” relies upon our social tendency towards politeness over security assurance. In this attack, the threat actor simply follows closely behind someone accessing the building and relies on them holding the door for them.

This is actually one of the most difficult to control threats to an access control system due to its simplicity and zero-tech approach. Having multiple layers of security, man-traps, and other fail-safes massively reduces the success rate of “tailgating”. Protocol should assume anyone who cannot present a card or other provided identifier to be a potential threat.

 

Security Technology of South Texas is happy to offer
custom access control and surveillance solutions to the
business security market, designed either turn-key and from the ground up,
or integrated into an already existing series of cameras and access control
structures.

Please contact us through email at admin@gostst.com

or by phone at 210-446-4863 24/7 to schedule a consultation.