Download PDF version Contact company

Integrated Control Technology Ltd (ICT®), a global manufacturer of intelligent access control and security solutions, announced it has been authorised by the Common Vulnerabilities and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), becoming the second New Zealand organisation to be accepted into the programme.

The mission of the CVE programme is to identify, define, and catalogue publicly disclosed cybersecurity vulnerabilities. This aligns with ICT’s commitment to providing customers with the tools and resources needed to harden systems against the latest cybersecurity threats.

Information about cybersecurity threats

Vulnerabilities that are discovered are assigned and published to the CVE List. CVE Records published in the catalogue enable programme stakeholders to rapidly discover and correlate vulnerability information used to protect systems against attacks.

Daniel Tolcher, IT & Cybersecurity Manager for ICT, said, “At ICT we’re dedicated to providing our customers with the information needed to protect against the latest cybersecurity threats, ensuring their systems are always kept up to date."

Gold standard

ICT joins 358 organisations from 40 countries that have been accepted into this programme

ICT joins 358 organisations from 40 countries that have been accepted into this programme. Sponsored by the Cybersecurity and Infrastructure Security Agency of the U.S. Department of Homeland Security, CVE is considered the gold standard for publishing vulnerabilities.

ICT takes on this responsibility alongside major tech brands, Microsoft, Google, Amazon, IBM, and others, who are authorised to assign CVE IDs to vulnerabilities affecting products within its scope.

Addressing IT and cybersecurity vulnerabilities

Daniel Tolcher continues, “The global average cost of a data breach in 2023 was USD 4.45 million, a 15%increase over 3 years. The international, community-based effort of the CVE Programme is dedicated to supporting the efforts of the Information technology and cybersecurity professionals who address these vulnerabilities and ICT is proud to be welcomed.”

In addition to the CVE list, ICT welcomes the identification of vulnerabilities, which can be lodged via the ICT website Security Advisories, ICT - Integrated Control Technology.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?