Traka Access control systems & kits(23)
Successfully track multiple users and locations instantly with Traka's RFID locker system. Through secure storage and unique RFID tagging capabilities, organizations can strategically manage and control various equipment and important assets. The system simply requires the user to identify oneself by entering a 4-digit PIN, swiping a company magnetic ID card or using their fingerprint if the biometrics reader access is specified. The software will verify the user’s identity and permit access to the lockers and its contents accordingly. Keeping all the data centralized, Traka’s RFID system runs through an ‘advanced locker administration mode,’ which can be controlled from one networked server. In addition to advanced recalibration settings, automatic door features and text and email options for activity notifications, Traka’s lockers can also encompass the following problem-solving abilities: Control and restrict user access to each specific device based on a skill level or need-to-have basis Automatic lock-in for equipment that needs to maintained or updated Ensure that housed devices have had adequate time to recharge since previous use Issue devices on a last-in, last-out basis Determine liability when equipment is returned by someone other than the person of original point of access Capabilities to raise an alert on any item which is not returned on time and automatically send notification to appropriate supervisorAdd to Compare
Who's targeting your data? Traka is the leading worldwide specialist in intelligent key and asset management solutions. They manufacture secure systems that allow you to control and audit who has access to your valuable assets – keeping them out of the wrong hands. Traka’s rack manager is an intelligent solution that allows you to restrict rack access to authorized users only. Furthermore, it allows you to maintain a full audit of who has accessed which rack, and when. How easy is it to access your data racks? Traka’s rack manager provides a secure solution to ensuring access is available 24/7 to authorized users only. Who had access to your data racks? Rack manager has full audit capabilities and retains a complete history of all user transactions. Reports can be downloaded quickly and easily via a USB port. How does it work? The rack manager can be fully integrated with your current access control system. The interface to the system is a 7 inch touch sensitive pod, which uses the latest embedded processing technology. With the rack manager all access to data racks is managed via the touch screen pod. Each authorized user identifies themself at the pod (via Smart card, biometrics or PIN) and selects the rack they wish to access. Traka’s rack manager module can manage access to 60 racks/120 doors and drives the entrance and exit doors to server rooms with feedback from both doors and two locks.Add to Compare
Traka, a division of ASSA ABLOY presents the Traka Touch L Series intelligent touch screen key management system. Traka Touch is a standalone key management solution that operates independently of a company’s IT system via an embedded Windows software and SQL Server database. No server is required to maintain its database. The system is managed via the full color 7-inch multi-language touch screen on the front panel, from the initial administrative setup of users and keys to the management of day-to-day user access. As with conventional Traka systems the Touch gives the administrator control over the access levels for each particular user. To gain access to keys, users must identify themselves using a PIN code, swipe card or biometric recognition. LEDs indicate which keys a user can and can’t take when they access the cabinet. The Traka Touch provides a real time audit of all key transactions and the unit’s solid state memory can store up to 250,000 events. Administrators can view a report of all key usage and search for a key that is “out of system” via the touch screen. “The new Traka Touch is a secure, cost-effective means of ensuring that only authorized individuals have access to keys, while making them readily available to authorized users 24/7. It is not always feasible for organizations to allow access to IT infrastructures and networks and Traka Touch addresses this” said Robert Smith, Managing Director, Traka plc.Add to Compare
Managing assets effectively helps businesses to run more smoothly and increases efficiency - knowing where equipment is located; controlling who has access; saving time at shift start up - all combine to make a powerful business case. At the same, time damage and losses are reduced because users have an increased sense of ownership and accountability; wasted administration time in resolving issues is eliminated and this helps to reduce demands on your staff, so they can concentrate on profitable work - it also makes important equipment more available to those who really need it, 24/7. Who uses our intelligent lockers? Traka intelligent lockers are used in a number of Government offices, Airports, Police, Distribution Centres, Power Stations and a range of commercial organisations to manage a diverse range of equipment - anything from tools and specialist equipment to data communications and portable computing equipment. Hospitals use Traka for managing access to a special variant of our intelligent lockers so that only authorised staff can gain access to controlled drugs and Police use them to control and restrict access to crime scene evidence and confiscated property, thus ensuring that it is not tampered with. In reality, organisations use Traka intelligent lockers because they want to ensure that only authorised, competent and trained staff can gain access to valuable or dangerous equipment - both for security and compliance reasons. What type of equipment do they hold? As an example, Traka intelligent lockers can be used to house and control access to pooled or shared equipment and portable assets such as: Airwave and security radios Controlled drugs Arm mounted data terminals Breathalyzers Police evidence Mobile phones Laptops Specialist toolsAdd to Compare
Traka Touch is the newest addition to our range of integrated Key Management solutions, and it’s probably the most exciting development we’ve made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today. Put simply, when it comes to key management Traka Touch makes your life easier. It gives you an intelligent ‘out of the box’ Key Management solution which operates entirely independently of your IT systems. Everything is managed via the touch screen on the front panel, from the initial administrative set up of users and keys, right through to the day to day user access. What is Traka Touch? Traka Touch is a sophisticated Key Management system which has the intelligence built in. And because it’s a standalone solution, there’s no need for a connection to your IT network and no server requirement to manage the database. Everything you need is embedded in the unit, so all you have to do is plug it in. Full audit capability of all key transactions is retained within the system using internal solid state memory and memory card. Customer comment: “With Traka Touch we have been able to quickly and easily improve our Key Management at store level. We are planning to install a system at every one of our stores throughout the UK. It’s a brilliantly simple but effective solution which makes efficient key management incredibly straightforward for both staff and managers. What’s more, because it’s stand alone, it is easy to deploy locally without having to involve staff from the corporate IT team or head office” Traka Touch at a glance Traka Touch makes keys readily available, but to authorized users only. Gives you control over who can use your keys, with access levels designated for each particular user. Each user must identify themselves at the cabinet using either a PIN code or a magnetic swipe card, or by using biometric fingerprint recognition. To remove any ambiguity, LEDs indicate which keys a user can and can’t take when they access the cabinet. Searching for an ‘out of system’ key is easy and Traka will also indicate who took it and when. Reporting functions enable transaction reports to be displayed on the screen – for example so that you can quickly see who took a key and when it was returned. Great if you need to know who accessed the store room out of hours last Friday, or who was driving the white Transit two weeks ago! For printed reports, simply plug a USB memory stick into the unit and reports can be automatically exported ready for use on a PC. With its touch screen technology and embedded processing, Traka Touch gives you all the Key Management capability that you require, but without the need for any complex integration with your IT systems. Traka Touch is the newest addition to its range of integrated Key Management solutions, and it’s probably the most exciting development Traka made in years - incorporating a 7" touch sensitive screen and using the latest embedded-processing technology available in the market today.Add to Compare
Traka21 is a sophisticated stand-alone key management system which combines innovative RFID technology and robust design to provide small and medium sized businesses with the advanced management of 21 keys or keysets in an affordable plug and play unit. The Difference Between Key Issue & Key Management Traka21 authorises, secures and monitors all of your keys, automatically controlling and recording when a key is used and by whom – information which is made available either through the cabinet’s display or by export on a USB pen drive. Operation Stand-alone Plug & Play solution with advanced RFID technology Touchscreen interface PIN access to designated keys or keysets which are individually locked in place Keys are securely attached using special security seals Simple to configure through setup wizard No requirement for network connection or PC Concealed robust fixing points allow secure wall fixing Mains operated with optional battery backup Traka21 Key Features User, key and access rights administration Multilingual functionality Screen based audit trail and reporting capability or export via USB port 21 robust, long-life iFobs with security seals 21 locking receptors with LEDs Robust and compact aluminium & ABS housing with no exposed hinges or obvious access points Manual override and door release functions in case of emergency Audible alarmsAdd to Compare
Browse Access control systems & kits
Access control system products updated recently
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
As SIA’s 2020 Member of the Year, ASSA ABLOY’s presence at ISC West 2020 will include an enhanced booth experience, showcasing a suite of new product innovations that help security professionals create access in smart and efficient ways. “Security professionals are experiencing rapid industry change, which is why ASSA ABLOY is focused on educating customers about the latest curb-to-core solutions,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Opening Solutions America. “We intimately understand our customers’ challenges and have built a comprehensive suite of products and services that bring them smarter, simplified and intuitive solutions to help grow their businesses.” Providing Security and Access Control from Curb to Core ASSA ABLOY is a manufacturer that can provide doors, frames, mechanical and electronic access control to secure all of the openings in a myriad of facility types. Attendees will experience this broad range of solutions in a reimagined, user-friendly booth that highlights both individual products and complete, full-size door openings. Some of the latest innovations include: Building Envelope Adams Rite P8800 Pullman Rim Exit Device: This rim exit device is designed for narrow stile aluminum applications that require a life-safety exit device with a Pullman latching solution for use in retail storefronts, multi-use commercial offices, schools, medical centers and financial institutions. Norton 6300 Series Low Energy Operator: With a modular design and simple controls, this operator has a broad set of intelligent functions, such as power close, latch assist and obstruction detection to secure moderate to high traffic openings. Yale nexTouch Keypad Exit Trim: Ideal for commercial and multi-family environments, this exit trim provides the latest in keypad access with key-free convenience as an upgrade or retrofit solution. Interior Solutions Enhanced credential support across the Aperio family of wireless devices: Now offering support for mobile access via BLE (Bluetooth Low Energy) or NFC, the Aperio wireless solution provides complete flexibility for your mobile access deployments. Securitron AQL Power Series: This customizable, intelligent power supply system provides improved functionality and efficiency through remote monitoring, with the ability to power a single electrified door opening or hundreds of access points. Status Indicators: The new status indicator option for Corbin Russwin ML2000 Series and SARGENT 8200 Series mortise locks features a 180° window design providing optimized visibility for the locked/unlocked door status, enhancing the privacy and emergency preparedness needs of any facility. RITE Slide: This acoustically-rated, soft close sliding door has a modern aesthetic design, ideal for medical rooms, patient rooms, offices and hospitality. Specialty Solutions Ultra-Light UL8 Bullet Resistant Door: Using an ultra-lightweight patented core, this door is over 50% lighter than conventional bullet-resistant doors. Real-World installation The full-size door display features complete solutions, typical of what you might find in vertical markets like government, education, healthcare, retail, multi-family, deco, glass and more. These doorways offer a unique opportunity to witness a ‘real-world’ installation and understand the complexities of their interactions. ASSA ABLOY is again hosting their annual USO Bag Build. Attendees can stop by the booth on March 19 from 1- 4 p.m. to pack supplies for military personnel leaving for or returning from deployment, awaiting the arrival of their personal luggage. ASSA ABLOY’s sister companies will also be onsite, including HID Global (booth# 11063), Alarm Controls (booth# 9077), Ameristar (booth# 9073), Abloy Security (booth# 7055) Traka (booth# 7041), August Home / Yale (booth# 32081), and LifeSafety Power (booth 14115).
Traka is launching an electronic High-Capacity (HC) cabinet range at the UK Apartment Association (UKAA) Expo, designed to offer property management companies better security, management and visibility of critical keys. Visitors to the dedicated residential sector event, taking place on 13 February, will be the first to see live demonstrations of Traka’s powerful HC key management solutions. Presenting capability for control over a high volume of keys in a small footprint, the electronic cabinets present audit trail capability of every user and item transaction. Intuitive touchscreen interface Featuring an intuitive touchscreen interface, integrated into the front door panel for a fast and easy experience, authentication to operate Traka’s HC cabinets can be selected between fingerprint, PIN and access badge technology. An integrated camera can capture check-in and out attempts for additional security and accountability. A single misplaced or stolen key puts property, staff and residents at considerable risk" The cabinets operate with unlabelled SmartFob technology and can be specified to achieve bespoke operational requirements, being paired with a comprehensive suite of administrative tools and detailed reporting via Traka’s specialist browser-based software. Intelligent key management solution Lee Payne, Market Development Manager for Traka, says, “Property managers face unique challenges in managing a high volume of keys for housing units, facilities control and common areas. A single misplaced or stolen key puts property, staff and residents at considerable risk.” “UKAA is a really exciting opportunity for Traka to demonstrate our ability to understand these issues and introduce our intelligent key management solution that can better secure, manage and audit the keys that are critical to everyday operations in residential housing. We’re looking forward to meeting visitors on our stand and discussing requirements for a total solution for the property management industry.” Traka’s HC Cabinets are available in three different sizes, with a capability to manage over 500 keys in a single cabinet.
Traka, from ASSA ABLOY Global Solutions, has integrated with Maxxess’ award-winning security management software, eFusion, to present users with a powerful route to achieving operational efficiencies across a wide range of systems and functions. Complete site control Traka, in conjunction with Maxxess Systems, has developed a seamless integration with Maxxess’ eFusion open platform, to allow complete site control, centralize site visibility and present real-time monitoring, ensuring situational awareness for all assets, safely and securely. eFusion with Traka makes it simple for authorized staff to gain access to a wide range of controlled assets, from keys and premises to high value equipment, vehicles and machinery. The new integration enables full traceability and audit reports that can include video and audio recordings, as well as transactional data from systems such as access control, intruder, HR and fire. eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems" Integration with third party systems Martin Woodhouse, Traka Head of Asia Pacific, Middle East, India and Africa (APACMEA), “Maxxess is one of the foremost global innovators within the security industry, its eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems. Now together with Traka, we can deliver a significant futureproof technology that paves the way for users to benefit from one all-encompassing building control system.” “The power of this new integration brings together Traka’s intelligent key and equipment management systems with eFusion’s flexible cloud architecture, developing a solution that will deliver exciting advances in security and operational efficiency.” “It will not only benefit major new build projects, but also open new opportunities for existing users of eFusion and Traka. We look forward to building on this exciting partnership with Maxxess, which we jointly believe continues to deliver real benefits to our valued customers.” Audit capabilities across key cabinets and lockers As with all Traka solutions, the integration with Maxxess’ eFusion presents audit capabilities across its key cabinets and lockers, and enables instant traceability and reporting. Other important features include fault logging, curfews and multiple authorizations, which provide tangible returns on investment by improving operational efficiency, increasing productivity and minimizing costly down time. Integration with eFusion opens the way for more powerful joint opportunities" Lee Copland, Managing Director, Maxxess EMEA adds, “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with many third-party systems - this integration with eFusion opens the way for more powerful joint opportunities to be developed.” “There are huge benefits to be gained from integrating Traka’s capability with wider functions and operations, including building management systems, security, fire and the many application-specific systems used by our customers in different sectors.” To see Traka’s integration with Maxxess eFusion in action, one can visit Traka in hall 2, stand G20 at Intersec Dubai, taking place at Dubai’s International Convention and Exhibition Centre from 19 - 21 January 2020.
Related white papers
3 Reasons To Migrate To A New Access Control System
Mobile Access- What You Need To Know (Part 1)
5 Steps To Finding The Right Access Control System For You
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals
BCD Announces BCD Illinois Build Centers To Operate To Support And Provide For Critical Infrastructure And Essential Services
- ExtraHop Helps Wizards Of The Coast Deliver Frictionless Security With Reveal(x) Cloud
- BCD Announces BCD Illinois Build Centers To Operate To Support And Provide For Critical Infrastructure And Essential Services
- Singapore RiverGate Condominium Switches From Analog System To Hikvision’s Two Wire IP Video Intercom System
- Redline And Air Partner Launch New Product, Air Partner Protect To Safeguard Customers Against Global Coronavirus Outbreak