Security by design

March 2019 Information Security, Integrated Solutions

Cyber threats are growing, and they are coming from every direction. Access control, CCTV, perimeter and intrusion detection solutions – because they are connected to the IT domain and to sensitive IP and data – are an attractive target. The strength of the security platforms on which they are built will thus increasingly impact the purchase decisions of users, and market positions of vendors.

The companies that will lead the security industry in future are those that understand the risk and invest in building security into the entire lifecycle of their products, from initial design concept, through product development, deployment and rapid incident response to meet evolving cybersecurity threats and the needs of evolving environments.

Marius Brits.
Marius Brits.

Opening the door

Consider the security risk that a hacked access control system may present: it opens the door to people’s credentials, identities, access card and even biometric data, not to mention sensitive video footage and other company data assets, such as personnel records. It may also open the door, physically, to company facilities. As the digital environment continues to expand and evolve, so do security threats. This means the security of these solutions must continually evolve too.

For C-level and IT/security leaders three factors are top of mind:

• Mitigating the risk of hacktivism and malicious or criminal insiders,

• Protecting data access in-transit and in-storage, and

• Exposure, liability and compliance.

Properly configured software and hardware infrastructure is vital to protect a company from cyber-attacks and ensure compliance with security controls.

Johnson Controls’ Cyber Protection Programme

At Johnson Controls, a dedicated Global Product Security team leads the Cyber Protection Programme (CPP). Many of the solutions we provide to customers, which include access control, CCTV solutions and intrusion protection, are critical to operations, directly impacting safety, security and compliance with industry regulations.

Disruption is not an option. Operational technologies often provide critical functions which, if disrupted, can impact not just operational efficiency and profits, but also result in disclosure of sensitive information.

We address this by ensuring that every Johnson Controls product that is developed meets the standards of the CPP and complies with its policies. Each product is subject to extensive testing, has the CPP software loaded and will receive regular security upgrades throughout the life of the product.

Having engineering teams trained in cybersecurity has given Johnson Controls an advantage in developing products that consider cybersecurity within its core design. Our certified cybersecurity experts (CISSP, CSSLP, CEH, CCSP, etc.) work to validate designs using the latest recognised industry standards and practices. Expert driven cybersecurity designs provide the forethought required to reduce risk.

Three pillars

Johnson Controls’ CPP is built on three pillars: secure development, deployment services and rapid response.

• Secure development: Baseline design requirements that address core cyber threat categories for elevated security. Dedicated in-house cybersecurity test labs focused on discovering and neutralising concerns before they reach customers. Extended testing, including bug bounty programs and third-party penetration testing, provides verification and validation assurance. Solution designed features that enable easier compliance with corporate policies Certified and trained experts driving design decisions.

• Deployment services: We apply a multi-pronged approach: customer education to help drive more secure installation, compliance assistance to help our customers comply with industry and organisational policies, and provision of security documentation for IT acceptance.

• Rapid response: A product that is secure today may not be secure tomorrow. Through the rapid incident response service, our cybersecurity team quickly assesses new threats and vulnerabilities and advises customers on how they may reduce their cybersecurity exposure.

Future-secure

Security is a shared responsibility. Every organisation is responsible and accountable for protecting the business, its shareholders and its customers. Choosing secure products that protect against evolving risk is an important part of ensuring ongoing security. This means that building security into products and software must, now and in the future, be standard core policy and protocol for vendors. One thing is sure: the strength of the security fundamentals built into products will become a key driver of product purchases and will impact the market share of solutions.

For more information contact Johnson Controls, +27 11 921 7129, [email protected], www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...