Download PDF version Contact company

Integrated Control Technology Ltd (ICT®), a global manufacturer of intelligent access control and security solutions, announced it has been authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA), becoming the second New Zealand organization to be accepted into the program.

The mission of the CVE program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. This aligns with ICT’s commitment to providing customers with the tools and resources needed to harden systems against the latest cybersecurity threats.

Information about cybersecurity threats

Vulnerabilities that are discovered are assigned and published to the CVE List. CVE Records published in the catalog enable program stakeholders to rapidly discover and correlate vulnerability information used to protect systems against attacks.

Daniel Tolcher, IT & Cybersecurity Manager for ICT, said, “At ICT we’re dedicated to providing our customers with the information needed to protect against the latest cybersecurity threats, ensuring their systems are always kept up to date."

Gold standard

ICT joins 358 organizations from 40 countries that have been accepted into this program

ICT joins 358 organizations from 40 countries that have been accepted into this program. Sponsored by the Cybersecurity and Infrastructure Security Agency of the U.S. Department of Homeland Security, CVE is considered the gold standard for publishing vulnerabilities.

ICT takes on this responsibility alongside major tech brands, Microsoft, Google, Amazon, IBM, and others, who are authorized to assign CVE IDs to vulnerabilities affecting products within its scope.

Addressing IT and cybersecurity vulnerabilities

Daniel Tolcher continues, “The global average cost of a data breach in 2023 was USD 4.45 million, a 15%increase over 3 years. The international, community-based effort of the CVE Program is dedicated to supporting the efforts of the Information technology and cybersecurity professionals who address these vulnerabilities and ICT is proud to be welcomed.”

In addition to the CVE list, ICT welcomes the identification of vulnerabilities, which can be lodged via the ICT website Security Advisories, ICT - Integrated Control Technology.

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...