IRVINE, Calif., January 17, 2013 – HID Global®, a worldwide leader in secure identity solutions, announced that its network access control solutions and contactless readers have been selected by Shenyang Transformer Group Co., Ltd. (Shenyang TBEA) in China to enable access level settings and area control to prevent unauthorized entry. The solution fully leverages Shenyang TBEA’s existing TCP/IP network investment to deliver a centralized, web-based access control system that provides central monitoring, report generation, the ability to establish staff access level settings and visitor management. The new system is interoperable with the plant’s existing credentials and seamlessly integrates with a wide range of hardware and management software for additional deployments. Featuring dispersed entry points over a 720,000 square meters industrial park, Shenyang TBEA deployed HID Global’s VertX® V1000 network controllers, VertX® V100 door/reader interfaces, iCLASS® R10 readers and iCLASS® R30 contactless smart card readers to safeguard the plant’s integrated factory, R&D building, administrative offices, elevators, mixed working areas and key equipment rooms.
“After our extensive assessment, we selected HID Global and its physical access control solutions for their leading technology and comprehensive product functionality. We had an experience where some HID Global controllers were accidentally submerged under water and the products still functioned properly without any defects, validating HID Global’s robust product design and quality,” said Mr. Yu Liuyi, project manager with Shenyang TBEA. “As a global leader in secure identity solutions, HID Global offers a lifetime warranty to their customers, which eliminates our concern regarding post-sales service and support.”
The new system achieves significant cost savings by enabling additional deployments such as time and attendance, remote area control and visitor management while supporting the factory’s existing MIFARE® credentials. Additionally, the solution can seamlessly integrate with multiple sub-systems such as surveillance and fire control systems for area control and safety management.
Download the case study for more information.
Stay Connected with HID Global Visit our Media Center, read our Industry Blog, subscribe to our RSS Feed and follow us on Facebook, LinkedIn and Twitter.
About HID Global HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications. Primary brands are ActivIdentity®, EasyLobby®, FARGO® and HID®. Headquartered in Irvine, California, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com.
® HID, the HID logo, iCLASS and VertX are trademarks or registered trademarks of HID Global in the U.S. and/or other countries. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana