Showing posts with label open system architecture. Show all posts
Showing posts with label open system architecture. Show all posts

Saturday, September 24, 2016

JKS Access Control Solutions Week – KABA Keyscan K-PROX3 125 kHz proximity reader

The Keyscan K-PROX3 is a robust and affordable reader with a sleek, modern finish. The K-PROX3 features stellar technology, multiple mounting options and anti-tamper capability for truly unrivalled performance and dependability. K-PROX3 boasts dedicated features designed for exclusive use with Keyscan’s Present3 and facility lockdown function. When enabled, the reader will indicate status with new auxiliary LED indicators. These features are enabled with firmware and a programming card (sold separately). However, it will function on all Keyscan systems with or without these features enabled.

The K-PROX3 is the ideal choice for Keyscan access control systems with 125 kHz proximity reader requirements.
                       The K-PROX3 has:
  • An innovative ‘heartbeat’ technology. If this heartbeat is interrupted due to wiring fault, damage an alarm condition is triggered by the Keyscan control panel
  • New dedicated LED indicators Keyscan Present3 and facility lock down features (firmware and programming card required)
  • On board beeper to generate audible tones or sound a local "door-held-open" alert
  • Versatile mounting options with 2-in-one, mullion or single gang, electrical box mounting applications
  • Epoxy encased electronics and well-suited for both interior or exterior use
  • Impressive read range
  • Durable, weather-resistant construction for reliable operation and long usage even in harsh environments
  • Limited lifetime warranty


For more information, contact us at:
860-436-4664 / security@jks-systems.com

www.jks-systems.com

Tuesday, August 23, 2016

JKS Physical Security Week #1 - JKS Physical Security – Assa Abloy Sargent 8200 Mortise Lock Series


Maximum Flexibility
  • Fast and easy installation. Lock is easily re-handed without removing parts or opening the lock case
  •  Aesthetic design. Many escutcheon and lever styles available to match a wide range of styles
  • Many standard architectural grade finishes, including Polished Nickel (US14) & Satin Nickel (US15) finishes
  •  53 functions including 4 electrical functions. The most in the industry for a broad range of applications
  •  Versatile. Offered for door thicknesses ranging from 1-3/8" (35mm) to 6" (152mm)
  •  Available with vandalism deterrent trim and/or secure fastener options Torx® and spanner screws for high abuse conditions
  • Available with push/pull trim, perfect for hospital applications




Maximum Strength & Durability
  • Certified to and exceeds ANSI/BHMA A156.13, Series 1000, Operational Grade 1 and Security Grade 1 with all standard trims
  •  Meets and exceeds ASTM F1577-95b paragraph 6.2 detention impact level 1 for deadbolt functions, level 3 for latchbolt only functions
  • Exceeds cycle testing requirements by 14 times the ANSI/BHMA A156.13 Grade 1 standard
  •  Case: 12 gauge heavy duty wrought steel, zinc dichromate plated. Thickness 7/64" (3mm) (.109")
  • 1/8" (.125) cold-rolled steel inside front holds lock securely in door
  •   Heavy duty wrought steel hubs and high carbon steel spring cartridge provide superior strength and cycle life for 8200 locks
  •  Latchbolt is stainless steel with 3⁄4" (19mm) projection one-piece, anti-friction reversible latch
  • Deadbolt is one-piece hardened stainless steel with 1" (25mm) projection
  • Optional 8200 stainless steel hubs for Institutional setting (specify 3- option)


Security
  • Multiple security trim options available: free-wheeling, security escutcheon and anti-vandal pull
  • Security key systems available (Degree, Signature, Keso, Keso F1, & XC)


Contact JKS now to learn more!
security@jks-systems.com / 860-436-4664

Saturday, July 30, 2016

JKS Systems Cyber Security Solutions- Cisco Advanced Malware Protection


Cisco Advanced Malware Protection is the industry's leading malware protection solution.

With a database of over 500 million known files and over 1.5 million new incoming file samples every day, AMP provides not only global threat protection but also extensive visibility during and after a malware attack.

·         Enhanced Threat Defense - Automatic protection against millions of malicious files. Retrospective detection if a file is discovered to be malicious after it enters the network
·         Contextual Visibility - Pivot easily on a particular threat, client, or external threat source. New Security Center provides a quick way to see threat data across multiple sites
·         Rapid Detection - Automatic alerting for retrospective malware detection. Protection against new and emerging threats through the work of Cisco's TALOS team
·         Ease of Management - Enable best-in-class malware protection with just two clicks. Configuration and reporting integrated natively into Cisco Meraki's cloud dashboard


WHY AMP ON MERAKI MX?
The threat landscape is constantly evolving, and it's more important than ever to have a security solution that does more than just block malware. Security experts increasingly agree that deep visibility is crucial to maintaining effective network security.
With AMP, a world class malware database is paired with context-aware monitoring and reporting, retrospective malware analysis, and Threat Grid sandboxing to provide an anti-malware solution that does more than just prevent users from downloading malware – it provides comprehensive security before, during, and after a malware attack.
Best of all, integration into the Cisco Meraki cloud dashboard means it's incredibly easy for Meraki MX customers to configure and monitor AMP, or to move seamlessly back and forth between threat intelligence and network management.

NEW AMP FEATURES
·         Real-time malware blocking
Automatically check downloaded files against the global AMP database in real time and block malicious files before they can pass through the network perimeter. With the new Security Center you get a straightforward summary of threats seen across all of your networks, or drill down into the details of a particular attack or threat.
·         Retrospective malware detection
By maintaining information about files even after they are downloaded, we can report on files that were determined to be malicious after they were downloaded. We even send automatic email alerts informing you that a file downloaded previously on your network has been newly discovered to be malicious so that you can investigate and take action.
·         Threat Grid (coming soon)
Get unmatched protection against emerging threats by sending unknown files to Threat Grid to be executed in a virtual environment. Threat Grid matches actions taken by those files against over 625 behavioral indicators. Even better, Threat Grid's findings are reported to the AMP cloud so that all AMP customers will be protected against newly discovered malware.


For more information, please contact JKS at:
security@jks-systems.com / 860-436-4664
www-jks-systems.com