Paxton’s Amazing Designer Readers And Great Customer Service Wow Visitors At IFSEC 2010
Paxton’s Amazing Designer Readers And Great Customer Service Wow Visitors At IFSEC 2010

IFSEC 2010 was a great success for the Paxton team. The UK's market leading access control manufacturer showcased a range of product innovations to the delight of visitors to their stand. Trish Bambury, Brand Manager at Paxton said: "It was a great exhibition for Paxton, with both new and existing customers enthusiastic about our products and service. We are already looking forward to next year!" The real highlight of the show was Paxton's fantastic LCD reader, which wowed delegates with its sleek, modern LCD screen. The reader, that displays different images when a token is presented and access is granted or denied, was a hit with security professionals. Visitors were keen to discuss different ideas for the reader and suggest new images to upload to the LCD screen - it really got people talking. The busy Paxton stand, situated in Hall 5, offered a warm welcome to all visitors. The bright, open plan layout really stood out against competitors' stands and got an excellent response from IFSEC 2010 attendees. Paxton's professional and friendly team also received some great positive feedback on the unwavering levels of care and support they offer to installers and customers alike. Their fantastic UK technical support, free installer training and five year, no quibble product guarantee are just some of the things that keep their clients coming back time and time again. One visitor said: "As usual I was given excellent service from Paxton. The team are knowledgeable and patient and they gave me the answers that I needed."

Add to Compare
A Hands Free System From Paxton Access Guarantees Site Security And Complete Usability
A Hands Free System From Paxton Access Guarantees Site Security And Complete Usability

Hands free access control means that the token used to identify a user is read from within their pocket or handbag etc.  This means an authorized user can open a door without having to present their token.  It's particularly useful for gates/barriers, loading doors and where disabled or elderly people require access.  Compatible with Switch2 and Net2 Incredibly easy to installMinimal additional equipment (1 x hands free interface per door & hands free tokens)Retrofit capabilitiesMinimal on-site disturbanceInstalling a Paxton Access hands free system is easy due to the innovative hands free interface and associated technology.  The interface increases read ranges significantly without the hassle of installing door or ground loops as required by other systems.  Because the interface is wired in series between a reader and a control unit it doesn't require its own power supply.Hands free tokens are available in two types: hands free keyfobs and hands free keycards.  Both tokens are fitted with PROXIMITY chips that allow them to be used as close proximity tokens too.  The keycard also has a booster facility that enables automatic gates to be activated from up to 50m away.  Hands free applications:Convenience: unhindered movement is desirable in itself.Car parks: Drivers can activate automatic barriers from the comfort of their car. Regulatory: Conform to regulations as laid out in the Disability Discrimination Act.Security: Doors no longer need to be propped open in factories/warehouses where moving stock around hinders swiping tokens.Hygiene: Reduce the risk of cross contamination in food/beverage production areas, pharmaceutical companies and hospitals etc.

Add to Compare

Access control readers - Expert commentary

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

The Growth Of The Mobile Access Card Market In 2020
The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Entrance Control Vs Access Control: Similarities And Differences
Entrance Control Vs Access Control: Similarities And Differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Latest Paxton Access Limited news

Paxton Introduces Net2 Checkpoint Control To Mitigate Virus Transmission And Safeguard Employees And Visitors
Paxton Introduces Net2 Checkpoint Control To Mitigate Virus Transmission And Safeguard Employees And Visitors

Paxton’s longstanding access control system, Net2, receives its latest software update. The highly anticipated new feature, Checkpoint Control, supports COVID-secure sites. This additional functionality helps Net2 users protect employees and visitors by monitoring and approving people as they enter buildings. Throughout the first half of 2020 the creation of Checkpoint Control was underway, along with the unforeseen global spread of the coronavirus COVID-19. During this time lockdown and social distancing restrictions in many countries heightened the need for the update to be rolled out globally, in a timely fashion. Since then Paxton’s Development team has worked tirelessly preparing the release alongside other vital COVID-secure Net2 updates. Thermal scanning hardware Paxton’s U.S. Senior Product Manager Jeremy Allison said: “At Paxton, people are at the heart of everything we do and this year our focus is bringing people back to work safely. Following on from the successful introduction of Occupancy Management, we are introducing Checkpoint Control. Designed to help businesses ensure their COVID-secure guidelines are being followed before staff enter a site.” Designed to help businesses ensure their COVID-secure guidelines are being followed before staff enter a site" The Checkpoint Control functionality follows on from Paxton’s successful introduction of Net2 Occupancy Management and integration with thermal scanning hardware. Both were released for Net2 in July 2020. These features work simply and seamlessly together to reduce the risk of spreading COVID-19 around populated buildings. Temporary access levels Jeremy Allison further explains “Net2 Checkpoint Control allows a site to assign temporary access levels to one or more users that will remain in place until they have either been manually validated or badged through a specific door. This allows Net2 system administrators to ensure all staff and visitors pass through a designated checkpoint at a frequency that can be configured to suit the business requirements." "It also offers the flexibility to split staff between multiple checkpoints to help maintain social distancing and not overrun an area”. Access permissions feature Checkpoint Control works in just two simple steps: Step 1: System Setup Specific doors or areas of a building are designated as checkpoints, such as the main entrance or reception. End users are then given access to that checkpoint using their normal access token, with the limited access point managed via the access permissions feature within the Net2 software. Step 2: A manual or automated verification takes place to validate further site access Access can be verified manually in person or by using technology to support automated validation. The automated process works by identifying a person via their access credentials, which can then be followed by a thermal scan to further increase protection against the spread of Coronavirus. Once identity, and where relevant, an individual’s health and well-being has been approved, the checkpoint will validate and grant further building access. Virtual traffic lights Paxton has produced an on-demand webinar called the definitive guide to COVID-secure buildings Net2 v6.05 also includes new functionality to further enhance the Net2 Occupancy Management feature. New virtual traffic lights can be used on screens to indicate occupancy levels with no need for integrated traffic light hardware. This will further support social distancing by informing the end user of whether the current occupancy of the area they are about to enter is safe for them to do so, working alongside Checkpoint Control to reduce bottlenecks and overcrowding. Occupancy Management override is also included in this new update. Should there be an emergency, this functionality allows selected people to enter an area that is at capacity, such as a first aider or senior manager. Checkpoint Control and the new additions to Occupancy Management functionality are available exclusively with Net2 Pro software. In conjunction with the updates, Paxton has produced an on-demand webinar called the definitive guide to COVID-secure buildings. This is an ideal starting point for installers looking to understand more about social distancing and COVID-secure guidelines.

Ecl-ips Announces The Acquisition Of Alarm Specialist Security Group To Provide Comprehensive Services To Their Clients
Ecl-ips Announces The Acquisition Of Alarm Specialist Security Group To Provide Comprehensive Services To Their Clients

Security and monitoring firm Ecl-ips, has bought Bristol-based alarms specialist, Security Group, to expand its services to clients. Ecl-ips is a CCTV and access control system designer and installer based in Worcestershire which has always strived to offer clients the most advanced solutions it can. Its current preferred partners are Avigilon, part of Motorola Solutions, for CCTV and Paxton, for access control. Meanwhile, Security Group specializes in designing, installing, maintaining and repairing intruder alarms. With Security Group’s expertise in alarms Ecl-ips will be able to offer clients a comprehensive security and safeguarding solution. Security Group has been a family run firm since 1996 and has provided its services to private individuals, the public sector and businesses throughout the south-west of England. Intruder alarm system Like Ecl-ips, Security Group has built up a reputation for the quality and professionalism of its services. Each intruder alarm system that Security Group installs is certified to BS EN50131, BS 8243 and PS6662 standards. This gives added peace of mind since they comply to National Police Chiefs Council (NPCC) policy and meet the requirements of the Security Systems and Alarms Inspection Board (SSAIB). Both companies have fully trained and security screened engineers. While Security Group is SSAIB registered, Ecl-ips is NSI-Gold approved thus providing all their customers with confidence in their services.

Ecl-ips Monitoring Firm Introduces A Range Of COVID-19 Back To Work Solutions To Currently Re-opening Businesses
Ecl-ips Monitoring Firm Introduces A Range Of COVID-19 Back To Work Solutions To Currently Re-opening Businesses

Midlands-based firm, Ecl-ips, is using its expertise in providing monitoring, CCTV and access control, to offer organizations a range of back to work solutions to keep customers, visitors and staff safe as the company continue to mitigate the risks from COVID-19. Occupancy Management Solutions With more businesses opening up Ecl-ips can help occupancy counting to ensure social distancing is maintained. Ecl-ips can offer Avigilon’s occupancy counting feature, as part of its video management software and Avigilon Cloud Services (ACS). Through the use of advanced technology, the occupancy counting feature provides an easy and streamlined way to count and identify the number of people in a building. Ecl-ips can also offer Paxton’s access control system Net2. Paxton has added an occupancy management feature to the software. This allows employers or facilities managers to limit the number of people in any given area of their building; either barring access or sending an email/text to the manager when a space nears capacity. It will work across multiple areas of a site and can be set to operate a one in, one out system to support social distancing measures. Remote Access Control Ecl-ips is now able to offer an upgrade of the Net2 software which Paxton unveiled in May. This expanded the ability of facility managers to manage access to buildings remotely reducing the physical contact required for people to enter and leave those buildings but still maintaining their security. This followed the launch of web-based version of Net2 and its Paxton Connect app which meant this software is available wherever the users are. Face Mask and Face Covering Detection The wearing of face coverings is now compulsory in the UK for users of public transports and face masks are either mandatory or strongly advised for staff in a number of workplaces. Additionally, the wearing of face coverings is advised in shops and other indoor places. Avigilon has developed technology to detect if there are breaches in rules associated with the wearing of face masks or coverings. This can provide an alert so security staff or managers and Ecl-ips can customize this solution to provide an audible warning to those committing any breaches of rules. Social Distancing Guidelines Support In its latest software release scheduled for this month Avigilon’s most advanced cameras will identify breaches of social distancing guidance and again this can provide an audible warning. The technology can also demonstrate to those managing commercial spaces or other buildings like schools or healthcare settings where there are potential bottlenecks and so social distancing will be difficult. This will allow managers to make changes within the buildings, for example, by only allowing people to walk in one direction through a corridor to reduce the numbers having to be in close proximity to each other. Contact Tracing Capability Meanwhile, Ecl-ips is also a specialist in Avigilon’s access control system. This can be used with Avigilon’s CCTV system to assist with contact tracing if employees are found to need to isolate after showing symptoms of COVID-19. This is because of the advanced technology providing a record of staff accessing buildings and being able to correlate to video footage of staff on CCTV. Thermal scanning Some organizations are using thermal scanning as part of their solution for opening up businesses by detecting staff or visitors that may have raised temperatures and require health screening. Paxton has made improvements to Net2 to allow installers to integrate the system with thermal scanners more easily. Ecl-ips can also offer thermographic cameras and advise if they are the right solution for the customer. Aaron Kernaghan, Managing Director of Ecl-ips, said, “Ecl-ips is a well-established CCTV, access control and monitoring firm. We are ensuring that we are operating in a COVID-19 secure manner and are keen to assist organizations get back to work safely.”

Related white papers

5 Reasons To Integrate Mobile Technology Into Your Security Solution

11 Considerations For Embedded System RFID Readers

RFID and Smartphone Readers in Physical Access Control