Access control accessories - Expert commentary

The Automated Future Of Retail And How To Secure It
The Automated Future Of Retail And How To Secure It

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimizing operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilizing data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behavior. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customization while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.

Get The Most From Investments In Building Security
Get The Most From Investments In Building Security

From analog to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamor for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone has entered a restricted area: – it simply isn’t efficient. For similar reasons, a building manager wants a single interface to control heating and lighting to match fluctuating occupancy levels, particularly in a hybrid working model. Applying the digital glue The demand from end-users for system convergence is growing, but to achieve full interoperability you still need to apply some ‘digital glue’ and that requires expertise. Yet bringing together disparate systems from different manufacturers can be problematic. Just as you get things to work, someone upgrades their solution and your carefully implemented convergence can start to come unstuck. Managing an implementation can quickly become more complicated, today’s quick-fix can become tomorrow’s headache This is one of the principal issues with all types of new technology; not everyone will choose the same path to reach the desired goal – it’s the old VHS/Betamax argument updated for building management and security systems. Managing and maintaining an implementation can quickly become more complicated than it first appears and without proper oversight, today’s quick-fix can become tomorrow’s technical headache. Effective support for a hybrid workforce Today’s hybrid workforce is a response to the pandemic that looks set to become an established part of working life for many companies across the world. Security systems have a massive role to play in facilitating this transformation that goes beyond simple intrusion detection, access control, and video monitoring. They can identify the most densely populated areas in a building to comply with social distancing guidelines and provide efficient use of space. The insights gathered from a security system can also be used to identify patterns of behavior, which can then be used for planning and directing the use of building space to help create the best possible working environment while also minimizing heating, lighting, and air conditioning expenditures. Identity credentials can help manage compliance with industry regulations by limiting access to certain areas Similarly, identity credentials – either biometric or cellphone-based – can help manage compliance to industry regulations by limiting access to certain areas only to approved employees. Creating and maintaining the appropriate level of functionality requires a combination of innovative solutions and industry experience. The complete security package It’s not just physical security that’s important – cybersecurity is a major focus, too. Bringing together both the physical security and cybersecurity realms is increasingly becoming a ‘must have’ capability. What is evident is that the pace of technological change is faster than ever. Today’s functionality simply wouldn’t have been possible just a few years ago, while today’s leading-edge developments may seem commonplace in five years.

How Businesses Can Protect Their People In The New Age Of Work
How Businesses Can Protect Their People In The New Age Of Work

Ensuring employee health and safety remains a key priority for organizations this year, especially as we see COVID-19 cases continue to rise in different areas of the world. As an ongoing challenge, COVID-19 has shifted the priorities of many organizations. In fact, “improving health and safety for employees” is the top strategic goal this year of manufacturing and logistics organizations in the U.S. and U.K., according to research conducted by Forrester on behalf of STANLEY Security. But as we think about reopening and as hybrid workforce models and “workspace-on-demand” approaches rise in popularity, leaders need to consider implementing the right technologies to help ensure a safe return to the office. This means investing in health, safety, and security solutions that can help leaders protect their people. The intersection of security technology and health and safety There’s no doubt that the scope of security has expanded in the wake of the global pandemic. What was once an area governed by a select few security or IT professionals within a business has now become a crucial company investment involving many key stakeholders. The role of security has expanded to encompass a broader range of health and safety challenges for businesses Additionally, the role of security has expanded to encompass a broader range of health and safety challenges for businesses. Fortunately, security technologies have made significant strides and many solutions, both existing and new, have been thrust forward to address today’s biggest business challenges. Investment in security technology It’s important to note that businesses are eager to adopt tech that can help them protect their people. Nearly half (46%) of organizations surveyed by Forrester report that they’re considering an increasing investment in technology solutions that ensure employee safety. Technologies like touchless access control, visitor management systems, occupancy monitoring, and installed/wearable proximity sensors are among some of the many security technologies these organizations have implemented or are planning to implement yet this year. Facilitating a safe return to work But what does the future look like? When it comes to the post-pandemic workplace, organizations are taking a hard look at their return-to-work strategy. Flexible or hybrid workforce models require a suite of security solutions to help ensure a safer, healthier environment More than half (53%) of organizations surveyed by Forrester are looking to introduce a flexible work schedule for their employees as they make decisions about returning to work and keeping employees safe post-pandemic. Such flexible – or hybrid – workforce models require a suite of security solutions to help ensure a safer, healthier environment for all who traverse a facility or work on-site. One of the central safety and security challenges raised by these hybrid models is tracking who is present in the building at any one time – and where or how they interact. Leveraging security technology With staggered schedules and what may seem like a steady stream of people passing through, it can be difficult to know who’s an employee and who’s a visitor. Access control will be key to monitoring and managing the flow of people on-site and preventing unauthorized access. When access control systems are properly integrated with visitor management solutions, businesses can unlock further benefits and efficiencies. For instance, integrated visitor management systems can allow for pre-registration of visitors and employees – granting cellphone credentials before people arrive on-site – and automated health screening surveys can be sent out in advance to help mitigate risk. Once someone reaches the premises, these systems can also be used to detect the person’s temperature and scan for a face mask, if needed.  We will likely see these types of visitor management and advanced screening solutions continue to rise in popularity, as 47% of organizations surveyed by Forrester report that they’re considering requiring employee health screening post-pandemic. Defining the office of the future A modern, dynamic workforce model will require an agile approach to office management. It’s imperative to strike the right balance between making people feel welcome and reassuring Businesses want to create an environment in which people feel comfortable and confident – a space where employees can collaborate and be creative. It’s imperative to strike the right balance between making people feel welcome and reassuring them that the necessary security measures are in place to ensure not only their safety but also their health. In many cases, this balancing act has created an unintended consequence: Everyone now feels like a visitor to a building. Protocols and processes With employees required to undergo the same screening processes and protocols as a guest, we’ve seen a transformation in the on-site experience. This further underscores the need for seamless, automated, and tightly integrated security solutions that can improve the employee and visitor experience, while helping to ensure health and safety. Ultimately, the future of the office is not about what a space looks like, but how people feel in it. This means adopting a “safety-always” culture, underpinned by the right technology, to ensure people that their safety remains a business’ top priority. 

Latest ASSA ABLOY news

PSIA Approves The Secure Credential Interoperability (SCI) 1.0 Specification
PSIA Approves The Secure Credential Interoperability (SCI) 1.0 Specification

The Physical Security Interoperability Alliance (PSIA) announces it has approved the Secure Credential Interoperability (SCI) 1.0 specification. The PSIA has been working with a broad group of industry pioneers in the access control industry to come up with this specification, which is likely to have a significant influence on the future of secure mobile credentials. Mohammad Soleimani, the Chief Technology Officer of Kastle Systems and the Chairman of the SCI Work Group, introduced this concept to the organization in 2020 and has had a strong influence in engaging other companies in its development. Compatible secure credential “A standard for secure mobile credentials has been long overdue in the industry. SCI relies on established standards and the Public Key Infrastructure, to provide a simple, but elegant solution,” said Soleimani. SCI addresses the need for a universally compatible secure credential for the physical access control industry in the form of cards, fobs, mobile devices, and wearables. Progress has been dramatic, with the technology being demonstrated at a PSIA technical meeting in August featuring apps from IDEMIA and Johnson Controls and a Kastle reader developed by WaveLynx. “It has been our mission from day one, to drive secure credentials and interoperability into the market” said Laurie Aaron, Executive Vice President at WaveLynx Technologies Corp. “Joining PSIA to collaborate and execute on a standard that is made available to all, has been a fast track to mission success.” Different mobile platforms The SCI specification helps the industry to take steps towards the last mile of credential evolution" One of the important characteristics of SCI is its interoperability across different mobile platforms including iOS and Android or devices with the ability to generate ephemeral key pair, which can be communicated over various protocols such as BLE (Bluetooth Low Energy), NFC (Near Field Communication), and UWB (Ultra-wide band). “The SCI specification helps the industry to take steps towards the last mile of credential evolution where interoperability of credentials can exist. The simplicity of the use of a public key leveraging standards and best practices ensure a secure and open way to manage credentials that takes proprietary out of the picture.” says Jason Ouellette, the Head of Technology and Business Innovation for Johnson Controls Access Control and Video Solutions business. Security industries’ efforts Participants in the spec development include, ASSA ABLOY, Deister Electronics, Farpointe Data (a dormakaba company), HID, IDEMIA, Kastle Systems, LenelS2, rf IDEAS, SentryCard, Siemens, and Johnson Controls. “This is an important milestone in the security industries’ efforts to enable flexible, interoperable and scalable solutions,” states Peter Boriskin, Chief Technology Officer for ASSA ABLOY Opening Solutions Americas. “It will be essential to consider how this and other standards apply across various industries, and how current and emerging standards impact each other.”

TDSi Launches New Additions To Its Powerful GARDiS Integrated Access Management Software, With The New Version 2.2
TDSi Launches New Additions To Its Powerful GARDiS Integrated Access Management Software, With The New Version 2.2

Integrated security systems manufacturer, TDSi is proud to announce the launch of exciting new additions to its powerful GARDiS integrated access management software, in the new Version 2.2. New features added to the GARDiS platform Version 2.2 include integration with the STid BLE (Bluetooth Low Energy) mobile device authentication portal, integration with the RS485 wireless locks from ASSA Abloy and SimonsVoss, integration with the new TDSi GARDiS VU VMS software, and a new Cause and Effect Engine. GARDiS platform Version 2.2 The latest additions add valuable features to the ever-evolving GARDiS platform The latest additions add valuable features to the ever-evolving GARDiS platform, as Tina Baker, Software Project Manager at TDSi comments, “GARDiS is designed to evolve, anticipate and cater for a rapidly changing security/safety landscape. Both integration with the STid BLE portal and support for RS485 wireless locks provide greater flexibility in deploying highly secure touch-free access control.” Tina Baker adds, “Integration with our new GARDiS VU VMS solution, which is powered by our fellow VITAPROTECH Group partner and specialist in intelligent cloud video surveillance RECAS, enables customers to benefit from this next-generation solution.” STid BLE Portal integration Integration with the STid Portal provides easy, but highly secure use of a mobile device as access control authentication. By utilizing the ubiquitous mobile phone, organizations can easily share or rescind access approval. GARDiS v2.2’s integration ensures easy administration of this function (using a STid login). GARDiS v2.2 now features RS485 integration with ASSA Abloy and SimonsVoss wireless locks. This adds further resilience, by enabling them to communicate directly with the controller, even if the IP network is interrupted, in order to ensure continuous secure access control. TDSi GARDiS VU VMS software integration The latest version of the GARDiS software now features integration with TDSi’s new GARDiS VU VMS solution, which has been developed in partnership with RECAS. This ensures full and seamless integration of access control and the video surveillance network, all from a single central portal. The all-new Cause and Effect module fully automates a response to one or multiple inputs (such as an intruder panel for example), so the security operator is assured that the system will enact the required action, without the need for human intervention. Cause and Effect engine The Cause and Effect engine operates on both the main security server and the local controller To meet any eventuality or situation, the Cause and Effect engine operates on both the main security server and the local controller. This ensures that even if there is a communications loss between the two, the access control function remains fully operational. It also provides easy to create and update Cause and Effect records that are bespoke to the security needs of the organization/facility, with detailed report generation on-hand, whenever required. GARDiS Pro v2.2 also now includes a widget that enables a visual check of an access event (be it via a card, mobile or biometric credential), delivering an image of the authorized person for verification. Unlimited additional fields and new interface To add even greater flexibility to the GARDiS system, v2.2 also provides unlimited additional fields per user record. This enables the creation of bespoke fields and additional space to log notes, as required. Additionally, v2.2 also provides a revised user interface, which centralizes operations and makes rapid navigation easier. Tina Baker concludes, “All these new functions are the result of close consultation with our installation partners and customers, adding true value-add features that help to improve and refine secure access control operations, and the user experience, benefitting any organization or business that needs them.” The new features are available to download and install now through v2.2 of the GARDiS integrated access management software.

ASSA ABLOY’s Code Handle Offers A Secure And Cost-Efficient Access Control Solution For Primary Schools
ASSA ABLOY’s Code Handle Offers A Secure And Cost-Efficient Access Control Solution For Primary Schools

ASSA ABLOY’s Code Handle door entry solution is a simple solution for keeping private rooms very private, in order to allow access only to those who require it and authorized personnel. Code Handle door entry solution The PIN code setting of the Code Handle access control solution allows users to keep control of who has access, particularly important when they want to keep items away from children. In primary schools, Code Handle protects each and every room that staff and security don’t want pupils to access. This ensures that only authorized teachers and support staff, who know the code to unlock the door, can access these rooms. All they need to do is enter the code on the Code Handle‘s keypad and the door opens. Works together with existing locking units Code Handle, by ASSA ABLOY, works in combination with the existing locking units Code Handle, by ASSA ABLOY, works in combination with the existing locking units, already installed in facilities. Users can keep the cylinder or lock, and just change the handle to a battery-powered Code Handle. With Code Handle, there is no need to cable the door, connect it to the mains or install an electronic access control system. The Code Handle door entry solution is perfect for staff offices, kitchens, store rooms, staff toilets, or any other school room that is to be kept private and secure. ASSA ABLOY’s Code Handle has various benefits, including: Auto-lock - Staff rooms are used many times, throughout the day, With Code Handle’s auto lock feature, there is no need to remember to lock the door, when exiting. Easy to install and retrofit - All it takes is two screws and two minutes of time, to install Code Handle on almost any interior door. Keyless and convenient - Secure rooms with no keys, no wires, and no expensive access control system, with the Code Handle door entry solution.

Related white papers

10 Top Insights In Access, Cloud And More

Protecting Dormitory Residents and Assets

Attention OEMs: 5 Ways RFID Readers Can Secure Your Markets