solutions


CYBERSECURITY > RESOURCES

Cybersecurity resources

Security in 30 Webinar Recording

Core Principles of Cybersecurity: Protect, Detect, Correct 

Cybersecurity strategies have shifted from just a protection-only model to an additional focus on detection and response. While prevention is important, it is futile unless it is combined with detection and response capabilities. In this session, Dave York and Frank Kasper will discuss this shift in cybersecurity and what it means for access control. 

ENGAGE Wireless (BLE & Wi-Fi) Security White Paper

Explore how ENGAGE™ Wireless Technology uses combinations of keys and encryption methodologies to prevent wireless attacks against and how these methods prohibit unauthorized access to any device, its configuration, or its programming. 

Mobile Access Credential Security White Paper

Explore how the Schlage Mobile Access Software Development Kit (SDK) provides our partners with the capability to create and manage both Near Field Communication (NFC) and Bluetooth Low Energy (BLE) mobile credentials and prevent against attacks.

ISONAS Pure Access Cloud Security White Paper  

ISONAS™ Pure Access supports a combination of Wired and Wireless technologies. While it is possible to connect to many devices, it is not possible to maintain the connection or make changes to the device without utilizing patented Security Protocols unique to Allegion. 

 

Credentials Security Guide

Allegion delivers simple, secure and interoperable credentials that give our customers flexibility in their choice of hardware and technology partners.

 

Security Advisory Regarding "Flipping Zero" Tool

Allegion is aware of a tool called “Flipper Zero,” which enables users to hack some digital products.