TDSi’s New Facial Recognition Reader
TDSi’s New Facial Recognition Reader

TDSi, a global leader in access control systems for all sizes of businesses and organizations has launched its exciting new facial recognition reader.The new facial recognition reader is a highly secure, rapid and reliable method of controlling access to sensitive or restricted areas, without the need for traditional security cards or tokens. By doing away with identification tokens, user profiles can be added (or removed) quickly and efficiently with no additional costs once the system is installed. The system can easily be added to existing or planned security and surveillance systems to maximize return on investment.The reader can store up to 500 users and can verify a user in less than one second. It is also highly reliable, operating in virtually all light conditions and has a False Acceptance Rate (FAR) of less than 0.0001%, whilst maintaining stringent access control.TDSi Managing Director, John Davies comments: "Facial Recognition really raises the bar with regards to access control as it provides high levels of security whilst making the process simpler, faster and more convenient for the user. As with many of our products, facial recognition can be particularly useful as a specific part of a fully integrated security network."TDSi's facial recognition reader is perfect for enabling access to sensitive areas where specific users need a flexible and easy-to-use method of entry, such as a laboratory for example. Davies adds, "By adding a further layer of security to the mix an unauthorized person is far less likely to be able to gain access to highly secure areas, even if they have managed to pass through the perimeter security by the theft of a security card."For further details please visit TDSi's homepage. See the album with captions

Add to Compare
TDSi DIGIgarde PLUS Reader
TDSi DIGIgarde PLUS Reader

TDSi, a global leader in access control systems for all sizes of businesses and organizations will be attending IFSEC 2012 at the NEC Birmingham on the 14th to the 17th May, exhibiting in Hall 4 on stand G20. TDSi will be launching and demonstrating the latest update for its EXgarde PRO software suite, EXgarde 4.0, which now includes compatibility with Microsoft’s Active Directory, along with integration with Texecom’s Premier range of intruder alarm panels, to highlight to attendees the importance of integration in creating effective building management systems. The Texecom Integration Module allows true TCP/IP integration with TDSi’s EXgarde PRO 4.0 software suite to alarm specialist Texecom’s Premier range of Intruder Alarm panels.  The solution allows full integration of Texecom’s Premier range of panels to other serial based devices such as IP CCTV and TDSi’s VUgarde NVR, providing visual verification of Intruder Alarms through TDSi’s EXgarde PRO. This level of flexibility is one of the many reasons why TDSi’s Texecom Integration module has been nominated for the IFSEC International Security Awards 2012 in the Integrated Security Product of the year category. The integration provides enhanced control and offers numerous benefits, such as the ability to activate and deactivate specific panels across multiple sites, as well as individual zones of a building and the ability to monitor all Intruder Alarm events which appear in the EXgarde PRO Alarm Manager Events window. If an alarm is activated, CCTV can be triggered to deliver both a real time image and a customisable pre alarm condition recording to the control room.   The integration also means users benefit from a single point of administration with the ability to review a history of the intruder alarm events and also reduce the numbers of false alarms and the problems associated with this. The Texecom Integration module is just one of the new features available for the new EXgarde PRO 4.0 enhancing its pedigree as a fully featured access management PC software application that provides cutting-edge technology in a single user-interface. The access control software delivers powerful integration through a range of software tools and version 4.0 adds further additional benefits such as full compatibility with 64-bit operating systems and a flexible web-based reporting engine. John Davies, Managing Director of TDSi, comments: “We look forward to attending IFSEC again this year with a great stand and high quality products. We hope to raise awareness that integration between physical security and technology is essential and can be done with ease and efficiency.” The most recent hardware addition to TDSi’s hardware portfolio is a new three factor biometric reader. DIGIgarde PLUS is a multitasking reader that is compatible with fingerprints, cards and PINs. It provides added security should a specific entrance require it, offering access using a combination of secure methods. DIGIgarde PLUS is compatible with TDSi’s EXgarde PRO 4.0 software and popular MIFARE cards to give high levels of security and can be used in situations where hygiene or ease of access are essential. Its high speed matching algorithm provides maximum usability and its access control intelligence gives you the option to install the reader to control a single door or alternatively you can connect and integrate DIGIgarde PLUS into an access control system to provide real-time event monitoring and central system programming and control. DIGIgarde PLUS has a high resolution optical scanner, which provides reliable reading of fingers of all sizes. The IP65 rating means that the robust reader can be mounted internally or externally. The Time and Attendance functionality allows users to clock in and out using a single reader, which increases efficiency and ease of use. The built in MIFARE smart card reader allows the user’s template to be stored either on the card or in the reader, whilst the full white-on-black dot matrix LCD enhances feedback to the user and offers an intuitive local programming interface. Mike Sussman, Engineering and Operations Director for TDSI, will also be presenting a seminar on recent advances in Access Control and integrated systems, which is being held on the 15th May at IFSEC in the Next Generation CCTV and Surveillance Hall 5, from 12:30 to 13:15pm. Mike Sussman comments: “At present the Access Control industry is fairly stable in its use of technology but advances in the IP world, coupled with new credential requirements such as NFC and Biometrics are seeing the systems slowly evolving. This presentation will look at the changing technology that is being adopted in the Access Control arena, coupled with the movement towards increased integration that enables users to realize increased security and efficiency for today’s security operations teams.” For further information on TDSi and the new Texecom Integration please visit http://www.tdsi.co.uk/intruder_alert.html. For comment or an interview about the rising requirement for true integration in access control with John Davies, Managing Director, please contact TDSi’s press office on tdsi@mccint.com. Save Save

Add to Compare
TDSi EXprox2 And EXsmart2 Range Of Contactless Card Readers
TDSi EXprox2 And EXsmart2 Range Of Contactless Card Readers

TDSi offers a wide choice of proximity and MIFARE readers through its EXprox² proximity and EXsmart² MIFARE product ranges.Each range is available with or without keypads, providing users with a number of options: PIN only; card only or PIN and card operation. When specified with a keypad, the readers deliver additional ‘have and know' security, whereby the user must both present their card and validate it with their unique PIN before access is granted.Each keypad reader is supplied with a tactile, blue-backlit key pad and both a light grey and graphite-coloured cover, which simply clips on for ease of installation.  All units are fully encapsulated making them suitable for both indoor and outdoor use, with maximum protection from both water and dust ingress, and the keypad itself follows DDA compatibility conventions - with a ‘pip' on key number 5.Featuring both Magnetic Clock and Data and 26-bit Wiegand outputs, the readers allow the read in/ read out functionality of TDSi's MICROgarde controller to be realised on both doors.To aid both speed and ease of installation, each reader, whether specified with or without a keypad, now has a square form factor, making them suitable for fitting into a standard electrical (MK) back box.  As a result, housings may be sunk and pre-wired with the reader unit itself fitted as and when required.Stock of the new readers is now available; for more information, contact TDSi's sales support team on +44 (0) 1202 724 999 or visit www.tdsi.co.uk.

Add to Compare

Access control readers - Expert commentary

The Growth Of The Mobile Access Card Market In 2020
The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Entrance Control Vs Access Control: Similarities And Differences
Entrance Control Vs Access Control: Similarities And Differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Making The Shift From Manufacturer To Service Provider
Making The Shift From Manufacturer To Service Provider

The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be  highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.

Latest TDSi news

Which Technologies Will Disrupt The Security Industry In The Second Half Of 2020?
Which Technologies Will Disrupt The Security Industry In The Second Half Of 2020?

The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?

What Is The Role Of Manufacturers In Providing After Sales Support?
What Is The Role Of Manufacturers In Providing After Sales Support?

Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?

What Are The Security Challenges Of The Oil And Gas Market?
What Are The Security Challenges Of The Oil And Gas Market?

Protecting the oil and gas market is key to a thriving economy. The list of security challenges for oil and gas requires the best technology solutions our industry has to offer, from physical barriers to video systems to cybersecurity. We asked this week’s Expert Panel Roundtable: What are the security challenges of the oil and gas market?

Related white papers

RFID and Smartphone Readers in Physical Access Control

3 Reasons To Migrate To A New Access Control System

Mobile Access- What You Need To Know (Part 1)