A Virtual Geospatial Fence On Network Access

GPS has replaced a folded paper map and become the ubiquitous navigation tool, providing real-time information, and including such features as turn-by-turn guidance, ETA, restaurants and fuel stopd along en route. It was a quantum leap in providing geospatial data.

The technology has advanced even further with apps like Google Maps and Waze that reroute your travel around construction zones, heavy traffic and other road hazards by leveraging data from their users and other devices connected to the applications. 

Safeguarding IT now requires a multi-layered approach that incorporates security technologies and user training.

Geo-fencing creates a virtual fence on a user’s network access. This limits authentication from a whitelisted location or restricts access from a blacklisted location. The location of a geo-fence can be defined within an office building or a specific IP address, or some other physical parameter.

It is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. Geo-fencing allows an administrator to set up triggers so when a device enters (or exits) the boundaries defined by the administrator, an alert is issued, according to medium.com.

The latest release of ReconaSense’s Risk-Adaptive Security & Access Control delivers proactive, intelligent and geospatial physical security. 

The system unifies typically siloed data from security systems, cameras, IoT devices, sensors and building automation systems to provide a common operating picture and risk intelligence. With technology that identifies abnormal activity and adjusts risk levels in real time,

ReconaSense risk-adaptive access control spots threats to life safety and overall security and can minimise risks. Its geospatial AI capabilities enable geo-fencing, risk-aware guidance and remote control. 

Medium:        Reconasense:          I-HLS:

You Might Also Read

Business Is Starting To Believe That  AI Is The Best Defence:

 

« AI Delivered Healthcare Creates Serious Legal & Ethical Issues
10 Predictions For The IoT Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

IndoSec

IndoSec

IndoSec is an annual cybersecurity summit that powers an in-person gathering of cybersecurity leaders from Indonesia’s major corporations, leading businesses and key government entities.