Johnson Controls launches new Cardkey P2000

April 2005 Cyber Security

Johnson Controls has launched the latest version of the Cardkey P2000 security management systems, featuring a number of enhancements. In addition to a new remote redundancy option for increased system reliability, the system offers new features to help facilities meet certain guidelines set by the transportation security administration (TSA) and the food and drug administration (FDA), highly relevant in the context of airports and drug manufacturing plants.

A new remote redundancy option enables host servers to be mirrored over a commercial quality wide-area network, ensuring security even when the primary host site is down or compromised. When integrated with closed-circuit television, the system provides significantly enhanced security with the flexibility to retrofit many geographically dispersed locations.

"Our customers rely on us to understand their business, not just their security needs. This is particularly true among our customers in the heavily regulated transportation and life sciences industries. As a systems integrator with a long history of serving facilities in a wide variety of markets, Johnson Controls is well positioned to deliver customised solutions," says Neil Cameron, divisional manager, Johnson Controls.

"Through innovative solutions and unstructured thinking we are paving the way for facilities to make a critical contribution to organisational goals. Johnson Controls creates environments in which cost, productivity and shareholder value are as important as safety, health and comfort, positively impacting bottom line results," Cameron adds.

For more information contact Neil Cameron, Johnson Controls, 011 886 8997, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Defining the resilience of cybersecurity
Cyber Security Security Services & Risk Management
Cyber resilience is less buzzword and more critical business strategy as the cybercrime landscape grows in intent and intensity.

How to stay cybersafe on business trips
Cyber Security
No matter where you are in the world, tech-savvy criminals are looking for ways to exploit email addresses, social media profiles, passwords, financial data and stored files.

The challenge of data safety and availability
Technews Publishing Editor's Choice Cyber Security
Veeam offers backup and recovery software that presents the user with one interface to manage backups to and from almost any platform.

How safe are your backups?
Technews Publishing Cyber Security
Immutable backups prevent malware from compromising your data and ensure the right data is restored in an emergency when following a four-step backup process.

Growing cyber resilience portfolio
Technews Publishing Cyber Security
Hi-Tech Security Solutions spoke to Richard Frost, who heads up Armata, to find out what the company offers in terms of cyber resilience.

Adopting a cyber-secure mindset
Security Services & Risk Management Cyber Security
Adopting a cybersecure mindset is the key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Advanced technologies to curb corruption
News Cyber Security IT infrastructure
The use of advanced technology to curb fraud, corruption and cyber-related crimes received a massive boost as the Council for Scientific and Industrial Research (CSIR) and Special Investigation Unit (SIU) agreed to work together.

Reversing the hidden risk of permission creep
Cyber Security
Employees can collect a range of access rights to business systems throughout their tenure. It's a phenomenon called 'permission creep': one of the biggest cybersecurity risks for organisations today.

Mitigating the risk of zero-day attacks against Microsoft 365
J2 Software Cyber Security
Microsoft 365 servers contain extremely sensitive information and most organisations simply cannot do without it for an extended period of time.