{"id":875,"date":"2023-05-10T15:55:26","date_gmt":"2023-05-10T07:55:26","guid":{"rendered":"https:\/\/afiintra.com\/?page_id=875"},"modified":"2023-06-01T16:12:24","modified_gmt":"2023-06-01T08:12:24","slug":"high-security-capabilities","status":"publish","type":"page","link":"https:\/\/afiintra.com\/index.php\/high-security-capabilities\/","title":{"rendered":"High security capabilities"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"537\" src=\"https:\/\/afiintra.com\/wp-content\/uploads\/2023\/05\/high-security-1024x537.png\" alt=\"\" class=\"wp-image-1596\" srcset=\"https:\/\/afiintra.com\/wp-content\/uploads\/2023\/05\/high-security-1024x537.png 1024w, https:\/\/afiintra.com\/wp-content\/uploads\/2023\/05\/high-security-300x157.png 300w, https:\/\/afiintra.com\/wp-content\/uploads\/2023\/05\/high-security-768x402.png 768w, https:\/\/afiintra.com\/wp-content\/uploads\/2023\/05\/high-security-1536x805.png 1536w, https:\/\/afiintra.com\/wp-content\/uploads\/2023\/05\/high-security-2048x1073.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">High security capabilities<\/mark><\/strong><\/h2>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Our high security solutions deliver fully integrated\u00a0perimeter security,\u00a0access control, and intruder alarms management from one centralized platform. Our high security solutions are in use at sensitive and critical sites worldwide, from utilities and civil infrastructure, to corrections and defense facilities.<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">With both hardware and software systems backed by professional services, we offer you an intelligent, powerful way to ensure business continuity, protect your assets and keep people safe.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Personal Identity Verification<\/mark><\/strong><\/h3>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Personal Identity Verification\u00a0(PIV) solution, purpose built and approved for the United States, delivers exceptional security with the fastest form of authentication for the federal market.<\/mark><\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Compliant with the latest Federal Information Processing Standards (FIPS) 201, its simple, effective and efficient end-to-end architecture enforces business policies, identity and credential management for all government employees and contractors.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">ICD-705 US SCIF Standard<\/mark><\/strong><\/h3>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">We strive to maintain the highest levels of security and standards compliance. \u00a0Our solution complies with the ICD-705 US SCIF Standard, a USA Intelligence Community Directive that provides physical and technical standards for all Sensitive Compartmented Information Facilities (SCIF).\u00a0<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Cyber Assurance of Physical Security Systems (CAPSS)<\/mark><\/strong><\/h3>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Our solution is compliant to the UK CPNI CAPSS standard around cyber security for critical national infrastructure. CAPSS is designed to assist security managers in focusing on key areas when it comes to protecting against cyber attacks.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Security Construction and Equipment Committee (SCEC)<\/mark><\/strong><\/h3>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">SCEC is an inter-departmental committee responsible for the evaluation of security equipment for use by Australian Government departments and agencies. The evaluation conducted by SCEC includes comprehensive breach testing, whereby all manner of attacks are employed to test the strength of a solution. Gallagher has a range of\u00a0SCEC tested perimeter products\u00a0that are available for deployment globally.<\/mark><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">How to recognize a cyber-responsible vendor in a business integrated world<\/mark><\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Encryption and authentication<\/mark><\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Assured compliance<\/mark><\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Ease of use and control<\/mark><\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Secure devices<\/mark><\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Ease of patching<\/mark><\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-colibri-color-6-color\">Security hardening guide<\/mark><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>High security capabilities Our high security solutions deliver fully integrated\u00a0perimeter security,\u00a0access control, and intruder alarms management from one centralized platform. Our high security solutions are in use at sensitive and critical sites worldwide, from utilities and civil infrastructure, to corrections and defense facilities. With both hardware and software systems backed by professional services, we offer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-875","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/pages\/875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/comments?post=875"}],"version-history":[{"count":3,"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/pages\/875\/revisions"}],"predecessor-version":[{"id":1928,"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/pages\/875\/revisions\/1928"}],"wp:attachment":[{"href":"https:\/\/afiintra.com\/index.php\/wp-json\/wp\/v2\/media?parent=875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}