HVAC Equipment
  • JohnsonControls
  • YORK
  • Luxaire
  • Champion
  • Quantech
  • Coleman
  • Source1 HVACSupply
  • Envirotec
  • Koch Filter
  • TempMaster
  • Triatek
Security
  • Tyco American Dynamics
  • Tyco CEM Systems
  • Tyco DSC
  • Tyco Illustra
  • Tyco Kantech
  • Tyco Software House
  • Visonic
Digital Solutions
  • JohnsonControls
Industrial Refrigeration
  • YORK
  • Frick
  • Sabroe
  • york
Fire Suppression
  • Tyco
  • ANSUL
  • Chemguard
  • SKUM
  • Rapid Response
  • Sabo Foam
  • Hygood
  • Grinnell
  • SprinkCAD
  • Pyro-chem
  • WILLIAMS
  • AquaMist
Retail Solutions
  • Sensormatic
  • ShopperTrak
  • TrueVUE
Residential and Smart Home
  • JohnsonControls
  • LUX
  • Tyco DSC
Building Automation & Controls
  • JohnsonControls
  • Metasys
  • PENN
  • Facility Explorer
  • Verasys
  • BCPRO
Fire Detection
  • Autocall
  • FireClass
  • Simplex
  • Vigilant
  • Zettler
  • DBE
Distributed Energy Storage
  • JohnsonControls

Global Directory

HVAC Equipment
  • JohnsonControls
  • YORK
  • Luxaire
  • Champion
  • Quantech
  • Coleman
  • Source1 HVACSupply
  • Envirotec
  • Koch Filter
  • TempMaster
  • Triatek
Security
  • Tyco American Dynamics
  • Tyco CEM Systems
  • Tyco DSC
  • Tyco Illustra
  • Tyco Kantech
  • Tyco Software House
  • Visonic
Digital Solutions
  • JohnsonControls
Industrial Refrigeration
  • YORK
  • Frick
  • Sabroe
  • york
Fire Suppression
  • Tyco
  • ANSUL
  • Chemguard
  • SKUM
  • Rapid Response
  • Sabo Foam
  • Hygood
  • Grinnell
  • SprinkCAD
  • Pyro-chem
  • WILLIAMS
  • AquaMist
Retail Solutions
  • Sensormatic
  • ShopperTrak
  • TrueVUE
Residential and Smart Home
  • JohnsonControls
  • LUX
  • Tyco DSC
Building Automation & Controls
  • JohnsonControls
  • Metasys
  • PENN
  • Facility Explorer
  • Verasys
  • BCPRO
Fire Detection
  • Autocall
  • FireClass
  • Simplex
  • Vigilant
  • Zettler
  • DBE
Distributed Energy Storage
  • JohnsonControls

Global Directory

Enhanced Insider Security: Protect Your Data Center, Your Data, and Your Reputation

A Technologically Sophisticated Approach to Security for Data Centers

The modern enterprise runs on data—and data may be your most valuable asset. You protect your data with state-of-the-art physical security measures, and we can add real value to that layer of protection with our location-based Enhanced Insider Security (EIS) solution.

This software-based approach uses wireless sensors, beacons, and gateways to monitor real-time locations of people and assets. Our EIS platform collects all this location data, and proprietary algorithms analyze it to generate alerts of suspicious or unauthorized behavior. It’s better to anticipate potentially troublesome situations before they become data leaks or hacks.

Intelligent Security Protocols

Create and geofence zones with varying levels of security; EIS will analyze data and alert you to potential threats in real time.

Monitor Multiple Locations

Leverage your existing security infrastructure thanks to EIS’s open platform, which can read location data from virtually any wireless sensor or system.

Use Existing Technology

Remotely monitor alerts, for multiple zones and locations, through a single interface.

Man working on laptop and maintaining servers in data center

Enhanced Insider Security is Converged Security

Our Enhanced Insider Security solution is an example of a converged security system. It uses software to collect data from multiple systems, including beacons, Bluetooth-based badge trackers, smart plugs, mobile devices (via Wi-Fi), ultra-wide-band location systems, and desk occupancy sensors. This wealth of data enables the system to track movement within your security zones, according to the criteria you set, and to look for behavior that is unauthorized or suspicious:

  • Unaccompanied visitor
  • Abandoned badge
  • Zoning and rules
  • Suspicious rack access
  • Tailgating reduction
  • Unauthorized dwelling
  • Unauthorized movement of assets

The Comprehensive Location-based Solution

Personnel are limited to their authorized zones.

Approved Actions Include:

  • Blue zone authorized personnel in Blue zone
  • Yellow zone authorized personnel in Yellow zone
  • Green zone authorized personnel in Green zone
  • Visiting personnel (Orange) can be in any zone when accompanied by zone-authorized personnel

Restricted Actions Include:

  • Yellow zone authorized personnel in Blue zone - alert generated
  • Green zone authorized personnel in Yellow zonealert generated
Read the Brochure
Enhanced insider security
Managing Your Insider Threats: From Powerful Prevention to Integrated Protection

Managing Your Insider Threats: From Powerful Prevention to Integrated Protection

Watch Now

Contact Us