<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Wander Guard - Modern Edge Technologies</title>
	<atom:link href="https://modernedgetechnologies.com/category/wander-guard/feed/" rel="self" type="application/rss+xml" />
	<link>https://modernedgetechnologies.com</link>
	<description>A full service systems company that specializes in Fire Alarm, Access Control, Nurse Call, Wander Guard, Video, AV and Security systems.</description>
	<lastBuildDate>Mon, 05 Feb 2018 20:15:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Intrusion Protection</title>
		<link>https://modernedgetechnologies.com/2018/02/05/intrusion-protection/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Mon, 05 Feb 2018 20:10:08 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[AV]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Wander Guard]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=560</guid>

					<description><![CDATA[<p>Comparison with firewalls Though they both relate to network security, an IDS differs from a firewall in that a firewall looks outwardly for intrusions in order to stop them from happening. Firewalls limit access between networks to prevent intrusion and do not signal an attack from inside the network. An IDS describes a suspected intrusion&#8230;</p>
<p>The post <a href="https://modernedgetechnologies.com/2018/02/05/intrusion-protection/">Intrusion Protection</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><strong>Comparison with firewalls</strong><br />
Though they both relate to network security, an IDS differs from a firewall in that a firewall looks outwardly for intrusions in order to stop them from happening. Firewalls limit access between networks to prevent intrusion and do not signal an attack from inside the network. An IDS describes a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system. This is traditionally achieved by examining network communications, identifying heuristics and patterns (often known as signatures) of common computer attacks, and taking action to alert operators. A system that terminates connections is called an intrusion prevention system and is another form of an application layer firewall.</p>
<p><strong>Intrusion detection</strong><br />
IDS can be classified by where detection takes place (network or host) and the detection method that is employed.</p>
<p><strong>Analyzed activity</strong></p>
<p><strong>Network intrusion detection systems</strong><br />
Network intrusion detection systems (NIDS) are placed at a strategic point or points within the network to monitor traffic to and from all devices on the network. It performs an analysis of passing traffic on the entire subnet and matches the traffic that is passed on the subnets to the library of known attacks. Once an attack is identified, or abnormal behavior is sensed, the alert can be sent to the administrator. An example of a NIDS would be installing it on the subnet where firewalls are located in order to see if someone is trying to break into the firewall. Ideally one would scan all inbound and outbound traffic, however doing so might create a bottleneck that would impair the overall speed of the network. OPNET and NetSim are commonly used tools for simulating network intrusion detection systems. NID Systems are also capable of comparing signatures for similar packets to link and drop harmful detected packets which have a signature matching the records in the NIDS. When we classify the design of the NIDS according to the system interactivity property, there are two types: online and off-line NIDS, often referred to as inline and tap mode, respectively. On-line NIDS deals with the network in real time. It analyses the Ethernet packets and applies some rules, to decide if it is an attack or not. Off-line NIDS deals with stored data and passes it through some processes to decide if it is an attack or not.</p>
<p><strong>Host intrusion detection systems</strong><br />
Main article: Host-based intrusion detection system<br />
Host intrusion detection systems (HIDS) run on individual hosts or devices on the network. A HIDS monitors the inbound and outbound packets from the device only and will alert the user or administrator if suspicious activity is detected. It takes a snapshot of existing system files and matches it to the previous snapshot. If the critical system files were modified or deleted, an alert is sent to the administrator to investigate. An example of HIDS usage can be seen on mission-critical machines, which are not expected to change their configurations.</p>
<p>Intrusion detection systems can also be system-specific using custom tools and honeypots.</p><p>The post <a href="https://modernedgetechnologies.com/2018/02/05/intrusion-protection/">Intrusion Protection</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Access Control &#8211; Identity Based</title>
		<link>https://modernedgetechnologies.com/2017/11/07/access-control/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Tue, 07 Nov 2017 19:43:17 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[AV]]></category>
		<category><![CDATA[Fire Alarm]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Structured Cabling]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Wander Guard]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Fire Alarm Installation]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Structured Cabling Installation]]></category>
		<category><![CDATA[Telecommunications Design & Installation]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=554</guid>

					<description><![CDATA[<p>Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual. This allows organizations to grant access to specific users to access a variety of digital services using the same credentials, ensuring the accurate match between what users are entitled to and what they&#8230;</p>
<p>The post <a href="https://modernedgetechnologies.com/2017/11/07/access-control/">Access Control – Identity Based</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual. This allows organizations to grant access to specific users to access a variety of digital services using the same credentials, ensuring the accurate match between what users are entitled to and what they actually receive while also permitting other access constraints such as company, device, location and application type (attributes). Underpinning the identity-based security approach is the Identity-Based Access Control (IBAC), (or identity-based licensing) concept.</p>
<p>NIST defines identity-based security policies as policies &#8220;based on the identities and/or attributes of the object (system resource) being accessed and of the subject (user, group of users, process, or device) requesting access.&#8221;</p>
<p>Some of the advantages of the identity-based security approach include the ability to exercise very fine-grained control over who is allowed to use which services and which functions those users can perform, and that it is device-agnostic, offering the possibility to enforce access control policy across a variety of devices, such as smartphones, tablets, and PCs.</p>
<p>For more information on how Modern Edge Technologies can build the right Access Control solution for your business, visit our <a href="https://modernedgetechnologies.com/products-services/security/access-control/">solution page</a> or call us for a consultation.</p><p>The post <a href="https://modernedgetechnologies.com/2017/11/07/access-control/">Access Control – Identity Based</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fire Alarm / Voice Evacuation</title>
		<link>https://modernedgetechnologies.com/2017/11/01/fire-alarm-voice-evacuation/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Wed, 01 Nov 2017 17:58:39 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[Fire Alarm]]></category>
		<category><![CDATA[Nurse Call]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Structured Cabling]]></category>
		<category><![CDATA[Telecommunications]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Wander Guard]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Fire Alarm Installation]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Nurse Call Installation]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Structured Cabling Installation]]></category>
		<category><![CDATA[Telecommunications Design & Installation]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Wander Guard Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=536</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="432" height="550" src="https://modernedgetechnologies.com/wp-content/uploads/2017/10/tx3-touch-s15-b-front.jpg" class="vc_single_image-img attachment-full" alt="" title="tx3-touch-s15-b-front" srcset="https://modernedgetechnologies.com/wp-content/uploads/2017/10/tx3-touch-s15-b-front.jpg 432w, https://modernedgetechnologies.com/wp-content/uploads/2017/10/tx3-touch-s15-b-front-236x300.jpg 236w" sizes="(max-width: 432px) 100vw, 432px"  data-dt-location="https://modernedgetechnologies.com/2017/11/01/fire-alarm-voice-evacuation/tx3-touch-s15-b-front/" /></div>
		</figure>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>COMING SOON THE</h3>
<h1 class="mircom_product_display">TX3 NANO</h1>
<p><strong>Save Money</strong> – use SIP to consolidate communication through the building’s existing IP Network.</p>
<p><strong>Control from your Smart Phone or Tablet</strong> with our Android and Apple Apps.</p>
<p><strong>Built-in Camera</strong> that allows you to SEE who is at the door on your smartphone or tablet.</p>
<p><strong>Built-In Access Control</strong> – open the door with your smartphone or tablet.</p>
<p><strong>Easy Retro-fit</strong> to existing doorways.</p>
<p><strong>Fully Compatible</strong> with the complete TX3 Series.</p>
<p>The TX3 is the expandable and scalable solution for your business.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4>FEATURES</h4>
<h5>SMALL FOOTPRINT, ATTRACTIVE DESIGN</h5>
<p>Attractive weather-resistant surface mount design with illuminated scrolling name directory. And in a compact design that fits on a single gang electrical box: 8.7&#8243; x 5.7&#8243; x 1.8&#8243;</p>
<h5>VISIBLE IN ALL LIGHTING</h5>
<p>Positive visual identification of incoming visitors is provided by a built-in camera with Infrared illumination.</p>
<h5>SUPPORTS ALL COMMUNICATIONS PROTOCOLS</h5>
<p>Supports all communication protocols; VoIP, POTS, and GSM. The TX3 Nano is a door station that can retrofit to existing entrance locations and/or integrate to modern communication networks.</p>
<h5>BUILT-IN DOOR CONTROL OUTPUT</h5>
<p>This is not just an intercom. This is a powerful Access Control station that allows you to control Door Entry from your smartphone or tablet.</p>
<h5>COMPATIBLE WITH BOTH ANDROID AND APPLE</h5>
<p>Turn your smartphone or tablet into a powerful Home Automation tool with our Apps. Android: 4.1 (or more recent) Apple: iOS 9 (or more recent).</p>
<h5>FULLY TX3 AND SMART CONDO COMPATIBLE</h5>
<p>The TX3 Nano is fully compatible with the entire suite of TX3 products and services.</p>
<p>It is also fully supported by Mircom’s New Smart Condo solution for apartments and condominiums.</p>
<p>&nbsp;</p>
<p>Modern Edge Technologies integrates new technology to support improved services for Fire alarm and voice evacuation into new and existing building. When you have a need for Fire Alarm, Voice Evacuation, or any other technology system requirement, rely on Modern Edge Technologies.</p>
<p>&nbsp;</p>
<p>Source: <a href="https://www.mircom.com/product-listing/voice-entry/integrated-telephone-access-systems/tx3-nano" target="_blank" rel="noopener">https://www.mircom.com/product-listing/voice-entry/integrated-telephone-access-systems/tx3-nano</a></p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://modernedgetechnologies.com/2017/11/01/fire-alarm-voice-evacuation/">Fire Alarm / Voice Evacuation</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security</title>
		<link>https://modernedgetechnologies.com/2017/09/14/security/</link>
		
		<dc:creator><![CDATA[Admin]]></dc:creator>
		<pubDate>Thu, 14 Sep 2017 17:29:52 +0000</pubDate>
				<category><![CDATA[Access Control]]></category>
		<category><![CDATA[AV]]></category>
		<category><![CDATA[Fire Alarm]]></category>
		<category><![CDATA[Nurse Call]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Wander Guard]]></category>
		<category><![CDATA[Access Control Installation]]></category>
		<category><![CDATA[Asheville]]></category>
		<category><![CDATA[AV Installation]]></category>
		<category><![CDATA[Charlotte]]></category>
		<category><![CDATA[Fayetteville]]></category>
		<category><![CDATA[Fire Alarm Installation]]></category>
		<category><![CDATA[Greensboro]]></category>
		<category><![CDATA[High Point]]></category>
		<category><![CDATA[NC]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Raleigh]]></category>
		<category><![CDATA[Security Installation]]></category>
		<category><![CDATA[South Carolina]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[Video Installation]]></category>
		<category><![CDATA[Wander Guard Installation]]></category>
		<category><![CDATA[Winston Salem]]></category>
		<guid isPermaLink="false">https://modernedgetechnologies.com/?p=538</guid>

					<description><![CDATA[<p>Modern Edge Technologies Security Solutions &#8211; Triad NC, Winston Salem, Greensboro, High Point, Charlotte and surrounding areas includes many areas of expertise in both techniques and specialized products to protect your business, people, employees, and assets or equipment. We provide Security solutions for: Security Systems Access Control CCTV Apartment Entry Intrusion Protection as well as&#8230;</p>
<p>The post <a href="https://modernedgetechnologies.com/2017/09/14/security/">Security</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>Modern Edge Technologies Security Solutions &#8211; Triad NC, Winston Salem, Greensboro, High Point, Charlotte and surrounding areas includes many areas of expertise in both techniques and specialized products to protect your business, people, employees, and assets or equipment.</p>
<p>We provide Security solutions for:</p>
<ul>
<li><a href="https://modernedgetechnologies.com/products-services/security/security-systems/">Security Systems</a></li>
<li><a href="https://modernedgetechnologies.com/products-services/security/access-control/">Access Control</a></li>
<li><a href="https://modernedgetechnologies.com/products-services/security/cctv/">CCTV</a></li>
<li><a href="https://modernedgetechnologies.com/products-services/security/apartment-entry/">Apartment Entry</a></li>
<li><a href="https://modernedgetechnologies.com/products-services/security/intrusion-protection/">Intrusion Protection</a></li>
</ul>
<p>as well as</p>
<ul>
<li><a href="https://modernedgetechnologies.com/products-services/fire-alarm-voice-evacuation/">Fire Alarm</a></li>
<li><a href="https://modernedgetechnologies.com/products-services/fire-alarm-voice-evacuation/">Voice Evacuations</a></li>
</ul><p>The post <a href="https://modernedgetechnologies.com/2017/09/14/security/">Security</a> first appeared on <a href="https://modernedgetechnologies.com">Modern Edge Technologies</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
