Nedap AEOS Access Control Accessories(7)
Browse Access Control Accessories
Access control accessory products updated recently
The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase In Cybersecurity Threats And Breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organizations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand For Safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalize on opportunities for growth in the coming year.
2017 was quite an interesting and eventful year for the physical security industry. The economy has been robust and technology has become progressively sophisticated—with interactive services, cloud computing and network-based solutions taking charge to provide new insights to installers and their end-user customers. The Internet of Things is creating increasingly integrated solutions, with a heightened emphasis on total connectivity. Changing Security Expectations World events have also put the spotlight on the need for comprehensive security at public events, tourist attractions and schools and campuses. Security is an expectation and systems integrators are becoming trusted advisors to their customers, who are looking to them to solve problems or issues. Residential systems are more robust and now, are migrating to the commercial side of the business. There’s a blurring of the lines of technology—many of the products that come to the security industry originate from the consumer side. This proposition is also changing expectations by both residential and commercial customers, who want common, easy operation from their smartphone or user interface. Unexpected was some of the biggest deals in the industry, including acquisitions by dominant companies who grew even larger and continued ongoing consolidation on the manufacturing side. Those who remain will need to be progressive and step up their game with the latest proven technologies. Selling hardware isn’t the end game any longer. It’s providing solutions that generate revenue for security dealers and offer a solid return on investment for the end-user. In addition, solutions need to be easier for the user, and integrate many different systems and components across the enterprise. Cybersecurity Safeguards End users want to get the most out of their solutions—and they want to be able to have more than safety and security. They are looking for the types of products that yield insights into system performance and give them the data the need for greater control and to proactively address any challenges or problems before they occur. Downtime is not an option and therefore, there’s an increased emphasis on consistent power so solutions are always on and running reliably. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines Cybersecurity is a dominant conversation in the security industry these days and that buzz will continue into 2018. Because solutions are increasingly network connected, they have vulnerabilities that will have to be addressed by service providers and manufacturers. Manufacturers will need to take the upper hand in providing hardened products—testing and certifying for cybersecurity safeguards. That is not an easy task and can be expensive, but it needs to be done. Because cybersecurity is in constant evolution, many will go the route of outsourcing this component of their manufacturing to third parties well-versed in threat detection and hardening. Hardened products will also need to evolve with new emerging attacks. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines. Intelligent Access Control Solutions Manufacturers no longer operate in silos. They are working with systems integrators to more fully understand their needs and those of the end-user. Manufacturers are also partnering with technology providers—bringing in the expertise of others so their solutions are comprehensive and holistic. We will continue to see integration of formerly disparate components, open systems and open APIs. There will also be strong migration to access control systems with edge intelligence and power over Ethernet, leveraging existing cabling for network connectivity. The winners will be those who take the lead in providing cyber secured and hardened products, as well as companies who partner with others to bring best of breed solutions to market. The losers will be those who continue to develop proprietary, closed systems and fail to recognize the importance of network connectivity for real-time, proactive reporting. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7 Ongoing Partner Success LifeSafety Power® has been working consistently and diligently on elevating the status of power from unintelligent hardware device to network-connected component that yields rich data for the user and allows the installer to provide remote monitoring and managed power services. We have changed the paradigm of power but there’s additional work to do to get people to understand the new, critical role power plays in comprehensive enterprise and campus security. Now, security installers can help the end user know what’s happening with locks, access control, gates or other connected solutions and fix problems before they happen. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7. We have also had continued, ongoing successes with our many partners in the access control community and that’s where we will further focus our efforts in 2018—working with leading security solution providers to present the best technologies and solutions that are reliable, certified and present the types of insights security dealers need to offer customers to provide the highest levels of service. This will also help security dealers and integrators differentiate themselves and compete more effectively in the crowded marketplace.
Part 1 in our Intercoms in Security Series Lambert-St. Louis International Airport uses Code Blue intercoms Organizations are demanding a new level of interoperability among mission-critical security systems. Intelligible audio, the ability to hear, be heard and be understood, is critical to communication, which is essential to the core security processes within an organization, as well as to emergency situations. Intelligible audio provides a platform to optimize various processes, including the use of security officers. “Our main thrust is to ensure our clients see intelligible and interoperable audio, not as an option, but as instrumental to their budget optimization, stakeholder communication and risk mitigation efforts,” says Jim Hoffpauir, President of Zenitel North America, a manufacturer of intercoms and other communications solutions. Iintercoms In Building Safety And Security The role of intercoms in building safety and security is a given across many markets, and that use is growing. Intercoms are used in campus call boxes, elevators, muster locations, and for emergency notification. The trend is toward video, audio and access control, all tied together. There is also an emphasis on providing intelligible audio in any environment, even demanding ones. The education market has historically been a large sector for intercoms. Emergency phones and intercoms traditionally have been found throughout education settings, including colleges and universities, where they remain quite popular. Expanding Markets For Two-way Communication In recent years, however, their popularity has also grown within the healthcare and mass transit sectors, where their versatility allows authorities to react to emergency situations while also providing a wide range of applications for non-emergency situations, such as car trouble or requests for directions. Intercoms can fulfill a variety of emergency and non-emergency needs in places like downtown Santa Ana, California (Photo courtesy Code Blue) “Markets of all sizes and shapes can benefit from a two-way communication solution that can help individuals place calls for assistance with first responders, police departments or customer service representatives,” says David Fleming, Chief Design Officer for Code Blue Corp. Intercoms For Public And Private Sectors Aiphone is another intercom manufacturer for which education is a big market. Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp., says about 80 percent of both public and private K-12 and higher education campuses are using at least one intercom in some form. That percentage grows to nearly 100 percent for hospitals, which are using intercoms as nurse-call stations and at parking facilities, exterior door entries, nurseries and pharmacies, he says. "About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms" Up to 70 percent of larger multi-family facilities are also using intercoms. And that percentage is even higher in older, heavily populated Eastern cities. Many locales have laws mandating the use of audio and video intercoms on buildings beyond a threshold number of units. About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms, says Czerwinski. In the past year, Aiphone’s emergency stations have become very popular, particularly in campus settings; both commercial and higher education. Also, a growing number of unmanned parking garages are using the stations to allow patrons to immediately reach first responders or security personnel. Each of these markets still has growth potential, but by its sheer size, the commercial market offers the greatest opportunities, according to Aiphone. Video-Enabled IP Intercoms Intercom usage differs widely in various global markets, according to Craig Szmania, CEO of 2N USA, a manufacturer of IP intercoms. In the North American market, intercom usage is relatively low compared to the Europe, Middle East, and Africa (EMEA) region, where intercoms are a more mature market. Security, convenience, systems integration and IP-versus-analog adoption are driving usage and growth to more than 20 percent year-over-year. More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution, according to Szmania. “Our intercom portfolio targets all the major verticals, but we have had particular success in the education sector – K-12 and universities,” says Szmania. “These end users are looking for specific features in securing their campuses, providing convenience to their administrators, employing programmability for differing use scenarios throughout the campus, and integration to their telephony or other systems.” More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution Szmania says the latter point is becoming a particular need in light of a requirement for campus-wide communication and coordination in emergency situations. “Our intercoms integrate seamlessly with third party solutions such as Cisco’s telephone systems that are the communication backbones of many schools and campuses,” he adds. IP-based Solutions In Residential Verticals Considering near-term growth potential, single family and multi-tenant residential verticals have fantastic opportunities for increased usage of door stations/intercoms in the United States, according to Szmania. The company has entered this space over the last several years and has grown to be a market leader in IP-based integrated solutions, especially in the home automation space. The adoption of IP networked solutions for condominiums and apartments is just taking off, driven in part by consumer demand for mobile-anywhere video, audio and door control. The service is also a driver for integrator/dealer adoption of the technology to provide recurring monthly revenue (RMR). 2N has also achieved triple-digit growth in commercial building installations over the past two years. Building owners, IT departments and security managers want and need a networked solution for control and security. 2N’s open platforms are a good fit, says Szmania. Read part 2 of our Security Intercoms series here
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
DHL Express is the global provider of international shipping and courier delivery services, and has a major market share of express logistics in the Middle East with a strong customer base in Saudi Arabia. DHL Express has facilities at all the major airports and in most of cites in Saudi Arabia and the fastest clearance in KSA when compared to its competition. Saudi Arabia is one of DHL’s key markets and the delivery firm strives to be close to its customers here. But with facilities spread across the Kingdom, DHL faced issues in securing its critical assets. Particularly in terms of preventing unauthorized access to critical operational sites; unauthorized access for employees and contractors outside working hours; and unauthorized vehicle access to its warehouse facilities and receiving and responding to critical alarms. Intrusion detection Nedap’s AEOS access control and intrusion detection system was selected as the ideal solution One of DHL’s main aims was to switch to a new security system that would support all the latest access control and intrusion detection features, meet its business requirements and use its existing investments effectively Nedap’s AEOS access control and intrusion detection system, integrated with the Milestone VMS system, was selected as the ideal solution. AEOS is based on an open architecture, and offers flexible integration. So DHL was able to quickly implement its new access control and security system while retaining the investments it had made in existing readers and cards. RFID identifiers After using Nedap’s AEOS access control and intrusion detection system in one of the airport facilities, DHL decided to extend its use across the Kingdom. This set a roadmap for unifying all its facilities under the same access control and intrusion system. And ultimately, gave DHL the opportunity and flexibility to use the same cards across all its facilities. Nedap was able to provide secure, convenient access for DHL’s people and vehicles using RFID identifiers Through AEOS, Nedap was able to provide secure, convenient access for DHL’s people and vehicles using RFID identifiers. With the intrusion alarm system activated to restrict access during non-operational hours, unauthorized access to DHL’s operational sites has been prevented. And integrating AEOS with Milestone’s CCTV Video Management system has enabled DHL to receive graphical alarms on video walls. It’s also allowed it to view all related video footage associated with each alarm or event. SecuTronic, based in the Kingdom of Saudi Arabia, implemented the project successfully and efficiently. Flexible access control platform AEOS, secured and flexible access control platform has helped DHL Saudi Arabia to protect all its facilities, with access control and intrusion alarms, from one centralized control room. All the service points are equipped with a burglar alarm system and an enterprise-level access control platform connects all its sites across the country. AEOS has helped DHL to address all the security challenges it faced in Saudi Arabia and stay ahead of them, winning the trust of the customers by ensuring their shipments are secure. In addressing its security and operational challenges, DHL Saudi Arabia has been able to meet every TAPA (Transported Asset Protection Association) regulation. And by implementing such a secure monitoring system, it’s positioning itself as the last-mile fulfilment giant in the Middle East region.
When Swinkels Family Brewers wanted to unify its access control internationally, it chose AEOS, which enabled this producer of world-famous Bavaria beer to design a system around the people using it. The facts & figures : 6 breweries 27 brands 130 countries 1,800+ employees Swinkels Family Brewers had grown quickly and needed to review its security and apply more stringent measures. It was using two access control systems and wanted to unite everything on one platform. Most importantly, Swinkels Family Brewers wanted a system that would match its people-first approach, and provide the flexibility to adapt and scale in the future. New security policy Initially, Swinkels Family Brewers established a cross-department project group, which developed a new security policy. With that in place, the project group identified AEOS as the system to meet its long and growing list of requirements. During the planning stages, they consulted department managers on their needs. And before AEOS was implemented they ensured their people knew what to expect and why the change was happening. Key benefits: The system is designed around the people using it. Security is stronger but there’s a welcoming sense of warmth and openness. One unified system fulfills all access control needs. Several systems are linked to AEOS and updates transfer automatically. Flexibility to easily add new functionality, such as video monitoring, or scale the system. Impressed with the stability of AEOS Stefan Fehlhaber, Facility Manager at Swinkels says: “We’re very impressed with the scalability, stability and robustness of AEOS. It’s very practical to use in daily life and is easy for our security people to operate. It’s also very convenient for our employees to be able to use one badge at different locations.”
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload
The Security Behind Financial SecurityDownload
KBC Networks To Highlight International Fiber Options And Mobile Surveillance Systems At ISC West 2020
- ASSA ABLOY Supplying Security And Safety Solutions To UK’s Railroad Industry
- ASSA ABLOY Aperio Installs Real-Time Access Management And Devices At The Camp
- ASSA ABLOY’s Code Handle Secures An Upscale Fashion Boutique, Patio, With A PIN Locking Handle
- ASSA ABLOY’s Code Handle Provides Access Control Solution In The Form Of PIN Security For Existing Door Handle