ASSA ABLOY - Aperio® Access Control Accessories(22)
Browse Access Control Accessories
Access control accessory products updated recently
The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase In Cybersecurity Threats And Breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organizations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand For Safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalize on opportunities for growth in the coming year.
2017 was quite an interesting and eventful year for the physical security industry. The economy has been robust and technology has become progressively sophisticated—with interactive services, cloud computing and network-based solutions taking charge to provide new insights to installers and their end-user customers. The Internet of Things is creating increasingly integrated solutions, with a heightened emphasis on total connectivity. Changing Security Expectations World events have also put the spotlight on the need for comprehensive security at public events, tourist attractions and schools and campuses. Security is an expectation and systems integrators are becoming trusted advisors to their customers, who are looking to them to solve problems or issues. Residential systems are more robust and now, are migrating to the commercial side of the business. There’s a blurring of the lines of technology—many of the products that come to the security industry originate from the consumer side. This proposition is also changing expectations by both residential and commercial customers, who want common, easy operation from their smartphone or user interface. Unexpected was some of the biggest deals in the industry, including acquisitions by dominant companies who grew even larger and continued ongoing consolidation on the manufacturing side. Those who remain will need to be progressive and step up their game with the latest proven technologies. Selling hardware isn’t the end game any longer. It’s providing solutions that generate revenue for security dealers and offer a solid return on investment for the end-user. In addition, solutions need to be easier for the user, and integrate many different systems and components across the enterprise. Cybersecurity Safeguards End users want to get the most out of their solutions—and they want to be able to have more than safety and security. They are looking for the types of products that yield insights into system performance and give them the data the need for greater control and to proactively address any challenges or problems before they occur. Downtime is not an option and therefore, there’s an increased emphasis on consistent power so solutions are always on and running reliably. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines Cybersecurity is a dominant conversation in the security industry these days and that buzz will continue into 2018. Because solutions are increasingly network connected, they have vulnerabilities that will have to be addressed by service providers and manufacturers. Manufacturers will need to take the upper hand in providing hardened products—testing and certifying for cybersecurity safeguards. That is not an easy task and can be expensive, but it needs to be done. Because cybersecurity is in constant evolution, many will go the route of outsourcing this component of their manufacturing to third parties well-versed in threat detection and hardening. Hardened products will also need to evolve with new emerging attacks. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines. Intelligent Access Control Solutions Manufacturers no longer operate in silos. They are working with systems integrators to more fully understand their needs and those of the end-user. Manufacturers are also partnering with technology providers—bringing in the expertise of others so their solutions are comprehensive and holistic. We will continue to see integration of formerly disparate components, open systems and open APIs. There will also be strong migration to access control systems with edge intelligence and power over Ethernet, leveraging existing cabling for network connectivity. The winners will be those who take the lead in providing cyber secured and hardened products, as well as companies who partner with others to bring best of breed solutions to market. The losers will be those who continue to develop proprietary, closed systems and fail to recognize the importance of network connectivity for real-time, proactive reporting. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7 Ongoing Partner Success LifeSafety Power® has been working consistently and diligently on elevating the status of power from unintelligent hardware device to network-connected component that yields rich data for the user and allows the installer to provide remote monitoring and managed power services. We have changed the paradigm of power but there’s additional work to do to get people to understand the new, critical role power plays in comprehensive enterprise and campus security. Now, security installers can help the end user know what’s happening with locks, access control, gates or other connected solutions and fix problems before they happen. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7. We have also had continued, ongoing successes with our many partners in the access control community and that’s where we will further focus our efforts in 2018—working with leading security solution providers to present the best technologies and solutions that are reliable, certified and present the types of insights security dealers need to offer customers to provide the highest levels of service. This will also help security dealers and integrators differentiate themselves and compete more effectively in the crowded marketplace.
Part 1 in our Intercoms in Security Series Lambert-St. Louis International Airport uses Code Blue intercoms Organizations are demanding a new level of interoperability among mission-critical security systems. Intelligible audio, the ability to hear, be heard and be understood, is critical to communication, which is essential to the core security processes within an organization, as well as to emergency situations. Intelligible audio provides a platform to optimize various processes, including the use of security officers. “Our main thrust is to ensure our clients see intelligible and interoperable audio, not as an option, but as instrumental to their budget optimization, stakeholder communication and risk mitigation efforts,” says Jim Hoffpauir, President of Zenitel North America, a manufacturer of intercoms and other communications solutions. Iintercoms In Building Safety And Security The role of intercoms in building safety and security is a given across many markets, and that use is growing. Intercoms are used in campus call boxes, elevators, muster locations, and for emergency notification. The trend is toward video, audio and access control, all tied together. There is also an emphasis on providing intelligible audio in any environment, even demanding ones. The education market has historically been a large sector for intercoms. Emergency phones and intercoms traditionally have been found throughout education settings, including colleges and universities, where they remain quite popular. Expanding Markets For Two-way Communication In recent years, however, their popularity has also grown within the healthcare and mass transit sectors, where their versatility allows authorities to react to emergency situations while also providing a wide range of applications for non-emergency situations, such as car trouble or requests for directions. Intercoms can fulfill a variety of emergency and non-emergency needs in places like downtown Santa Ana, California (Photo courtesy Code Blue) “Markets of all sizes and shapes can benefit from a two-way communication solution that can help individuals place calls for assistance with first responders, police departments or customer service representatives,” says David Fleming, Chief Design Officer for Code Blue Corp. Intercoms For Public And Private Sectors Aiphone is another intercom manufacturer for which education is a big market. Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp., says about 80 percent of both public and private K-12 and higher education campuses are using at least one intercom in some form. That percentage grows to nearly 100 percent for hospitals, which are using intercoms as nurse-call stations and at parking facilities, exterior door entries, nurseries and pharmacies, he says. "About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms" Up to 70 percent of larger multi-family facilities are also using intercoms. And that percentage is even higher in older, heavily populated Eastern cities. Many locales have laws mandating the use of audio and video intercoms on buildings beyond a threshold number of units. About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms, says Czerwinski. In the past year, Aiphone’s emergency stations have become very popular, particularly in campus settings; both commercial and higher education. Also, a growing number of unmanned parking garages are using the stations to allow patrons to immediately reach first responders or security personnel. Each of these markets still has growth potential, but by its sheer size, the commercial market offers the greatest opportunities, according to Aiphone. Video-Enabled IP Intercoms Intercom usage differs widely in various global markets, according to Craig Szmania, CEO of 2N USA, a manufacturer of IP intercoms. In the North American market, intercom usage is relatively low compared to the Europe, Middle East, and Africa (EMEA) region, where intercoms are a more mature market. Security, convenience, systems integration and IP-versus-analog adoption are driving usage and growth to more than 20 percent year-over-year. More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution, according to Szmania. “Our intercom portfolio targets all the major verticals, but we have had particular success in the education sector – K-12 and universities,” says Szmania. “These end users are looking for specific features in securing their campuses, providing convenience to their administrators, employing programmability for differing use scenarios throughout the campus, and integration to their telephony or other systems.” More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution Szmania says the latter point is becoming a particular need in light of a requirement for campus-wide communication and coordination in emergency situations. “Our intercoms integrate seamlessly with third party solutions such as Cisco’s telephone systems that are the communication backbones of many schools and campuses,” he adds. IP-based Solutions In Residential Verticals Considering near-term growth potential, single family and multi-tenant residential verticals have fantastic opportunities for increased usage of door stations/intercoms in the United States, according to Szmania. The company has entered this space over the last several years and has grown to be a market leader in IP-based integrated solutions, especially in the home automation space. The adoption of IP networked solutions for condominiums and apartments is just taking off, driven in part by consumer demand for mobile-anywhere video, audio and door control. The service is also a driver for integrator/dealer adoption of the technology to provide recurring monthly revenue (RMR). 2N has also achieved triple-digit growth in commercial building installations over the past two years. Building owners, IT departments and security managers want and need a networked solution for control and security. 2N’s open platforms are a good fit, says Szmania. Read part 2 of our Security Intercoms series here
The emergence of smart cities provides real-world evidence of the vast capabilities of the Internet of Things (IoT). Urban areas today can deploy a variety of IoT sensors to collect data that is then analyzed to provide insights to drive better decision-making and ultimately to make modern cities more livable. Safety and security are an important aspect of smart cities, and the capabilities that drive smarter cities also enable technologies that make them safer. We asked this week’s Expert Panel Roundtable: What are the physical security challenges of smart cities?
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?
Businesses, large and small, create data which needs protecting, whether in an onsite server room or co-located at a data center. When a business imagines a corporate data breach, they’re probably picturing black-hat hackers pursued by cybercrime investigators. The reality is often more mundane. Only around a half of breaches involve hacking, according to one recent report. Gaps in the physical security, the business’ data and servers are equally important targets. Perhaps the company director leaves their laptop on the train. Or an unauthorized visitor spots open server racks and quickly downloads records onto his smartphone. Or maybe the server room access control is left entirely to lock-and-key technology which cannot be easily tracked. Physical server security Securing sensitive data needs the involvement of every member in an organization, from top to bottom. But physically protecting servers and data stores is the heart of the security and IT manager’s role. How much could a data breach cost someone? In the absence of appropriate physical server security, the mundane can be dangerous — and expensive. Recent research for IBM by the Ponemon Institute estimates the average total cost of a data breach at $3.86 million (€3.57 million). According to the same benchmark report, this average is rising, by 6.4% in the last year alone. Some of the highest breach costs are borne by companies in Europe, including Germany, France, Italy and the UK. Unauthorized access As Big Data gets bigger, so does the regulatory landscape for data handling Such costs can be direct: in business disruption, lost mailing lists or disabled logistics software. They can be indirect: an erosion of customer trust and damaged “brand equity”. Hard-earned goodwill and positive reputations are quickly reversed. Costs also come from fines levied by government and supranational regulators. As Big Data gets bigger, so does the regulatory landscape for data handling. The most relevant framework for those operating in the EMEA region is the European Union’s General Data Protection Regulation (GDPR). This wide-ranging data privacy rulebook has been enforced since May 2018. GDPR requires businesses to protect storage of all personal information, including customer and employee data. The business’ safeguards must include both electronic and physical barriers to unauthorized access. Server protection is critical. Physical security for the servers Does a company know who last accessed their servers, and when? If the answer to either question is “no”, the company is taking unnecessary risks with data security. Yet ensuring they stay on the regulators’ right side, and avoid a costly breach, could be straightforward: better access control. To ensure maximum security of their servers, in its recent white paper ASSA ABLOY recommends three levels of security working together within an integrated access system. Security management systems Level 1 — perimeter security ensures only authorized personnel enter a data storage building. Here, door and gate electronic locks with credential readers can work alongside the likes of CCTV and monitored fencing. It’s a company’s first line of physical breach defense. Level 2 — server room access can be monitored and controlled with a range of access control door devices with inbuilt credential readers, including Aperio battery-powered escutcheons or complete security locks. Either device integrates seamlessly with access and security management systems from over 100 different manufacturers. At room level, physical security must also include water- and dustproofing, electromagnetic security and protection against other physical threats to servers and data. Level 3 — final level of physical data security is a company’s server rack or cabinet. Server rooms have a steady flow of authorized traffic: cleaners, maintenance staff, repair technicians and others. Employee screening cannot be perfect — and accidents happen. Rack or cabinet locking with RFID readers is the last line of defense against a malicious or accidental physical data breach. Real-time access control ASSA ABLOY’s Aperio KS100 adds real-time access control and monitoring to server racks and cabinets ASSA ABLOY’s Aperio KS100 Server Cabinet Lock adds real-time access control and monitoring to server racks and cabinets. The lock works with an existing or new access control system; compatible credentials employ all standard RFID protocols including iCLASS, MIFARE and DESFire. Under the EU’s GDPR, the business must inform anyone affected by a breach “without undue delay”. With the Aperio KS100, the business would know right away if unauthorized access had even been attempted. Once installed, KS100 locks integrate with the access control system and communicate wirelessly via an Aperio Communications Hub, even if the company’s racks are co-located in a distant data centre. Once online integration with the security admin system is complete, lock access decisions are communicated from and recorded by the company’s software wirelessly. Data protection regulations “When Aperio replaces mechanical locking at all three levels of server access control, lost keys no longer compromise data security. Lost credentials are simply deauthorized and a valid replacement reissued. The current status of any lock, at any level, is revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 and other Aperio wireless locks invaluable for incident investigation”, explains Johan Olsén, Aperio Product Manager at ASSA ABLOY Opening Solutions EMEA. The right electronic locking keeps the customer reputation intact, the business data off the Dark Web, and on the right side of the multiple data protection regulations, including GDPR.
Related white papers
RFID and Smartphone Readers in Physical Access Control
Access Control & Intelligent Vehicle Screening
Convergence Of Physical And Logical Access
Designing Video Management Systems Using H.265Download
Making Sense of Today’s Security Camera OptionsDownload
Sinaloa, Mexico: Connected Cities are Safer CitiesDownload
FLIR PT Series Cameras Used For Video Surveillance On The Spanish Galician Coast To Monitor Illegal Fishing
- FLIR PT Series Cameras Used For Video Surveillance On The Spanish Galician Coast To Monitor Illegal Fishing
- ASSA ABLOY Supplying Security And Safety Solutions To UK’s Railroad Industry
- ASSA ABLOY Aperio Installs Real-Time Access Management And Devices At The Camp
- ASSA ABLOY’s Code Handle Secures An Upscale Fashion Boutique, Patio, With A PIN Locking Handle