{"id":10084,"date":"2021-04-13T08:20:49","date_gmt":"2021-04-13T12:20:49","guid":{"rendered":"https:\/\/senstar.com\/?p=10084"},"modified":"2021-04-13T08:23:12","modified_gmt":"2021-04-13T12:23:12","slug":"cybersecurity-features-of-fiberpatrol-fp1150-fiber-optic-intrusion-detection-sensor","status":"publish","type":"post","link":"https:\/\/senstar.com\/es\/security-digest\/cybersecurity-features-of-fiberpatrol-fp1150-fiber-optic-intrusion-detection-sensor\/","title":{"rendered":"Cybersecurity Features of FiberPatrol FP1150 Fiber Optic Intrusion Detection Sensor"},"content":{"rendered":"<p>This <a href=\"https:\/\/senstar.com\/wp-content\/uploads\/FiberPatrol_FP1150_Network_Manager_Cybersecurity.pdf\" target=\"_blank\" rel=\"noopener\">application note<\/a> explores cybersecurity features for the <a href=\"https:\/\/senstar.com\/products\/fence-sensors\/fiberpatrol-fp1150\/\">FiberPatrol\u00ae FP1150 fiber optic intrusion detection system<\/a> when used in conjunction with the Senstar\u2019s Network Manager software that interfaces between the FP1150\u2019s intrusion detection software (IDS) and external systems (security management system (SMS), video management system (VMS), PSIM, etc.).<\/p>\n<h5>In the subsequent post, we will provide an example report from an established cybersecurity consultancy showing the results of a pen test performed on a combined FiberPatrol FP1150 fiber optic intrusion detection sensor and Network Manager software system.<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>This application note explores cybersecurity features for the FiberPatrol\u00ae FP1150 fiber optic intrusion detection system when used in conjunction with the Senstar\u2019s Network Manager software that interfaces between the FP1150\u2019s intrusion&#8230;<\/p>\n","protected":false},"author":3,"featured_media":8413,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[22],"tags":[],"class_list":["post-10084","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-digest"],"_links":{"self":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/posts\/10084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/comments?post=10084"}],"version-history":[{"count":0,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/posts\/10084\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/media\/8413"}],"wp:attachment":[{"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/media?parent=10084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/categories?post=10084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/senstar.com\/es\/wp-json\/wp\/v2\/tags?post=10084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}