Browse Access Control Cards, Tags & Fobs

Access control cards/ tags/ fobs - Expert commentary

A Secured Entrance Is The First Defense Against An Active Shooter
A Secured Entrance Is The First Defense Against An Active Shooter

The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”

Why Integrated Access Control Is About More Than Security?
Why Integrated Access Control Is About More Than Security?

Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.

Open Supervised Data Protocol (OSDP): The Gold Standard For Access Control Installations
Open Supervised Data Protocol (OSDP): The Gold Standard For Access Control Installations

Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.

Latest Texas Instruments news

Radar Technology Provides An Alternative For Smart Home Security
Radar Technology Provides An Alternative For Smart Home Security

In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced Security And Automation Features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimization of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret Of The Consumer Radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilizing frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-On-Chip Solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilization of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional Smart Home Services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilizing existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimization of maintenance and installation costs.

Texas Memory Systems Introduces The RamSan-710: The Best 1u Storage Ever
Texas Memory Systems Introduces The RamSan-710: The Best 1u Storage Ever

Texas Memory Systems, Inc. (TMS) is proud to introduce its second RamSan Series-7 system: the 1U rackmount RamSan-710. Powered by the new Series-7 Flash Controller with 32nm SLC Flash from Toshiba, the RamSan-710 is the fastest (5 GB/s) 1U shared storage system. It is easy to install, with four 8-Gb Fibre Channel or QDR InfiniBand ports. The RamSan-710 turbocharges datacentres with minimal impact on power and space.The Series-7 Flash Controller that powers the RamSan-710 is based on high-performance Xilinx FPGAs and an embedded PowerPC core. It manages Flash, corrects faults, tracks performance, and logs operational data. Incorporating patented Variable Stripe RAID (VSR) technology, standard chip-level RAID, and an advanced ECC algorithm, the Series-7 Flash Controller provides the RamSan-710 with an expected lifespan of 10 years. The Series-7 Flash Controller is exclusively available in the RamSan-710 and other Texas Memory Systems Series-7 products.Like previous RamSan designs, the RamSan-710 provides a complete integrated storage platform inside the box. The RamSan-710 includes 21 Flash boards, 2 high-bandwidth I/O modules (2 ports each), 1 management Ethernet port, and a fast cross-bar switch that connects everything for smooth data flow through the system. These components combine to optimize the RamSan-710 bandwidth, IOPS, latency, and reliability."Flash storage is no longer just a tool for those in the rarified IT atmosphere, but is rapidly becoming a standard real-world enabler of both better performance and improved economics," said Mark Peters, Senior Analyst at the Enterprise Strategy Group. "Texas Memory brings decades of experience to this market, together with an ability - exemplified by this new RamSan-710 - to design and package products to fulfill the needs of regular, yet very demanding, IT shops that require affordable and easy IO turbo-charging."IT managers are plagued with the daunting task of increasing storage efficiency by extracting the most performance out of a fixed space. The RamSan-710 effectively addresses this need, delivering 5 GB/s in only 1U of space. One or more units easily integrate into mixed storage infrastructures and can be monitored and managed through a common framework. The RamSan-710 is the ideal storage solution for high bandwidth applications like data warehousing, scientific and high performance computing (HPC), online transaction processing (OLTP), data acquisition, batch processing, and video editing."The RamSan-710 establishes new capacity and performance standards for our space-constrained customer base," said Dan Scheel, President of Texas Memory Systems. "It fills the gap between our new RamSan-70 PCIe card and our RamSan-630 3U system."The RamSan-710 is scheduled for delivery in 4-8 weeks. For more information about the RamSan-710, please visit http://RamSan.com/Products/RamSan-710.

Infinova And Milestone To Showcase Their Integrated Surveillance Solutions At Upcoming Security Industry Tradeshows
Infinova And Milestone To Showcase Their Integrated Surveillance Solutions At Upcoming Security Industry Tradeshows

IP dome camera from InfinovaInfinova announced that, at Booth 1447 during the ASIS Seminar and Exhibition to be held October 12-15 at the Dallas Convention Centre and at IFSEC India to be held November 23-25 in Mumbai, it will showcase its partnership with Milestone. Now, Infinova integrators and distributors can help customers control video surveillance, reduce maintenance costs and protect their business environment by offering Infinova megapixel and IP cameras installed with Milestone Systems XProtect Video Management software. Since Milestone products are based on an open platform that uses the TCP/IP network protocol, Infinova integrators and their customers will be able to build the video surveillance solutions using standard video and computer hardware."Milestone software supplies the basis for highly efficient operations of video monitoring and analysis and opens up a wide spectrum of opportunities for integrating with other business applications in any IT environment," emphasises Mark S. Wilson, Infinova Vice President, Marketing. "This is a further example of how we are helping Infinova integrators say ‘yes' to more opportunities.""Megapixel cameras are helping to drive the uptake of IP technology in the video surveillance industry. Milestone's support of Infinova's new family of network cameras including megapixel capability will help customers leverage the advantages of this," says Friborg Jacobsen, VP Strategic Alliances, Milestone Systems.Introduced in March of this year at the ISC West Convention in Las Vegas, Infinova's full new family of IP and megapixel cameras features Texas Instruments' Da Vinci chip; includes fixed, mini-dome and high-speed megapixel dome PTZ cameras; provides both analog and digital operation at up to 3 megapixel resolution, including megapixel resolution at 20 frames per second (fps); offers on-camera SD (secure digital) storage cards; and is ruggedised. The cameras also provide high quality video 360 degree continuous rotation with pans at both high and low speeds. More information on Infinova IP and megapixel camera solutions is available at the Infinova website.