The New Paxton Access Keycard Adds Even More Versatility To Access Control Systems
The New Paxton Access Keycard Adds Even More Versatility To Access Control Systems

Paxton Access has launched a new keycard for use with its hands free access control solution.  The new keycard offers a maximum range of up to 50m. The new triple-function Net2Air keycard operates as a normal hands free token on doors equipped with a hands free interface and, by operating the keycard buttons, as a long-range access card.  The keycard's two buttons can be programmed to operate two different access points, such as  ‘in' and ‘out' car park barriers.  Pressing a button momentarily boosts the range of the keycard from a maximum range of 2.5m (like a hands free keyfob) to a maximum range of up to 50m.Hands free and long-range capability can be easily added to an existing installation.  It simply requires the fitting of the hands free interface between the control unit and the reader.  The hands free interface coverts any PROXIMITY P series reader to ‘hands free' including Paxton Access' small 38mm PROXIMITY P38 reader.The advantages of using Paxton Access hands free interfaceRetrofit to existing system - Fit the hands free interface to new systems, or upgrade an existing system        Only those who need hands free access require hands free tokens - keeps costs downHands free access from small readers - Hands free access from our P series readers.  No expensive ground or door loops neededDon't just think disabled access - Hands free will make life easier in stores, loading bays, and hospitalsSuitable for our Net2 and Switch2 systems - Both standalone and PC based systems can be converted to hands free

Add to Compare

Access control cards/ tags/ fobs - Expert commentary

Automatic Gates: Making The Right Investment For Access Control
Automatic Gates: Making The Right Investment For Access Control

The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for mail and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing while obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc while sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for maneuver. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.

4 Ways To Keep Your Workplace Protected From COVID-19
4 Ways To Keep Your Workplace Protected From COVID-19

The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupants in any emergency requires preparation and clear communication. This is especially critical in a health crisis involving an infectious disease. These are some of the essential best practices that could help organizations reduce the impact on their employees and operations during this pandemic. 1. Use a visitor management system With a visitor management system, organizations have a single source of real-time and historical insights into who is, or was recently, in the workplace. This is especially important because of the need to perform contact tracing should anyone in the organization show symptoms of COVID-19, meaning everyone they have been in contact with needs to be contacted and asked to isolate. Yet still, first impressions are made at the front desk or lobby, where the visitor experience needs to be a positive one. At the same time, though, any emergency event requires that there be strict control over who is entering the workplace. This policy also needs to be clearly communicated to visitors. Doing this minimizes risk to visitors as well as the workforce. In addition to delivering a high-quality visitor experience, the ideal visitor management system must: Enable organizations to meet regulatory compliance mandates and facilitate check-in at a self-service kiosk to minimize wait times. Customize the visitor experience to support specific security needs, such as accelerating and simplifying check-in or requiring additional security pre-checks. Automate compliance as it relates to visitor access rules with historical visit reports. 2. Pre-check questions at visitor registration kiosks Organizations can strengthen security at the registration kiosk using a flexible, enterprise-grade visitor management system to add visitor sign-in steps. This has proven successful in the past when used to control the spread of infectious disease during an outbreak. An example of this is a U.S. children's hospital which managed to reduce facility infection rates by 25 percent over a two-year period using a commercial, off-the-shelf physical identity and access management (PIAM) solution from HID Global. The solution provides two particularly important capabilities that can be used by organizations to protect their workplace from the uncontrolled spread of an infectious disease: Enhance visitor registration policy with additional mandatory questions to help identify any visitors who may need other screenings. Extend the visitor registration kiosk with a mandatory pop-up asking further questions during visitor check-in. 3. Understand who has visited your workplace Successful controlling the spread of infection throughout a facility requires the ability to automatically maintain an auditable trail of activity. This can be done using an enterprise-grade visitor management system that makes it easy to retrieve historical visit reports. This provides a timeline of who was in the workplace, and when they were there. Key features include: A single dashboard providing useful visitor insights at your fingertips. Historical reports that provide visitor details including location and contact information, all in compliance with General Data Protection Regulation (GDPR) and other privacy regulations. 4. Clearly communicate how infection risks can be reduced Global organizations must actively communicate with visitors and employees on the outbreak of infectious diseases and follow best practices outlined by the World Health Organization (WHO). Here are several things organizations can do in this area to help maintain a safe and healthy workplace: Re-enforce and communicate WHO best practices with guideline posters in the front lobby and throughout the workplace. Add posters that also encourage regular and thorough washing of hands. Encourage everyone to cough or sneese into their shirt sleeve in their flexed elbow or cover their mouth and nose with a tissue. Encourage everyone to keep a relatively safe distance from each other and use alternatives to handshakes when saying hello. Organizations must contend with a variety of workplace challenges during the outbreak of an infectious disease. These challenges can be solved with best practices that include a comprehensive visitor management system that automates critical check-in policies and maintains an auditable trail of visitor activity.  

The Growth Of The Mobile Access Card Market In 2020
The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Latest Paxton Access Limited news

Paxton’s Net2 Access Control System Integrates Additional Thermal Scanners
Paxton’s Net2 Access Control System Integrates Additional Thermal Scanners

Paxton has released an online video tutorial which explains how thermal scanning can help buildings installed with Net2 become more COVID-secure. They have also updated the systems software and have six new thermal scan integrations available to boost installer and end-user flexibility. Developing solutions Paxton has been developing solutions throughout 2020, which help reduce the spread of the virus in sites installed with their access control system Net2. While researching relevant updates to give Net2 greater functionality against the current pandemic, Paxton established that thermal scanning upon entry to a site or designated area would be beneficial to monitor people’s well-being, reducing the risk of infection to staff and visitors. Paxton’s Global Product Manager Steve Rowlands explains “Currently in the access control industry thermal scanners are seeing a significant rise in demand. This is due to the symptom commonly associated with the virus, of a consistently high temperature.” Using Net2 Access Control As global scientific evidence suggests, one of the most common symptoms of Coronavirus is a fever with a temperature above 98.6F. A site being able to detect this is an efficient way to increase their building’s defense against the pandemic and help to meet COVID-secure guidelines. The way in which a site manages the process after detection can be greatly supported by using Net2 access control. Steve Rowlands continues “By utilizing thermal scanning in combination with access control, we are able to further reduce a building’s risk by denying access to people with a heightened temperature.” Integration Benefits The new thermal scanning integrations compliment Paxton’s recent software updates occupancy management, flexible access permissions, and checkpoint control. When these elements are combined, a system administrator can set up designated checkpoints to manage the flow of people and reduce overcrowding as well as maintain social distancing. When monitoring and approving an individual’s well-being, this can be achieved by a manual or automated validation. Checkpoints with thermal scanning detection can also be set up in multiple areas across a site and managed remotely.  Steve Rowlands explains how the thermal scanning process works with Net2 “The user presents their physical token, and their temperature is taken simultaneously by the thermal scanner. Access is permitted if their temperature is in the acceptable range and their token is valid. If a valid token is presented but their temperature is too high - their access is denied. This process takes less than a second and works in conjunction with Net2 access levels and our new series of COVID-secure feature updates.”

Paxton Access Limited Enables Instant Access To Essential Tools Through Their Paxton Installer App
Paxton Access Limited Enables Instant Access To Essential Tools Through Their Paxton Installer App

Paxton’s Installer app has officially gone live. The tool has been designed as a centralized platform giving installers and system administrators instant access to key information they need to install and manage Paxton products and solutions on the go. 2020 has been a productive year for the people of Paxton, despite the on-going consequences of the global pandemic. Regulatory guidelines and social distancing measures have led to essential and innovative updates for Paxton’s long-standing access control system Net2. Provides digital access Paxton’s Chief Executive Adam Stroud explains: “There are certain things, such as this pandemic, that happen outside of our direct control and where possible, I think it’s important to try to see the opportunity to do something fresh and different.” Along with rolling out these important feature updates, Paxton added their new Paxton Installer app to their 2020 agenda. The simple-to-use pocket tool provides digital access to Paxton’s Knowledge Base. Installers how have convenient access to up-to-date product specifications, technical documents, video installer instructions as well as answers to many FAQs right on their cellphone device. Expert technical support team Paxton has designed the app’s search functionality with a seamless experience in mind Adam said: “At Paxton we are always looking for opportunities to improve the service and information we provide to our valued installers and their customers. Saving them time and making their working lives more convenient is why we have invested in developing the new Paxton Installer app”. To make life simple on site for their installers, Paxton has designed the app’s search functionality with a seamless experience in mind. Individual product information can be accessed within seconds via the app’s built in bar code scanner. Installers will also be able to direct dial Paxton’s expert technical support team and find a list of their local distributors to make sourcing products and getting installation advice quick and easy. Products and solutions Adam continues: “We have an ever-growing library of content about our products and solutions. Finding the right information when you need it can often be a challenge. Making this easier for our installers has been one of the key objectives of the new app. You will be able to simply scan or search for your product, and all the information is right there for you. In addition, the app gives you immediate access to our vast knowledge base that is used by our own customer support team”. Another benefit of the app for installers is the ability to favorite link documents for quick access and share information with co-workers or end users via email, text, Airdrop, or WhatsApp. All documents and videos are also available offline as they are downloadable within the app. This makes it possible to access information when internet access is a problem. Efficient for installers Adam concludes, “I am very pleased we have invested in the development of this app to make things simpler and efficient for installers. Watch this space as we have much more planned for it in the future!”. The app is available to download now on iOS and Android smart-devices. One can also check out the Paxton Installer app video that explains how installers can use the app’s functionally and how they can get the most out of the innovation.

Paxton Introduces Net2 Checkpoint Control To Mitigate Virus Transmission And Safeguard Employees And Visitors
Paxton Introduces Net2 Checkpoint Control To Mitigate Virus Transmission And Safeguard Employees And Visitors

Paxton’s longstanding access control system, Net2, receives its latest software update. The highly anticipated new feature, Checkpoint Control, supports COVID-secure sites. This additional functionality helps Net2 users protect employees and visitors by monitoring and approving people as they enter buildings. Throughout the first half of 2020 the creation of Checkpoint Control was underway, along with the unforeseen global spread of the coronavirus COVID-19. During this time lockdown and social distancing restrictions in many countries heightened the need for the update to be rolled out globally, in a timely fashion. Since then Paxton’s Development team has worked tirelessly preparing the release alongside other vital COVID-secure Net2 updates. Thermal scanning hardware Paxton’s U.S. Senior Product Manager Jeremy Allison said: “At Paxton, people are at the heart of everything we do and this year our focus is bringing people back to work safely. Following on from the successful introduction of Occupancy Management, we are introducing Checkpoint Control. Designed to help businesses ensure their COVID-secure guidelines are being followed before staff enter a site.” Designed to help businesses ensure their COVID-secure guidelines are being followed before staff enter a site" The Checkpoint Control functionality follows on from Paxton’s successful introduction of Net2 Occupancy Management and integration with thermal scanning hardware. Both were released for Net2 in July 2020. These features work simply and seamlessly together to reduce the risk of spreading COVID-19 around populated buildings. Temporary access levels Jeremy Allison further explains “Net2 Checkpoint Control allows a site to assign temporary access levels to one or more users that will remain in place until they have either been manually validated or badged through a specific door. This allows Net2 system administrators to ensure all staff and visitors pass through a designated checkpoint at a frequency that can be configured to suit the business requirements." "It also offers the flexibility to split staff between multiple checkpoints to help maintain social distancing and not overrun an area”. Access permissions feature Checkpoint Control works in just two simple steps: Step 1: System Setup Specific doors or areas of a building are designated as checkpoints, such as the main entrance or reception. End users are then given access to that checkpoint using their normal access token, with the limited access point managed via the access permissions feature within the Net2 software. Step 2: A manual or automated verification takes place to validate further site access Access can be verified manually in person or by using technology to support automated validation. The automated process works by identifying a person via their access credentials, which can then be followed by a thermal scan to further increase protection against the spread of Coronavirus. Once identity, and where relevant, an individual’s health and well-being has been approved, the checkpoint will validate and grant further building access. Virtual traffic lights Paxton has produced an on-demand webinar called the definitive guide to COVID-secure buildings Net2 v6.05 also includes new functionality to further enhance the Net2 Occupancy Management feature. New virtual traffic lights can be used on screens to indicate occupancy levels with no need for integrated traffic light hardware. This will further support social distancing by informing the end user of whether the current occupancy of the area they are about to enter is safe for them to do so, working alongside Checkpoint Control to reduce bottlenecks and overcrowding. Occupancy Management override is also included in this new update. Should there be an emergency, this functionality allows selected people to enter an area that is at capacity, such as a first aider or senior manager. Checkpoint Control and the new additions to Occupancy Management functionality are available exclusively with Net2 Pro software. In conjunction with the updates, Paxton has produced an on-demand webinar called the definitive guide to COVID-secure buildings. This is an ideal starting point for installers looking to understand more about social distancing and COVID-secure guidelines.

Related white papers

Physical Access Control In Higher Education

A Brief History of Access Control Credentials

RFID and Smartphone Readers in Physical Access Control