PCSC Access Control Accessories(1)
Browse Access Control Accessories
Access control accessory products updated recently
The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase In Cybersecurity Threats And Breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organizations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand For Safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalize on opportunities for growth in the coming year.
2017 was quite an interesting and eventful year for the physical security industry. The economy has been robust and technology has become progressively sophisticated—with interactive services, cloud computing and network-based solutions taking charge to provide new insights to installers and their end-user customers. The Internet of Things is creating increasingly integrated solutions, with a heightened emphasis on total connectivity. Changing Security Expectations World events have also put the spotlight on the need for comprehensive security at public events, tourist attractions and schools and campuses. Security is an expectation and systems integrators are becoming trusted advisors to their customers, who are looking to them to solve problems or issues. Residential systems are more robust and now, are migrating to the commercial side of the business. There’s a blurring of the lines of technology—many of the products that come to the security industry originate from the consumer side. This proposition is also changing expectations by both residential and commercial customers, who want common, easy operation from their smartphone or user interface. Unexpected was some of the biggest deals in the industry, including acquisitions by dominant companies who grew even larger and continued ongoing consolidation on the manufacturing side. Those who remain will need to be progressive and step up their game with the latest proven technologies. Selling hardware isn’t the end game any longer. It’s providing solutions that generate revenue for security dealers and offer a solid return on investment for the end-user. In addition, solutions need to be easier for the user, and integrate many different systems and components across the enterprise. Cybersecurity Safeguards End users want to get the most out of their solutions—and they want to be able to have more than safety and security. They are looking for the types of products that yield insights into system performance and give them the data the need for greater control and to proactively address any challenges or problems before they occur. Downtime is not an option and therefore, there’s an increased emphasis on consistent power so solutions are always on and running reliably. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines Cybersecurity is a dominant conversation in the security industry these days and that buzz will continue into 2018. Because solutions are increasingly network connected, they have vulnerabilities that will have to be addressed by service providers and manufacturers. Manufacturers will need to take the upper hand in providing hardened products—testing and certifying for cybersecurity safeguards. That is not an easy task and can be expensive, but it needs to be done. Because cybersecurity is in constant evolution, many will go the route of outsourcing this component of their manufacturing to third parties well-versed in threat detection and hardening. Hardened products will also need to evolve with new emerging attacks. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines. Intelligent Access Control Solutions Manufacturers no longer operate in silos. They are working with systems integrators to more fully understand their needs and those of the end-user. Manufacturers are also partnering with technology providers—bringing in the expertise of others so their solutions are comprehensive and holistic. We will continue to see integration of formerly disparate components, open systems and open APIs. There will also be strong migration to access control systems with edge intelligence and power over Ethernet, leveraging existing cabling for network connectivity. The winners will be those who take the lead in providing cyber secured and hardened products, as well as companies who partner with others to bring best of breed solutions to market. The losers will be those who continue to develop proprietary, closed systems and fail to recognize the importance of network connectivity for real-time, proactive reporting. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7 Ongoing Partner Success LifeSafety Power® has been working consistently and diligently on elevating the status of power from unintelligent hardware device to network-connected component that yields rich data for the user and allows the installer to provide remote monitoring and managed power services. We have changed the paradigm of power but there’s additional work to do to get people to understand the new, critical role power plays in comprehensive enterprise and campus security. Now, security installers can help the end user know what’s happening with locks, access control, gates or other connected solutions and fix problems before they happen. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7. We have also had continued, ongoing successes with our many partners in the access control community and that’s where we will further focus our efforts in 2018—working with leading security solution providers to present the best technologies and solutions that are reliable, certified and present the types of insights security dealers need to offer customers to provide the highest levels of service. This will also help security dealers and integrators differentiate themselves and compete more effectively in the crowded marketplace.
Part 1 in our Intercoms in Security Series Lambert-St. Louis International Airport uses Code Blue intercoms Organizations are demanding a new level of interoperability among mission-critical security systems. Intelligible audio, the ability to hear, be heard and be understood, is critical to communication, which is essential to the core security processes within an organization, as well as to emergency situations. Intelligible audio provides a platform to optimize various processes, including the use of security officers. “Our main thrust is to ensure our clients see intelligible and interoperable audio, not as an option, but as instrumental to their budget optimization, stakeholder communication and risk mitigation efforts,” says Jim Hoffpauir, President of Zenitel North America, a manufacturer of intercoms and other communications solutions. Iintercoms In Building Safety And Security The role of intercoms in building safety and security is a given across many markets, and that use is growing. Intercoms are used in campus call boxes, elevators, muster locations, and for emergency notification. The trend is toward video, audio and access control, all tied together. There is also an emphasis on providing intelligible audio in any environment, even demanding ones. The education market has historically been a large sector for intercoms. Emergency phones and intercoms traditionally have been found throughout education settings, including colleges and universities, where they remain quite popular. Expanding Markets For Two-way Communication In recent years, however, their popularity has also grown within the healthcare and mass transit sectors, where their versatility allows authorities to react to emergency situations while also providing a wide range of applications for non-emergency situations, such as car trouble or requests for directions. Intercoms can fulfill a variety of emergency and non-emergency needs in places like downtown Santa Ana, California (Photo courtesy Code Blue) “Markets of all sizes and shapes can benefit from a two-way communication solution that can help individuals place calls for assistance with first responders, police departments or customer service representatives,” says David Fleming, Chief Design Officer for Code Blue Corp. Intercoms For Public And Private Sectors Aiphone is another intercom manufacturer for which education is a big market. Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp., says about 80 percent of both public and private K-12 and higher education campuses are using at least one intercom in some form. That percentage grows to nearly 100 percent for hospitals, which are using intercoms as nurse-call stations and at parking facilities, exterior door entries, nurseries and pharmacies, he says. "About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms" Up to 70 percent of larger multi-family facilities are also using intercoms. And that percentage is even higher in older, heavily populated Eastern cities. Many locales have laws mandating the use of audio and video intercoms on buildings beyond a threshold number of units. About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms, says Czerwinski. In the past year, Aiphone’s emergency stations have become very popular, particularly in campus settings; both commercial and higher education. Also, a growing number of unmanned parking garages are using the stations to allow patrons to immediately reach first responders or security personnel. Each of these markets still has growth potential, but by its sheer size, the commercial market offers the greatest opportunities, according to Aiphone. Video-Enabled IP Intercoms Intercom usage differs widely in various global markets, according to Craig Szmania, CEO of 2N USA, a manufacturer of IP intercoms. In the North American market, intercom usage is relatively low compared to the Europe, Middle East, and Africa (EMEA) region, where intercoms are a more mature market. Security, convenience, systems integration and IP-versus-analog adoption are driving usage and growth to more than 20 percent year-over-year. More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution, according to Szmania. “Our intercom portfolio targets all the major verticals, but we have had particular success in the education sector – K-12 and universities,” says Szmania. “These end users are looking for specific features in securing their campuses, providing convenience to their administrators, employing programmability for differing use scenarios throughout the campus, and integration to their telephony or other systems.” More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution Szmania says the latter point is becoming a particular need in light of a requirement for campus-wide communication and coordination in emergency situations. “Our intercoms integrate seamlessly with third party solutions such as Cisco’s telephone systems that are the communication backbones of many schools and campuses,” he adds. IP-based Solutions In Residential Verticals Considering near-term growth potential, single family and multi-tenant residential verticals have fantastic opportunities for increased usage of door stations/intercoms in the United States, according to Szmania. The company has entered this space over the last several years and has grown to be a market leader in IP-based integrated solutions, especially in the home automation space. The adoption of IP networked solutions for condominiums and apartments is just taking off, driven in part by consumer demand for mobile-anywhere video, audio and door control. The service is also a driver for integrator/dealer adoption of the technology to provide recurring monthly revenue (RMR). 2N has also achieved triple-digit growth in commercial building installations over the past two years. Building owners, IT departments and security managers want and need a networked solution for control and security. 2N’s open platforms are a good fit, says Szmania. Read part 2 of our Security Intercoms series here
PCSC, a designer and manufacturer of access control solutions and Coolfire Solutions, a St. Louis based software company known for creating Military-Grade situational awareness platforms, collaborate to deliver top-level capabilities for access and security. Coolfire Solutions created its innovative Ronin Platform to deliver software that sits on top of existing systems and infrastructure to transform data into actionable intelligence. Originally developed for the U.S. military, the Ronin Platform is being widely adopted by industry leaders and organizations who recognize the importance of placing the right data, in the right hands, in real-time, so that intelligent decisions can be made. LiNC-NXG PSIM System Stacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG PSIM system provides a robust, real-time common operational pictureStacking the Ronin Platform on top of the data provided by PCSC’s LiNC-NXG physical security information management system provides a robust, real-time common operational picture, visually representing physical security events, and enabling a coordinated security response. For instance, urgent security related event details are pushed to mobile devices of nearby security officials for immediate action. An additional benefit, in the case of an on-premises environment, the underlying access management system is not exposed, only the top-level data is managed. Extend The Capabilities Of Access Solutions “An extremely impressive GUI for our industry and an actionable set of features extend the capabilities of PCSC’s access solutions for real-time response,” said Mas Kosaka, President and CEO of PCSC. “The expansion possibilities are virtually limitless too. We’re excited to debut the capabilities of Ronin to our Business Partners during the PCSC Symposium in conjunction with ISC West, the largest security industry trade show in the U.S.” Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day" “Coolfire Solutions and PCSC have the experience and capabilities to transform the way security professionals do their job every day. We can maximize the value of existing technology investments by combining data from any source and making it actionable," said Don Sharp, CEO at Coolfire Solutions. "Security professionals have an incredibly challenging job and it’s only getting tougher. By bringing all of their critical data onto a single pane of glass we can increase the level of security while driving significant operational efficiencies.”
The BioConnect Identity Platform provides an integration of Suprema's biometric solutions with the majority of leading access control systems BioConnect and Suprema have announced Suprema's launch of the BioConnect Identity Platform. Developed by BioConnect, Suprema's long-standing strategic partner in North America, the BioConnect Identity Platform provides an integration of Suprema's biometric solutions with majority of the leading access control systems in the global security market. Under the appointment, Suprema will provide and support the BioConnect Identity Platform globally from June 1st, 2016 onward. Powerful Integration FeaturesWith the BioConnect Identity Platform's powerful integration features and BioConnect's and Suprema's partner eco-systems, enterprises benefit from the ability to take advantage of deploying biometrics with their existing (or their choice of) access control vendor, standards, devices and way of operating. The BioConnect Identity Platform enables the seamless integration of Suprema's biometric terminals with access control systems, ERP and time and attendance systems, supporting biometric and multi-factor authentication, biometric enrollments and user ID management. One Central System The solution enables greater security, identity assurance and convenience from one central system and has ultimately changed the way that the physical access control market can consume biometrics as an authentication strategy. No other manufacturer around the world has been able to offer this level and quality of integrations - with the BioConnect Identity Platform boasting over 20. "With the BioConnect Identity Platform, BioConnect complements our goal of providing industry-leading biometric security solutions to the global market. The product is a ready-made bridge solution that provides easier integration of cutting-edge Suprema biometric technology together with a customer's choice of leading access control systems," said Young Moon, VP of Suprema. "We are looking forward to providing the BioConnect Identity Platform to a more global security market and are excited to offer our customers a seamless and cost-effective way of adopting Suprema's biometric security solutions," Moon added. Innovative Technologies From the perspective of the access control provider, the BioConnect Identity Platform opens up the option to provide a Suprema biometric solution and continue to benefit from the complete product line as Suprema brings new and innovative technologies to market. "As a Suprema partner we have experienced a lot of growth in the North American and UK markets due to its leadership and continued emphasis on producing biometric products of superior quality, versatility and range," said Steve Greb, Strategic Director of Business Development at BioConnect. "We're very excited to draw on Suprema's impressive partner network and continue to build out our Quest for Rightful Identity on a global scale." Integration With Leading Systems The BioConnect Identity Platform integrates the following leading access control systems with the Suprema biometric terminals; ACT ACTManage, AMAG Symmetry, Axis A1001, Brivo OnAir/OnSite, Genetec Security Center, IMRON IS2000, Lenel OnGuard, Open Options dnaFusion, Paxton Net2, Honeywell ProWatch, Honeywell WINPAK, RS2 AccessIT!, S2 Netbox, Software House CCURE 9000, Stanley SecureNET, Gallagher Command Centre and now PCSC LiNC-PLUS. Suprema and BioConnect will team together to showcase the BioConnect Identity Platform at IFSEC 2016 in London on June 21st-23rd at Stand E1400.
Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also likely the older stuff has a service tech scratching his head when faced with a configuration setting or data entry protocol. The newer technologies, however, may still be providing much of the desired functionality required by the legacy system user. Legacy in this context then is not necessarily a pejorative term. The system may be both reliable and performing as originally intended but is outdated in comparison to current technology offerings both from a communications standpoint and as it relates to applications and data mining. So what to do? For openers, as my dad would day, do a Ben Franklin list of do’s and don’ts. Naturally you’d love to move to a new, bigger or smaller, better and faster system. But, first, what does that list look like? I for one think is might begin to look like this: Things To Do When Managing Legacy Systems Do you have a handle on your current technology capabilities? Many legacy systems are underutilised and have features that are not used. Revisit your systems capabilities: You are likely to make some pleasant discoveries. Do you have a handle on your current technology capabilities? Many legacy systems are underutilized and have features that are not used Do you currently know how all of the pieces and parts in your system are currently communicating? A great start for planning the next steps is to understand the “plumbing.” Associated with that is the location of communication; specifically, how are things wired and where are they terminated, recorded and catalogued? What does your power distribution for the system components look like? Do you have backup and other means of maintaining operations during a loss of power, and where is that stuff? If not done recently, this step provides an opportunity to ensure you are ready for things that don’t happen and also to revisit codes. It’s always worthwhile if a maintenance provider is available to a system test in this area, or it can be self-conducted. What is the state of your record management, and when was the last time you did some basic housekeeping, such as backup and the like? If you don’t remember when you did it last, stop reading and go do some housekeeping — it’s clearly due now! What works for you and your organization, and what have you developed a work-around for? If your “super users” have found ways to manage desired system outcomes by some clever workaround, are there other desired features? Do you have a relationship with an authorized service provider or an on-staff trained first responder? Do you have attic stock (stuff you own) to support those older components? I like to think of it like making a road trip with a spare tire and basics in the trunk in case an extended unplanned stop on the side of the road interrupts your trip. Have you developed a plan for an eventual upgrade? What’s first, what does it cost and whom will I let provide pricing to do so? Rip-and-replace isn't your only option. There are many products and servicesavailable to migrate from a legacy to next steps utilizing embedded infrastructure Planning And Management What are my/your basic functional requirements, and where are the gaps now you must fill for enterprise sustainability? That legacy system likely has paid its way and now needs to be retired; I’m not ready either. Do you have a business case for this refresh – applications, data mining, new and reporting and risk mitigation strategies? If not, you are missing this first step of legacy migration planning and management. Managing the age includes a system exit strategy. Getting C suite, namely your CFO’s, attention is key; sustainability of your enterprise is 101, so functionality as it relates to risk mitigation is essential to keeping your entity flourishing. So What Are The DON’T’s? Don’t trivialize the migration or response to the Do’s or you’ll end up in a big To Do. Don’t minimize the relationship with existing integration resources you have worked with, old and new. Organizations evolve, some for the best, some not so. Refresh these relationships as well; resources are like bridges – you never know when a crossing is needed. Don’t rush into the latest and greatest; be wary of who’s definition you subscribe to. There’s a reason they call it the “cutting” edge. Don’t believe that rip-and-replace is your only option. There are many legacy systems in our industry, and many well-made and well-thought-out products and services are available to migrate from a legacy to next steps utilising embedded infrastructure. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. If your legacy includes some products with forward-thinking engineering thought leadership, you may be able to manage your needs with security control board-level replacements or the flashing of new firmware and upgrades to software. I‘m aware of several companies whose products elegantly move through time, adding new applications and functionality without wholesale rip-and-replace. These legacies carry on. The market has responded to you and others eager to know their options. There are many ingenious and clever ways to upgrade communications and transport of data, reliable mainstream products designed to meet this challenge head-on. There are solutions aimed at allowing you to use current IT and Internet of Things (IoT) apps and functionality. However, there are also quite a number of technology partners able help make the leap from analog to digital using existing pathways. The bottom line: Define your parameters, select your partners and engage companies with a history of legacy migration and thought leadership. They are most likely to produce the best results and allow you to leave behind the legacy you want to be associated with.
Related white papers
RFID and Smartphone Readers in Physical Access Control
Access Control & Intelligent Vehicle Screening
Convergence Of Physical And Logical Access
5 Security Lessons For Navigating COVID-19Download
Cloud Video and Smart CitiesDownload
Security Investments Retailers Should Consider For Their 2021 BudgetDownload
FLIR PT Series Cameras Used For Video Surveillance On The Spanish Galician Coast To Monitor Illegal Fishing
- Videonetics Unified Solution Ensures 24x7 Surveillance Of The Guests And Artifacts At Kolkata’s Cultural & Research Institute
- FLIR PT Series Cameras Used For Video Surveillance On The Spanish Galician Coast To Monitor Illegal Fishing
- ASSA ABLOY Supplying Security And Safety Solutions To UK’s Railroad Industry
- ASSA ABLOY Aperio Installs Real-Time Access Management And Devices At The Camp