Contact company icon Add as a preferred source Download PDF version

Integrated Control Technology Ltd (ICT®), a global manufacturer of intelligent access control and security solutions, announced it has been authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA), becoming the second New Zealand organization to be accepted into the program.

The mission of the CVE program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. This aligns with ICT’s commitment to providing customers with the tools and resources needed to harden systems against the latest cybersecurity threats.

Information about cybersecurity threats

Vulnerabilities that are discovered are assigned and published to the CVE List. CVE Records published in the catalog enable program stakeholders to rapidly discover and correlate vulnerability information used to protect systems against attacks.

Daniel Tolcher, IT & Cybersecurity Manager for ICT, said, “At ICT we’re dedicated to providing our customers with the information needed to protect against the latest cybersecurity threats, ensuring their systems are always kept up to date."

Gold standard

ICT joins 358 organizations from 40 countries that have been accepted into this program

ICT joins 358 organizations from 40 countries that have been accepted into this program. Sponsored by the Cybersecurity and Infrastructure Security Agency of the U.S. Department of Homeland Security, CVE is considered the gold standard for publishing vulnerabilities.

ICT takes on this responsibility alongside major tech brands, Microsoft, Google, Amazon, IBM, and others, who are authorized to assign CVE IDs to vulnerabilities affecting products within its scope.

Addressing IT and cybersecurity vulnerabilities

Daniel Tolcher continues, “The global average cost of a data breach in 2023 was USD 4.45 million, a 15%increase over 3 years. The international, community-based effort of the CVE Program is dedicated to supporting the efforts of the Information technology and cybersecurity professionals who address these vulnerabilities and ICT is proud to be welcomed.”

In addition to the CVE list, ICT welcomes the identification of vulnerabilities, which can be lodged via the ICT website Security Advisories, ICT - Integrated Control Technology.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...