End-to-end Security

AEOS with end-to-end security: high-level protection against physical & digital threats

Cybersecurity is the protection of digital systems such as IT networks, websites and apps to prevent unauthorised access to private information and processes. So why do physical access control systems need to be cybersecure?

end-to-end security

Physical access control – a key part of your IT network

Today, most high-quality access control systems are actually IT systems themselves connected to the wider company network. Without adequate protection, your access control system may be vulnerable to people hacking into it – ­and gaining unauthorised entry to your buildings and data.

Your protector needs protection

The results of someone overriding your physical access control system can be dramatic and can range from data theft to physical theft to terror attacks. All of which can pose a serious threat to business continuity, not to mention the risk of devastating repercussions for the people using your buildings and systems.

end-to-end

Our response to strict European guidelines

To address growing cybersecurity threats to physical access control systems, many European countries have published new guidelines. We’ve developed a robust response for AEOS access control that exceeds these stringent new standards.

It’s called end-to-end security and it applies IT best practices to physical access control, including:

 

Encryption

 

Strong authentication

Compliant with:
NEN-EN-IEC 60839-11-1

Rijkspas – ANSSI

 

Regular software updates

Together, they ensure data storage and communication are secure across every element of AEOS.

How AEOS end-to-end security works

Cyber criminals may attack any part of your access control system, physically or digitally. So we’ve considered the complex process each time a card, or other identifier, is presented to a reader. And we’ve secured it end-to-end.

Watch how it works…

Portrait of architects having discussion in office

What AEOS end-to-end security means for you

  • High levels of protection against physical and digital threats.
  • Confidence that your system meets strict security requirements across Europe.
  • Updates can be made quickly, easily and centrally, without physically visiting each card reader.
  • Choose your own flexibility within cybersecurity

Easy to install on existing & new AEOS systems

Whether you already have an AEOS access control system or not, it’s straightforward to implement end-to-end security. Existing AEOS hardware and software are ready to support these crucial new measures.

Want to learn more about AEOS end-to-end security?

Download our brochure today or get in touch.

Frequently asked questions

At a very basic level, access control is a means of controlling who enters a location and when. The person entering may be an employee, a contractor or a visitor and they may be on foot, driving a vehicle or using another mode of transport. The location they’re entering may be, for example, a site, a building, a room or a cabinet. We tend to call it physical access control to differentiate it from access control that prevents people from entering virtual spaces – for example when logging into a computer network.

Read more…

If you decide to use an access control system, it’s probably because you want to secure the physical access to your buildings or sites to protect your people, places and possessions. That’s just the start for access control systems though. The right system, used well, can add value in a range of ways. You can use it, and the data it generates, to boost not just security but productivity, creativity and performance.

Read more…

Today, physical security is about so much more than locks and bolts. Many modern physical access control systems are IP-based, powered by smart software and able to process large quantities of data. This provides more functionality, flexibility, scalability and opportunities for integration. It also means they’re part of your IT network, so it’s essential they’re protected and upgraded – just like your other IT systems.

Read more…

From our perspective, a centralised access control system is always preferable – whether you have just two locations in the same town or hundreds spread around the world. Centralising your access control brings a range of far-reaching benefits.

Read more…

For the people using your building, biometrics can give a better experience compared to an access badge. These days, biometrics are used for both identification and verification – sometimes even both at the same time. Being allowed to enter your building just by scanning your hand or face makes access control more convenient than ever.

Read more…

Mechanical keys are the simplest form of physical access control and the method many smaller organisations use. Even for a small company, however, using mechanical keys has several flaws and limitations – especially as an organisation gets bigger. Below are just some of the problems presented by using keys.

Read more…