A Virtual Geospatial Fence On Network Access

GPS has replaced a folded paper map and become the ubiquitous navigation tool, providing real-time information, and including such features as turn-by-turn guidance, ETA, restaurants and fuel stopd along en route. It was a quantum leap in providing geospatial data.

The technology has advanced even further with apps like Google Maps and Waze that reroute your travel around construction zones, heavy traffic and other road hazards by leveraging data from their users and other devices connected to the applications. 

Safeguarding IT now requires a multi-layered approach that incorporates security technologies and user training.

Geo-fencing creates a virtual fence on a user’s network access. This limits authentication from a whitelisted location or restricts access from a blacklisted location. The location of a geo-fence can be defined within an office building or a specific IP address, or some other physical parameter.

It is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. Geo-fencing allows an administrator to set up triggers so when a device enters (or exits) the boundaries defined by the administrator, an alert is issued, according to medium.com.

The latest release of ReconaSense’s Risk-Adaptive Security & Access Control delivers proactive, intelligent and geospatial physical security. 

The system unifies typically siloed data from security systems, cameras, IoT devices, sensors and building automation systems to provide a common operating picture and risk intelligence. With technology that identifies abnormal activity and adjusts risk levels in real time,

ReconaSense risk-adaptive access control spots threats to life safety and overall security and can minimise risks. Its geospatial AI capabilities enable geo-fencing, risk-aware guidance and remote control. 

Medium:        Reconasense:          I-HLS:

You Might Also Read

Business Is Starting To Believe That  AI Is The Best Defence:

 

« AI Delivered Healthcare Creates Serious Legal & Ethical Issues
10 Predictions For The IoT Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.