A Virtual Geospatial Fence On Network Access

GPS has replaced a folded paper map and become the ubiquitous navigation tool, providing real-time information, and including such features as turn-by-turn guidance, ETA, restaurants and fuel stopd along en route. It was a quantum leap in providing geospatial data.

The technology has advanced even further with apps like Google Maps and Waze that reroute your travel around construction zones, heavy traffic and other road hazards by leveraging data from their users and other devices connected to the applications. 

Safeguarding IT now requires a multi-layered approach that incorporates security technologies and user training.

Geo-fencing creates a virtual fence on a user’s network access. This limits authentication from a whitelisted location or restricts access from a blacklisted location. The location of a geo-fence can be defined within an office building or a specific IP address, or some other physical parameter.

It is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. Geo-fencing allows an administrator to set up triggers so when a device enters (or exits) the boundaries defined by the administrator, an alert is issued, according to medium.com.

The latest release of ReconaSense’s Risk-Adaptive Security & Access Control delivers proactive, intelligent and geospatial physical security. 

The system unifies typically siloed data from security systems, cameras, IoT devices, sensors and building automation systems to provide a common operating picture and risk intelligence. With technology that identifies abnormal activity and adjusts risk levels in real time,

ReconaSense risk-adaptive access control spots threats to life safety and overall security and can minimise risks. Its geospatial AI capabilities enable geo-fencing, risk-aware guidance and remote control. 

Medium:        Reconasense:          I-HLS:

You Might Also Read

Business Is Starting To Believe That  AI Is The Best Defence:

 

« AI Delivered Healthcare Creates Serious Legal & Ethical Issues
10 Predictions For The IoT Future »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

Cyber Griffin

Cyber Griffin

Founded by the City of London Police in 2017, Cyber Griffin is an initiative that supports businesses and individuals in the Square Mile to protect themselves from cyber crime.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

Superus Careers - Cyber Career Exchange

Superus Careers - Cyber Career Exchange

The Cyber Career Exchange is a specialized recruiting platform focused specifically on cybersecurity.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

CyberGrape

CyberGrape

CyberGrape is a client centric managed services company, providing enterprise leading security solutions and helping companies through their IT risk and security challenges.