Data protection and security with modern ISGUS Hardware

Are you still using an iPhone 1? Surely not. And that comes as no surprise to anyone. Hardly any other field is changing as rapidly as digital technology. In the field of IT security in particular, it is crucial to recognise and implement new standards. We are also continuously developing our hardware in order to always offer you the best and most secure solutions.

With ZEUS® software, you are using a powerful and secure system for time recording and Access Control. It offers you high availability, continuous development and comprehensive security standards.

But what about older time recording terminals and/or Access Control centres?

Time for a system check
In many cases, devices are still in use that are reliable thanks to their quality, our extensive spare parts supply and our service. However, the operating systems of older terminals – especially those based on outdated Microsoft platforms – often no longer meet today's IT security requirements. Outdated transport encryption (TLS protocols) no longer offers the necessary protection against current threats.

Act now: check your systems!
We recommend that you check your hardware installation together with your ISGUS sales and service centre. This will allow you to determine at an early stage whether your system is affected by security vulnerabilities and what measures are appropriate. Contact us – we will provide you with all the necessary information.

New from July 2025: IT 8210 for ZEUS® 3 users

For users of older ISGUS software, our IT 8210 terminal will also be available for operation on ZEUS® 3 from 1 July 2025. The IT 8210 is based on a modern Linux operating system and meets all requirements that will provide you with a secure hardware platform for many years to come, e.g. in the event of a later migration to ZEUS® eXperience.

Check your RFID cards now

In many cases, old and insecure ID and transponder procedures are still in use, which have been hacked multiple times. Procedures that offer no protection against attacks and misuse include Hitag, Proxy, Mifare classic and LEGIC prime.

For many years, we have therefore only supplied new systems with the Mifare DESFire or LEGIC advant procedures. With these procedures, the encoded information is stored in a specially protected segment of the chip used. Mifare DESFire in particular has established itself as the standard in recent years.