Introducing AP3T

Our first markets of CALA and Africa are really rough places. Our customers really care about physical security. Everything is built tough, and it’s normal for thieves and vandals to bring dedicated equipment to break into locks. We started with the AP3 padlock, with a 10mm boron steel shackle. This shackle is tougher than most of the things it secures, so thieves usually end up going after fences, hinges, hasps, or other weak points near the padlock. We don’t often hear a customer in those markets say “your shackle is too thick”.

When we introduced the long shackle, it was just as tough with 10mm boron steel as well. It was designed for applications where the extra length facilitated getting the padlock off and on based on hasp design.

As we expand across North America, we recognize that access control is often about compliance and ensuring that workflows follow the right steps, and are reported correctly, rather than about raw physical toughness. That’s not to say tough is bad, but sometimes the hasps just need a smaller shackle in order to fit. 8-10mm hasp diameters are common in Canada and the US.

We’re introducing the AP3T, a thin-shackle version of the AP3, to address these needs with compatible options for our customers. This makes it easy to add more points to the Teleporte keyless access control network without expensive and inconvenient retrofits.

AP3 with 10mm Boron Shackle on the left. AP3T with 7mm stainless shackle on the right.

In addition to the new AP3T, we’re also offering new add-ons, such as accessories for confined spaces, to ensure that, with Teleporte, you can secure almost any physical asset. Stay tuned for upcoming announcements about our line of hardware accessories.

Our goal is to provide a unified access control solution to our customers, to help them secure all their physical assets through a single secure, reliable, and simple platform. We’ve learned that many customers can benefit from a mix of boron, long and thin shackles, as well as our unlock controllers to enable a comprehensive keyless access control solution without a lot of retrofitting.

To learn more, book a demo or reach out to [email protected].

Is Your Critical Infrastructure Security “Abysmal”?

recent report published by Sparsh Kulshrestha, Senior Security Analyst at CloudSEK, describes the current state of critical infrastructure security as “abysmal”. And with good reason. Kulshrestha points out that, due to increases in remote work, most security efforts have been focused on IT assets, while critical infrastructure assets have largely been neglected.  

“While most industrial control systems (ICS) have some level of cybersecurity measures in place, human error is one of the leading reasons due to which threat actors are still able to compromise them time and again,” says Kulshrestha. 

In the report, the CloudSEK team identifies some of the most common weaknesses in Operational Technology (OT) which can be exploited by bad actors, including weak or default credentials, outdated software, and infrastructure vulnerabilities. The report references recent cyberattacks on critical infrastructure, including water supply management, gas transport, the Colonial oil pipeline, and the port of Houston. 

The scope of potential damage resulting from these cyberattacks ranged from exposure of sensitive data, to the manipulation of the chemical composition of the public water supply. While the former is embarrassing and bad for business, the latter could be disastrous. 

Part of CloudSEK’s research included scanning the web, and the team discovered “hundreds” of vulnerable ICSs. 

While this research was focused primarily on vulnerabilities in the software used to manage and control critical infrastructure assets, it highlighted that the physical security of the assets must be just as, if not more, abysmal. While organizations have been investing in some degree of cybersecurity to protect ICSs, much of our critical infrastructure—”the backbone of governments and large businesses”, according to CloudSEK—is woefully undersecured, with rudimentary technology, such as traditional locks and keys, or three-digit combinations known by many individuals (including current and former employees and contractors). 

That’s why we’re trying to do something different at Sera4. We believe that critical infrastructure and assets need to be secured to the same, or greater, degree as IT assets, and we’re leveraging best-in-class software design to do it. 

Our access control platform, Teleporte, provides bank-grade security to physical assets. Through Teleporte-enabled access control hardware, including padlocks and unlock controllers, we’re able to eliminate many of the challenges identified in the CloudSEK report, including weak or default credentials, outdated software, and architecture vulnerabilities. 

Teleporte delivers reliable keyless access control and identity management to the critical services and infrastructure we rely on most: telecom, power, utilities, oil and gas, and traffic signals. The cloud-based platform means that it’s continually kept up to date in response to security threats and changing standards, and the fact that it doesn’t rely on existing network infrastructure makes our solution suitable for remote areas, and reduces the risk of network exposure and exploitation. 

We think it’s time to move past the Dark Ages. Literally. With all of our advancements in technology, we’re functionally still using the same technology—mechanical locks and keys—as we did in the 10th century. We can do better,  and we want you to do better. We’re all relying on the critical infrastructure that powers our lives. Let’s work harder to secure it.  

 
To learn more about Teleporte, visit sera4.com