21.01.2016 Views

The GSN 2015 Digital Yearbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Viscount Systems<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

ACCESS CONTROL AND IDENTIFICATION<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Integrated System for HSP D-12/FIPS 201<br />

Compliance<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom Access Control<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom is an IT-centric access control system that<br />

eliminates the need for traditional access control panels.<br />

Fully compliant with FIPS-201 and HSPD-12, Freedom<br />

leverages the power of the IT infrastructure to control<br />

access points through encryption bridges that transform<br />

card readers into IP addressable devices. Data<br />

is encrypted to eliminate the opportunity for cyber<br />

threats, ensuring a high level of security is maintained.<br />

Network complexity and upfront costs are immediately<br />

reduced due to a reduction in hardware and infrastructure<br />

investments, allowing users to meet strict budget<br />

requirements, and experience immediate and long-term<br />

return-on-investment. Freedom’s unique architecture<br />

leverages existing IT infrastructure to meet the FICAM<br />

(Federal Identity Credential and Access Management)<br />

requirements by integrating the PIV and PIV-I (personal<br />

identity verification - interoperability) credential<br />

certificate validation and authentication functionality<br />

directly into the access control software. Physical access<br />

points are controlled using IP encryption bridges to<br />

connect door hardware and transform card readers into<br />

IP addressable devices. Credentials are presented at the<br />

reader and cryptographically challenged by the Freedom<br />

PACS Validation software. <strong>The</strong>se credentials are then authenticated<br />

and validated before an authorization check<br />

is performed to grant or deny access to the cardholder.<br />

Freedom Access Control allows companies to build integrated<br />

access control and video management systems<br />

under one centrally managed or distributed network.<br />

Freedom expands as the security needs and physical<br />

90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!