HID Global Announces The Edge™ Family Of IP-Based Access Control Solutions
HID Global Announces The Edge™ Family Of IP-Based Access Control Solutions

HID Global, a leading manufacturer in the access control industry, announced from the ISC West Convention in Las Vegas, the introduction of its new Edge family of IP-based access control solutions, providing a comprehensive line of reader and processor configurations that can be tailored to the requirements of any enterprise.  The new IP-enabled Edge products feature the new OPIN technology platform, an open API providing unprecedented flexibility, scalability and cost savings right at the door.  The products currently available are the EdgeReader™, an integrated contactless smart card reader and access control processor, and the EdgePlus™, an access control processor that works with any reader.Moving the decision-making and intelligence to the door, HID's Edge product line eliminates the need for the access controller to reside "in the closet" and allows simplified connection to IT infrastructures.  IP-ready, the new products provide a complete and full-featured access control hardware infrastructure and contactless smart card capabilities.  In addition, Edge solutions incorporate the new OPIN API, permitting current and future host software choices without the need to install new hardware and making the solution adaptable to an organization's changing security needs.  With a worldwide network of experienced development partners, there are many options for integrated security solutions incorporating Edge."With the Edge family, physical security hardware can now fully leverage an enterprise's IT infrastructure, allowing companies to reap the many benefits such as simplified installation, scalability, flexibility and cost savings," said Thomas Heiser, vice president of Networked Access Solutions, HID Global. "In addition, the introduction of the OPIN technology platform shifts the paradigm toward a more open system.  OPIN means more choices for upgrades and modifications."Edge solutions are Power-over-Ethernet ready (PoE), allowing all building facilities to utilize standard Cat 5/6 wiring.  This feature eliminates specialized cabling, cuts installation time and makes it cost-effective and flexible for future upgrades.  Unlike traditional access control hardware, Edge makes the access control decisions right at the door. No longer is there a single point of failure that affects multiple doors.The Edge family includes the Edge Solo, a stand-alone solution for single-door applications.   With its built-in software, Edge Solo can work without a host application, and is remotely managed through a standard web browser.  Using OPIN technology, the Edge Solo can be remotely upgraded to tap into a host-based application for migration to a larger system.The Edge Host solution, designed for larger systems with thousands of doors and multiple facilities, ties back to an enterprise's host software.  EdgeReader and EdgePlus are available in both Solo and Host versions, allowing end-users to select the card reader of their choice.

Add to Compare
HID Global Launches Edge Solo Version 1.2.0
HID Global Launches Edge Solo Version 1.2.0

Edge is a true IP solution that meets the demands of open architecture, IP-centric environments, Edge provides fully distributed intelligence and decision making right to the door, leveraging the IT infrastructure to the maximum extent possible.These IP-based single-door access control processors and host interface devices provide a high level of flexibility for connecting HID reader technology directly into standard IT network infrastructure. Edge Solo Readers feature an open architecture API with fully distributed decision making capabilities, CAT-5 interface cabling with Power Over Ethernet (PoE) and fully encrypted bi-directional communication.EdgeSolo v.1.2 is the next phase of the original Edge Solo product development effort which provides access control functionality and provisioning usually found in larger much more expensive solutions and not found in any other stand-alone solution.The latest version of Edge Solo adds several new features to the product, including:Two additional languages are supported - Turkish and Dutch.Clock-and-Data Readers are now supported.PIN credentials and HID keypad readers are now supported. Added "PIN suppression schedule" feature to relax PIN requirements.A credential batch entry method has been created, allowing the operator to quickly add a range of consecutively numbered credentials.Configurable Alerts to drive relays or send HTTP messages triggered by IO events are now available.Special Days (holidays) have been made globally available among different schedules, and a holiday management data entry page has been added.A "First Person" or "Snow day" schedule option has been added.A separate "user" password has been added.  An "Installer lockout" option removes some setup privileges for "user" relative to the "admin" logon.To download the firmware upgrades for Edge Solo 1.2.0, click on the link below: Edge Solo new download.Please find below the links to the product datasheets for more informationEdgeReader Solo ESRP40 Datasheet EdgeReader Solo ESR40 Datasheet EdgePlus Solo ES400 Datasheet Note that supported languages are now divided between two release packages: Upgrade Package #1 includes English, Dutch, Turkish, French, German, Italian, Portuguese (Brazilian), Russian and Spanish (International).Upgrade Package #2 includes English, Chinese (Simplified), Hindi, Japanese and Korean.

Add to Compare
ACT 433 Long Range Receiver & Transmitters Integrate Gate Entry/barrier Control Into Existing Access Control Systems
ACT 433 Long Range Receiver & Transmitters Integrate Gate Entry/barrier Control Into Existing Access Control Systems

The ACT 433 from Access Control Technology (ACT) Ltd., delivers gate entry or barrier control within a new or existing access control solution. It can be integrated into the ACTpro access control solution or any 37 bit Wiegand or clock and data system. The ACT 433 range of products includes a receiver and two long range transmitters, one of which has a built in proximity. Receivers from 3rd party manufacturers, such as Prastel receivers supplied by ACT, can also be read by the ACT 433 receiver making it feasible to upgrade existing systems to the ACT 433 solution by simply changing the receiver.   As the ACT 433 can be easily integrated into an existing access control system, such as ACTpro or ACTsmart2, the administration of tags, for gate entry or barrier control, becomes a much simpler, manageable and secure process than is the norm. Lost, stolen or obsolete tags can be removed from the system immediately, through the use of the ACT developed ACTWin pro or ACTSmart software. Entry will be denied to anyone trying to gain access using such a tag.      Allocation of car park spaces in a shared car park can also be managed by the ACT 433 working in conjunction with the ACTWin software. User groups can be set up and a maximum number of spaces can be allocated to each group. When the spaces allocated to a group have been filled access will not be granted until a group member leaves. The ACT 433 products are not limited in terms of their functionality. As well as the popular integration of gate entry or barrier control into an existing access control system they can also be used for the activation of external lighting and the operation of motorised roller shutters, blinds or awnings. Unlike many similar products on the market the ACT 433 Receiver has an IP67 rating making it suitable for outdoor as well as indoor installation. With an attractive, polycarbonate housing it can be surface or flush mounted. The long range transmitters (ACT 433TX and ACT 433TXprox) have a read range of up to 50 metres, site dependent. With built in proximity the ACT 433TXprox can be used to gain entry at a door secured by an access control reader.      

Add to Compare
New Product Line From HID - SmartID™ S10, SK10, SW100 And SWK100 13.56MHz Contactless Reader / Writer Family
New Product Line From HID - SmartID™ S10, SK10, SW100 And SWK100 13.56MHz Contactless Reader / Writer Family

SmartID offers a flexible High Frequency Solution to help users migrate at their own pace.  SmartID ISO 14443 readers offer the ultimate choice in interoperability and programmability.  Its unique capabilities, such as reading any MIFARE® and/or MIFARE DESFire® sector or application data file, helps to meet any access control solution's needs.  Designed for a wide variety of applications from entry level access control to secure ID management, the SmartID family is completely configurable for every access control application challenge.SmartID readers offer one of the broadest ranges of card compatibility in the industry and can be configured as a specific solution for each project.SmartID reader is available with or without PIN pad, adding an extra layer of protection for higher security installations making it an ideal solution for customers that require a customizable reader for new or existing installations.Within the SmartID family of products, HID Global also offers a biometric reader, an intelligent combination of the SmartID mullion reader and fingerprint verification.Key features:Completely configurable for every access control application challenge.Open Architecture Design - ISO 14443A MIFARE®/MIFARE DESFire® contactless smart card, compatible for broad card interoperability.Read Flexibility - Reads data from any MIFARE® sector or MIFARE DESFire® application file on the card.Data Security - Secure data transmission with 3DES encryption.GSA-approved - Included in the U.S. General Services Administration (GSA) FIPS 201 Approved Product List

Add to Compare

Access control readers - Expert commentary

Entrance Control Vs Access Control: Similarities And Differences
Entrance Control Vs Access Control: Similarities And Differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Making The Shift From Manufacturer To Service Provider
Making The Shift From Manufacturer To Service Provider

The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be  highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.

A Secured Entrance Is The First Defense Against An Active Shooter
A Secured Entrance Is The First Defense Against An Active Shooter

The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”