A Virtual Geospatial Fence On Network Access

GPS has replaced a folded paper map and become the ubiquitous navigation tool, providing real-time information, and including such features as turn-by-turn guidance, ETA, restaurants and fuel stopd along en route. It was a quantum leap in providing geospatial data.

The technology has advanced even further with apps like Google Maps and Waze that reroute your travel around construction zones, heavy traffic and other road hazards by leveraging data from their users and other devices connected to the applications. 

Safeguarding IT now requires a multi-layered approach that incorporates security technologies and user training.

Geo-fencing creates a virtual fence on a user’s network access. This limits authentication from a whitelisted location or restricts access from a blacklisted location. The location of a geo-fence can be defined within an office building or a specific IP address, or some other physical parameter.

It is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. Geo-fencing allows an administrator to set up triggers so when a device enters (or exits) the boundaries defined by the administrator, an alert is issued, according to medium.com.

The latest release of ReconaSense’s Risk-Adaptive Security & Access Control delivers proactive, intelligent and geospatial physical security. 

The system unifies typically siloed data from security systems, cameras, IoT devices, sensors and building automation systems to provide a common operating picture and risk intelligence. With technology that identifies abnormal activity and adjusts risk levels in real time,

ReconaSense risk-adaptive access control spots threats to life safety and overall security and can minimise risks. Its geospatial AI capabilities enable geo-fencing, risk-aware guidance and remote control. 

Medium:        Reconasense:          I-HLS:

You Might Also Read

Business Is Starting To Believe That  AI Is The Best Defence:

 

« AI Delivered Healthcare Creates Serious Legal & Ethical Issues
10 Predictions For The IoT Future »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Check Point SASE

Check Point SASE

Check Point SASE (formerly Perimeter 81) is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.