Securing Remote Towers
Ever-expanding cell phone carrier networks need a way to secure the thousands of remote towers and facilities within their coverage area. These locations can be subjected to harsh environmental conditions, as the sites may be located anywhere from salty, humid environments like the sea shore to the tops of snow-covered mountains. In addition, access control must be easily managed for both employees and outside contractors, who are often called upon to perform work at the remote locations. Read how the benefits of the CyberLock system are immediately apparent to cell phone providers.
Executive Brief: Transportation Departments
Regional and local Departments of Transportation throughout the United States struggle to properly secure traffic cabinet boxes, traffic lights and road communication equipment. The leading problem in transportation security is unchecked key duplication. For most traffic cabinet locks, a standard #2 key is issued to control access. These #2 keys are all identical, extremely prevalent, and easily duplicated. With potentially hundreds of keys in circulation, transportation departments are searching for a more effective security solution. This document will cover key duplication concerns, identify which assets demand protection, and illustrate how key-centric solutions can improve security and accountability.
Reducing a Church’s Exposure to Risk
As a group, churches are considered high-risk by insurance companies and it is reflected in their soaring premiums. There are sound reasons for the disparity in insurance costs. Collectively, churches are easy targets for internal and external theft. There is open access to computers, copiers, and media devices. Sound and AV equipment is often high-end and extremely expensive. Musicians leave their various instruments including keyboards at the church unsecured and unattended.
Securing America’s Telecommunications Infrastructure
The threat of terrorism and a succession of devastating hurricanes, tornados, and floods emphasize our country’s dependence on an effective national telecommunications infrastructure. Telecommunication companies are a critical part of America’s infrastructure and key to securing our homeland in times of emergency. Reliable, resilient communication services can provide the bridge between emergency responders, firefighters, and law enforcement for cohesive emergency management.
Securing Remote Access and Theft Prevention
TSA regulatory requirements state that airport operators must show control of all the access points in their air operations area (AOA). For most airports, this means securing hundreds of remote access points and managing access for hundreds of key holders. Threats of insider theft by personnel add another layer of concern for airport operators. After 9/11, many airport systems were upgraded to increase security, but still for many, an update is crucial. An estimated shelf life of an access control system today is about 15 years old, with many airports utilizing systems over 25 years old.
Water Utility Security: Challenges and Solutions
The repercussions from 9/11 and continued terrorist threats have put increased pressure on water utilities to secure their physical assets and electronically track anyone that accesses their facilities. Acting under the authority of Congress, the Environmental Protection Agency (EPA) has developed vulnerability assessment guidelines to help water utilities evaluate their susceptibility to potential threats and identify corrective actions needed to reduce risks. Although the EPA is our country’s designated water utility enforcement agency, there are no provisions in the water security regulations that give the EPA authority to enforce compliance. Nevertheless, a growing number of water facilities consider security essential to their operations and are giving it precedence.