ACT 433 Long Range Receiver & Transmitters Integrate Gate Entry/barrier Control Into Existing Access Control Systems
ACT 433 Long Range Receiver & Transmitters Integrate Gate Entry/barrier Control Into Existing Access Control Systems

The ACT 433 from Access Control Technology (ACT) Ltd., delivers gate entry or barrier control within a new or existing access control solution. It can be integrated into the ACTpro access control solution or any 37 bit Wiegand or clock and data system. The ACT 433 range of products includes a receiver and two long range transmitters, one of which has a built in proximity. Receivers from 3rd party manufacturers, such as Prastel receivers supplied by ACT, can also be read by the ACT 433 receiver making it feasible to upgrade existing systems to the ACT 433 solution by simply changing the receiver.   As the ACT 433 can be easily integrated into an existing access control system, such as ACTpro or ACTsmart2, the administration of tags, for gate entry or barrier control, becomes a much simpler, manageable and secure process than is the norm. Lost, stolen or obsolete tags can be removed from the system immediately, through the use of the ACT developed ACTWin pro or ACTSmart software. Entry will be denied to anyone trying to gain access using such a tag.      Allocation of car park spaces in a shared car park can also be managed by the ACT 433 working in conjunction with the ACTWin software. User groups can be set up and a maximum number of spaces can be allocated to each group. When the spaces allocated to a group have been filled access will not be granted until a group member leaves. The ACT 433 products are not limited in terms of their functionality. As well as the popular integration of gate entry or barrier control into an existing access control system they can also be used for the activation of external lighting and the operation of motorised roller shutters, blinds or awnings. Unlike many similar products on the market the ACT 433 Receiver has an IP67 rating making it suitable for outdoor as well as indoor installation. With an attractive, polycarbonate housing it can be surface or flush mounted. The long range transmitters (ACT 433TX and ACT 433TXprox) have a read range of up to 50 metres, site dependent. With built in proximity the ACT 433TXprox can be used to gain entry at a door secured by an access control reader.      

Add to Compare
ACTsmart2 1070PM (Panel Mount Proximity Reader / Controller) For The ACTsmart2 Range
ACTsmart2 1070PM (Panel Mount Proximity Reader / Controller) For The ACTsmart2 Range

The ACTsmart2 1070PM is a panel mount proximity card reader / controller. It can be mounted on a single gang electrical back box using the ACT PM Flush Plate or it can be mounted into an ACTentry V-IP or suitable third party audio video door entry system. The unit will operate standalone or as part of an ACTsmart2 system (master slave or networked).FeaturesProximity reader / controller 1,000 users Standalone / master slave / networkable Programmable inputs/outputs: push to exit, door monitoring / door contact, door alarm (ajar / forced), fire alarm override, interlock Tamper output 5 amp, 30 Volt DC relay Smartlock option for added security Robust polycarbonate front plate and potted electronics Indoor / outdoor (IP67) Panel mount Mounts on standard single gang electrical back box with ACT PM Flush Plate Mounts into ACTentry V-IP and other industry standard audio video panels Can be programmed using      - a programming card (standalone)      - the master keypad (master slave)      - ACTWin smart software (network)The ACTsmart2 range has established itself as a popular choice for access control in small to medium sized commercial properties.  The ACTsmart2 also provides an ideal solution for gate entry / barrier control when used in conjunction with the ACT 433RX long-range receiver.  Its popularity is driven by its power, low cost and flexibility as well as its proven quality and reliability.In addition to the ACTsmart2 1070PM the ACTsmart2 range has pin and proximity and pin only reader / controllers.  These can handle up to 1,000 users (500 for pin and proximity option.  The ACTsmart2 readers operate with the ACTProx RFID cards and fobs however a HID compatible version is also available.

Add to Compare

Access control readers - Expert commentary

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

The Growth Of The Mobile Access Card Market In 2020
The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.

Entrance Control Vs Access Control: Similarities And Differences
Entrance Control Vs Access Control: Similarities And Differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Latest Vanderbilt Industries news

Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village
Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village

Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based solution, but also offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. API Integration In addition to DCLT’s security requirement, OLS also realized ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. Game-changer security solution According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. Cloud-based off-premise solution The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively. Commenting on the project, Oliver (Ollie) Law, Managing Director of Oliver Law Security (OLS) Ltd., stated “We didn’t hesitate to recommend the Vanderbilt ACT365 system. As a Vanderbilt Gold Integration Partner, this is our go-to product, and for Doncaster Culture and Leisure Trust, the flexibility and scalability of the product was best placed to grow with their business.” He adds, “We are fully committed to working and growing with Vanderbilt, and we look forward to other projects of this nature in the future.”

Wisenet WAVE Integrated With ACT Enterprise To Combine Video Surveillance And Access Control
Wisenet WAVE Integrated With ACT Enterprise To Combine Video Surveillance And Access Control

The integration developed between Vanderbilt’s ACT Enterprise access control software platform and Hanwha Techwin’s Wisenet WAVE video management software (VMS), means operators are now able to instantly visually verify access control activity and events directly from ACT Enterprise. ACT Enterprise is a role-based software platform which streamlines the monitoring and management of ACTpro access control systems comprising web-enabled door controller interfaces and MiFare and/or DESfire card readers. The integration removes the need for control room operators to use two separate software platforms to visually verify access control events. Instead, operators are able to conveniently view live streams or recorded video associated with a door, directly in ACT Enterprise. Wisenet WAVE If, for example, a door has been forced open, an operator can simply right-click on the event listed in ACT Enterprise, to immediately replay the relevant recorded video made available by Wisenet WAVE. With an auto-discover feature which enables connected cameras and third-party IP network devices to be addressed and set up in just minutes, Wisenet WAVE makes it almost effortless to monitor high-definition video streams. Wisenet video surveillance and ACT Enterprise systems are increasingly being specified for the same projects" Key features include a virtual PTZ which, with just a click of the mouse, enables operators to zoom in to see close-up detail of any suspicious activity. The latest version of WAVE, 4.1, also features push notifications of user defined alarm events which can be sent to mobile devices. Support for Wisenet AI cameras allows the attributes of classified objects or people to be forensically searched by filtering recorded metadata. Technology partnership “Wisenet video surveillance and ACT Enterprise systems are increasingly being specified for the same projects. With this in mind, we have worked closely with the Vanderbilt team to ensure our respective solutions seamlessly interact,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “This is an excellent example of two global market leaders cooperating to ensure our mutual customers are able to efficiently and conveniently obtain maximum value from their investment in a security solution.” Access control event Commenting on the success of the integration, Michael Moyna, Senior Product Manager at Vanderbilt, stated: “This integration makes for a more precise examination of the video system concerning the access control event. It also removes the operator's need to visit the control room to retrieve the footage, as it can be viewed directly within ACT Enterprise instead. This, of course, delivers an added layer of convenience to the system’s users.”

Vanderbilt Announces The Release Of ACT Enterprise 2.14 Software Providing Integration With KONE
Vanderbilt Announces The Release Of ACT Enterprise 2.14 Software Providing Integration With KONE

Vanderbilt, a provider of state-of-the-art security systems, announces the release of ACT Enterprise 2.14. ACT Enterprise is the company’s award-winning access control software that has a wealth of features and integrations. The latest additions in version 2.14 include extended integration with KONE and new video integration with Hanwha. The software has also added contact traceability reporting to its suite of tools. For instance, thanks to contact traceability reporting, users of ACT Enterprise can now successfully track potentially close contact cases within their building, including doors they may have interacted with. Tracking international travelers Commenting on the new feature, Alex Holmström, Global Sales Director at Vanderbilt, states: “This feature will help businesses create a safer and cleaner environment for their staff. System users can now remotely monitor their office from anywhere in the world, including tracking international travelers to their site.” ACT Enterprise 2.14 also sees additional benefits added to the software’s existing integration with KONE. By supporting KONE's latest API calls, it allows for a much faster install time compared with traditional hardwired input and outputs. Instead, ACT Enterprise and KONE software communicate at an API level. This optimizes the KONE system by having an efficient throughput within the building. Hardwired elevator control The big benefit, certainly for large buildings, is that it allows for a large increase in footfall" Michael Moyna, Senior Product Manager at Vanderbilt, explains in more detail: “The benefits of KONE integration are twofold. It makes the installation and integration of KONE and ACT much more straightforward because there is no cabling required as with traditional hardwired elevator control since the ACT software talks directly to the KONE server via the KONE API.” “The big benefit, certainly for large buildings, is that it allows for a large increase in footfall through the elevator system. This means you can prioritize elevators and make them work efficiently. For example, during morning rush hour, the elevator can be configured for optimal utilization to ensure effective throughput.” Lastly, a new release in this version is video integration with Hanwha’s Wisenet WAVE system and Dahua. These video additions complement an already rich set of integrations that include Milestones 3XLogic and Hikvision. Access control event ACT Enterprise users can play live video or recorded video associated with a door through these video integrations. Moyna expands on the value of this: “If an event happened last week where a door was forced open, the operator can right-click on the event in ACT Enterprise and simply replay the video recording from the Hanwha Wisenet WAVE system.” “This makes for a more precise examination of the video system concerning the access control event. It also removes the operator's need to visit the control room to retrieve the footage as it can be viewed directly within ACT Enterprise instead. This, of course, delivers an added layer of convenience to the system’s users,” he concludes.

Related white papers

Physical Access Control In Higher Education

5 Reasons To Integrate Mobile Technology Into Your Security Solution

11 Considerations For Embedded System RFID Readers