TDSi Access Control Readers(31)
TDSi, a global leader in access control systems for all sizes of businesses and organizations has launched its exciting new facial recognition reader.The new facial recognition reader is a highly secure, rapid and reliable method of controlling access to sensitive or restricted areas, without the need for traditional security cards or tokens. By doing away with identification tokens, user profiles can be added (or removed) quickly and efficiently with no additional costs once the system is installed. The system can easily be added to existing or planned security and surveillance systems to maximize return on investment.The reader can store up to 500 users and can verify a user in less than one second. It is also highly reliable, operating in virtually all light conditions and has a False Acceptance Rate (FAR) of less than 0.0001%, whilst maintaining stringent access control.TDSi Managing Director, John Davies comments: "Facial Recognition really raises the bar with regards to access control as it provides high levels of security whilst making the process simpler, faster and more convenient for the user. As with many of our products, facial recognition can be particularly useful as a specific part of a fully integrated security network."TDSi's facial recognition reader is perfect for enabling access to sensitive areas where specific users need a flexible and easy-to-use method of entry, such as a laboratory for example. Davies adds, "By adding a further layer of security to the mix an unauthorized person is far less likely to be able to gain access to highly secure areas, even if they have managed to pass through the perimeter security by the theft of a security card."For further details please visit TDSi's homepage. See the album with captionsAdd to Compare
TDSi, a global leader in access control systems for all sizes of businesses and organizations will be attending IFSEC 2012 at the NEC Birmingham on the 14th to the 17th May, exhibiting in Hall 4 on stand G20. TDSi will be launching and demonstrating the latest update for its EXgarde PRO software suite, EXgarde 4.0, which now includes compatibility with Microsoft’s Active Directory, along with integration with Texecom’s Premier range of intruder alarm panels, to highlight to attendees the importance of integration in creating effective building management systems. The Texecom Integration Module allows true TCP/IP integration with TDSi’s EXgarde PRO 4.0 software suite to alarm specialist Texecom’s Premier range of Intruder Alarm panels. The solution allows full integration of Texecom’s Premier range of panels to other serial based devices such as IP CCTV and TDSi’s VUgarde NVR, providing visual verification of Intruder Alarms through TDSi’s EXgarde PRO. This level of flexibility is one of the many reasons why TDSi’s Texecom Integration module has been nominated for the IFSEC International Security Awards 2012 in the Integrated Security Product of the year category. The integration provides enhanced control and offers numerous benefits, such as the ability to activate and deactivate specific panels across multiple sites, as well as individual zones of a building and the ability to monitor all Intruder Alarm events which appear in the EXgarde PRO Alarm Manager Events window. If an alarm is activated, CCTV can be triggered to deliver both a real time image and a customisable pre alarm condition recording to the control room. The integration also means users benefit from a single point of administration with the ability to review a history of the intruder alarm events and also reduce the numbers of false alarms and the problems associated with this. The Texecom Integration module is just one of the new features available for the new EXgarde PRO 4.0 enhancing its pedigree as a fully featured access management PC software application that provides cutting-edge technology in a single user-interface. The access control software delivers powerful integration through a range of software tools and version 4.0 adds further additional benefits such as full compatibility with 64-bit operating systems and a flexible web-based reporting engine. John Davies, Managing Director of TDSi, comments: “We look forward to attending IFSEC again this year with a great stand and high quality products. We hope to raise awareness that integration between physical security and technology is essential and can be done with ease and efficiency.” The most recent hardware addition to TDSi’s hardware portfolio is a new three factor biometric reader. DIGIgarde PLUS is a multitasking reader that is compatible with fingerprints, cards and PINs. It provides added security should a specific entrance require it, offering access using a combination of secure methods. DIGIgarde PLUS is compatible with TDSi’s EXgarde PRO 4.0 software and popular MIFARE cards to give high levels of security and can be used in situations where hygiene or ease of access are essential. Its high speed matching algorithm provides maximum usability and its access control intelligence gives you the option to install the reader to control a single door or alternatively you can connect and integrate DIGIgarde PLUS into an access control system to provide real-time event monitoring and central system programming and control. DIGIgarde PLUS has a high resolution optical scanner, which provides reliable reading of fingers of all sizes. The IP65 rating means that the robust reader can be mounted internally or externally. The Time and Attendance functionality allows users to clock in and out using a single reader, which increases efficiency and ease of use. The built in MIFARE smart card reader allows the user’s template to be stored either on the card or in the reader, whilst the full white-on-black dot matrix LCD enhances feedback to the user and offers an intuitive local programming interface. Mike Sussman, Engineering and Operations Director for TDSI, will also be presenting a seminar on recent advances in Access Control and integrated systems, which is being held on the 15th May at IFSEC in the Next Generation CCTV and Surveillance Hall 5, from 12:30 to 13:15pm. Mike Sussman comments: “At present the Access Control industry is fairly stable in its use of technology but advances in the IP world, coupled with new credential requirements such as NFC and Biometrics are seeing the systems slowly evolving. This presentation will look at the changing technology that is being adopted in the Access Control arena, coupled with the movement towards increased integration that enables users to realize increased security and efficiency for today’s security operations teams.” For further information on TDSi and the new Texecom Integration please visit http://www.tdsi.co.uk/intruder_alert.html. For comment or an interview about the rising requirement for true integration in access control with John Davies, Managing Director, please contact TDSi’s press office on firstname.lastname@example.org. Save SaveAdd to Compare
TDSi are pleased to introduce stand alone keypads to TDSi’s product portfolio offering the most simple access control set up via a single reader/controller. TDSI's stand alone reader feature single mounting of both reader and ACU in one single unit, reducing installation time and cabling costs. Vandal resistant, both products are also vandal resistant and tamper proof, with an IP65 rated housing to allow for internal and external installation. Furthermore, the backlit keypad enables the reader to be used day or night, further increasing the range of potential applications for this versatile reader/controller. For single door installations in almost any location, TDSi’s stand alone readers provide the ideal solution in one tidy unit, available in either mullion or square variations.Add to Compare
TDSi offers a wide choice of proximity and MIFARE readers through its EXprox² proximity and EXsmart² MIFARE product ranges.Each range is available with or without keypads, providing users with a number of options: PIN only; card only or PIN and card operation. When specified with a keypad, the readers deliver additional ‘have and know' security, whereby the user must both present their card and validate it with their unique PIN before access is granted.Each keypad reader is supplied with a tactile, blue-backlit key pad and both a light grey and graphite-coloured cover, which simply clips on for ease of installation. All units are fully encapsulated making them suitable for both indoor and outdoor use, with maximum protection from both water and dust ingress, and the keypad itself follows DDA compatibility conventions - with a ‘pip' on key number 5.Featuring both Magnetic Clock and Data and 26-bit Wiegand outputs, the readers allow the read in/ read out functionality of TDSi's MICROgarde controller to be realised on both doors.To aid both speed and ease of installation, each reader, whether specified with or without a keypad, now has a square form factor, making them suitable for fitting into a standard electrical (MK) back box. As a result, housings may be sunk and pre-wired with the reader unit itself fitted as and when required.Stock of the new readers is now available; for more information, contact TDSi's sales support team on +44 (0) 1202 724 999 or visit www.tdsi.co.uk.Add to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
Integrated security manufacturer TDSi is pleased to announce the appointment of Zara Taylor as Marketing Manager. Zara, who is based at the company’s global headquarters in Poole, Dorset, is overseeing the company’s ongoing and rapidly expanding digital and marketing strategies. TDSi’s Managing Director, John Davies commented, “We’re excited at the prospect of seeing Zara’s skills being put to work, as we take our marketing activity to the next level with a good dose of Millennial thinking and knowhow. Zara’s knowledge of the digital and social landscape will add fresh impetus to our marketing drive, as we bring new products out of our development pipeline and augment our sales channel strategies, both at home and abroad. I know that Zara will have a positive impact on our activities, and I’m delighted she’s now a part of the team.” Marketing industry experience Zara has worked in the marketing industry for three years for a variety of different industries Having graduated from the University of Northampton in 2017 with a First-Class BA in Fashion Marketing, Zara has worked in the marketing industry for three years for a variety of different industries including: hospitality, automotive, fashion, and now security. Commenting on her appointment, Zara stated, “I am very excited to be leading TDSi’s continued vanguard into the digital world, which is a vital part of the security industry’s continued growth and evolution. Security needs are universal across all industries and our customers and potential customers operate across all vertical sectors, so it is vital that we continue to deliver relevant and exciting messaging to all these audiences through all digital channels.” Embracing digital channels Zara adds, “We have many exciting developments taking place at TDSi which we will be unveiling over the coming months and into 2021, and I look forward to being a key part of this. As we all settle into the new normal, TDSi will be further embracing digital channels, as well as meeting our customers and partners at UK and International events, to showcase our solutions for an ever-evolving security world.” Alongside her marketing career, Zara likes to stay active and regularly plays netball (social distancing rules permitting!) and is currently training for a planned ultra-marathon in 2021. “It will be 100km, and I sometimes think I must be mad! But setting yourself exciting goals, working through any challenges, and achieving them, is just as important in your life as it is in your career. I am delighted to be part of the TDSi team, which shares this approach to being the best you can be.”
Integrated security manufacturer TDSi is proud to announce the launch of the new and enhanced version of its GARDiS security software, Version 2.0. Among the upgrades, GARDiS 2.0 features new Fire Door release and Site Lock Down functions, along with integration with ASSA ABLOY Aperio and SimonsVoss SmartIntego wireless locks. GARDiS 2.0 software TDSi’s Managing Director, John Davies commented, “We are excited to unveil the new version of our Software as a Service (SaaS) GARDiS software. GARDiS 2.0 software builds upon the foundations of the original version that was enhanced last year, but now features a single-installation web browser-based application that is fully modular and scalable.” “It is also simple to commission and use, with a highly intuitive GUI which reduces training, support and installation time, all of which make it perfect for the new normal world we now live in.” Compatible with TDSi controllers GARDiS 2.0 is designed for use when an end user is moving from a single site using individual GARDiS controllers GARDiS 2.0 is designed for use when an end user is moving from a single site using individual GARDiS controllers (with embedded Web Server software) to upgrade to a project of over 44 doors and/or for multiple sites. It is also fully compatible with all TDSi’s controllers (including the newest GARDiS controllers, along with MG and EX series), ensuring these hardware elements can be fully integrated after the software upgrade. Versions and licensing options There are two versions and licensing options for the GARDiS 2.0 software, Express and PRO. The Express option is free of charge and enables the inclusion of 20 doors at one site for one organization. The PRO option starts with the same basis as the Express version but enables the end user to add as many additional door licenses as required. Additional site and organization licenses are also available, along with an IP Lock Service license (then a license for each individual ASSA ABLOY Aperio or SimonsVoss SmartIntego lock/device). Fire Door Release and Door Lockdown features Additionally, GARDiS 2.0 PRO features two options designed to deal with emergencies. Fire Door Release enables the end user to configure an instant input to unlock configured doors, while Door Lockdown instantly locks selected doors to prevent entry (which is particularly useful in protecting people and property in schools, colleges and universities). For even greater flexibility, GARDiS 2.0 PRO also features a REST API (‘Fusion’) option and full Software Development Kit (SDK), enabling it to be fully integrated with a wide variety of Video Management (VMS), Time & Attendance or third party control systems. Flexibility of deployment and pricing John adds, “GARDiS 2.0 is a game-changer in terms of complete flexibility of deployment and pricing. End users can purchase fully integrated security for as big or small a project as they need, with rapid scaling to suit quickly evolving and changing circumstances.” He further stated, “It is also perfect for security integrators looking to offer their customers a highly bespoke solution with minimal installation time to do so. By taking a SaaS approach we are offering a complete choice of options, enabling security operators to buy exactly the solution they require, from single doors on one site, to hundreds or thousands of doors over multiple sites.”
Should security spending be a one-time capital expense or as an ongoing operating expense? At first glance, the question appears to be an accounting issue with little impact on the actual equipment or systems involved. However, as security professionals seek to cost-justify new systems, the question may be central to providing the “best security for the money” and a system that fits the company’s continuing needs. We asked this week’s Expert Panel Roundtable: Should security be a capital expense (CAPEX) or an operating expense (OPEX)? Is the trend shifting and what is the impact?
Related white papers
5 Reasons To Integrate Mobile Technology Into Your Security Solution
11 Considerations For Embedded System RFID Readers
RFID and Smartphone Readers in Physical Access Control
Cyber Security and High Security in a Business Integrated WorldDownload
Market Report: Cannabis At A GlanceDownload
Physical Access Control In Higher EducationDownload
Nedap Solutions Provide Vehicle Access To Employees And Long-Term Tenants At Business Park In Saudi Arabia
- WLS Installs Electronic Safety And Security Systems At The Hudson Office Building
- Nedap Solutions Provide Vehicle Access To Employees And Long-Term Tenants At Business Park In Saudi Arabia
- Idesco Access Control Chosen By RYS In Integration At Residential Building In Slovakia
- Idesco Transparent Readers Secure Site And Equipment Access At Construction Sites