Traka Intelligent, keyless, electronic lockers
Traka Intelligent, keyless, electronic lockers

Managing assets effectively helps businesses to run more smoothly and increases efficiency - knowing where equipment is located; controlling who has access; saving time at shift start up - all combine to make a powerful business case.  At the same, time damage and losses are reduced because users have an increased sense of ownership and accountability;  wasted administration time in resolving issues is eliminated and this helps to reduce demands on your staff, so they can concentrate on profitable work - it also makes important equipment more available to those who really need it, 24/7. Who uses our intelligent lockers? Traka intelligent lockers are used in a number of Government offices, Airports, Police, Distribution Centres, Power Stations and a range of commercial organisations to manage a diverse range of equipment - anything from tools and specialist equipment to data communications and portable computing equipment.  Hospitals use Traka for managing access to a special variant of our intelligent lockers so that only authorised staff can gain access to controlled drugs and Police use them to control and restrict access to crime scene evidence and confiscated property, thus ensuring that it is not tampered with. In reality, organisations use Traka intelligent lockers because they want to ensure that only authorised, competent and trained staff can gain access to valuable or dangerous equipment - both for security and compliance reasons. What type of equipment do they hold? As an example, Traka intelligent lockers can be used to house and control access to pooled or shared equipment and portable assets such as: Airwave and security radios Controlled drugs Arm mounted data terminals Breathalyzers Police evidence Mobile phones Laptops Specialist tools

Add to Compare
LG IrisAccess® 3000 Iris Recognition System
LG IrisAccess® 3000 Iris Recognition System

Adding iris recognition to a security environment doesn't have to mean getting rid of everything you've invested in to date - LG IrisAccess® 3000 complements token or PIN-based system to provide a high integrity security overlay that boosts ROI and security efficacy of the security systems already in place.Even partial measures can add a whole new dimension to your security - most companies want improved security to safeguard both human and physical assets.  But this should not entail a costly overhaul -  LG IrisAccess 3000 integrates easily with standard security infrastructure with Wiegand or serial output, and runs on MS SQL and Oracle databases.  Up to 128 portals can be controlled off one host.  It works in one-to-many search mode, or in 1 to 1 verification mode with many PIN and token-based systems, including a variety of smart-card formats.  Ideal application for data centres, laboratories, and other sensitive areas - information gathering is key to any enterprise and ensuring proprietary data on your company, your customers and your competition remains confidential is critical.  Laboratories - clean environments need a security system which can provide super security despite protective gear, gloves and goggles - and LG IrisAccess 3000 delivers just thatMore accurate, faster, more stable than any other biometric - LG IrisAccess 3000 draws from a feature-rich iris to capture an image (it's just a picture) that digitises 240 degrees of freedom to produce a small 512-byte template to deliver real-time authentication accuracy that is unmatched.  System enrolment is simple and fast - authentication even faster... - a proximity-activated, voice-prompted, mirror-assisted interface makes for easy enrolment and use.  Enrolment takes less than 2 minutes.  Authentication less than two seconds.  Eyeglasses/contact lenses present no problem for use. TCP/IP compatible, networkable, and expandable with built-in countermeasures and other security features - LG IrisAccess 3000 has integration flexibility and addresses special operational security concerns in ways no other security system - biometric or otherwise - can match.    

Add to Compare
LG IrisAccess 4000 - The Iris Recognition System That's A Generation Ahead Of The Rest
LG IrisAccess 4000 - The Iris Recognition System That's A Generation Ahead Of The Rest

LG IrisAccess 4000 is the third generation of the world's number one deployed iris recognition platform.  Offering increased application versatility and integration flexibility, enrolment and recognition is easier than ever.  Intuitive visual user interface enables users to quickly position themselves for enrolment or recognition as images of both eyes are captured virtually simultaneously.  Audio prompts improve speed of enrolment and recognition performance while motor-driven auto-tilt mechanism makes adjusting the camera for proper height a simple ‘one touch of a finger' proposition.  What's more, every model of the IrisAccess 4000 contains a camera supported by dedicated illumination that makes badging for credentialing a snap.When it comes to multi-factor authentication, IrisAccess 4000 is extraordinarily flexible.  iCAM4000 and iCAM4100 with optional device-embedded SmartCard readers from the world's leading card reader producers give IrisAccess the ability to function with HID iCLASS, DESFire, and MiFARE and CAC-compliant cards.  When a reader is present, a card icon placed on the casing indicates where the card should be placed for fast verification.  Card reader-equipped models of iCAM4000 and iCAM4100 are designated with a 10 suffix, so become 4010 and 4110 respectively.Multifactor authentication can also be delivered by the 16-element keypad that comes standard on the iCAM4100 unit.  The authentication options afforded by being able to configure iris authentication by left, right, either or both eyes plus a smartcard token, and in the case of the iCAM4100, a keypad, are simply unmatched by any other iris recognition offering on the market.iCAM4000/4010iCAM4000/4010 is compact, low profile and designed with architectural aesthetics in mind. It's kiosk-configurable, and can be flush or recessed mounted.  An iCAM4010-- with an embedded SmartCard reader provides more than multi-factor authentication.  Information residing on the card enhances human factors performance to prompt correct setting of the imager to an individual user's height.  An option that will prompt the card to trigger language for audio prompts, will make the system ideal for use in a multi-ethnic milieu, or in countries with more than one official language. iCAM4100/4110 The iCAM4100/4110(SmartCard-equipped, as described above) includes a keypad accepting up to 10 digit PINs affording an additional level of two-factor authentication.  Every iCAM4100 incorporates a 40-character LCD, making possible communication regarding authentication status.  It also fits well in human resource management applications, as upon identity authentication, keypad and display afford a means to exchange information about payroll, vacation days, shift-work, or other HR data etc.System Security FeaturesIrisAccess delivers security features and performance that set it apart from other iris recognition and most other biometric systems.  Safe storage, for example, means no biometric templates are stored on any external system components.  Experts concede that countermeasures built into LG IrisAccess set the standard for the industry and note in this area, many other biometric systems leave much to be desired. Security is also a key driver when it comes to software.  The LG iData software line for access control and a tool kit for building identity-dependent applications provides FIPS compliant encryption, and offers other alternatives, as well as PKI. Other System ComponentsIrisAccess 4000 System incorporates other system-designed elements.  A low profile IdentityController(ICU) offers easy greater integration convenience while ensuring that biometric templates are kept safe, protected and secure, off the imager.  The DoorController(DCU) is also available for use in stand-alone access control applications.The Advantage of Iris RecognitionThe physical or behavioural characteristics on which biometrics are based afford a more reliable basis for authentication than other easily compromised identity options relying on something one knows or carries.  There are more measurable characteristics in the iris, the visible coloured ring around the pupil, than in other biometrics.  Every human iris is unique.  Compared to other biometrics, iris recognition is the most accurate, fastest, and scalable option.  Iris patterns are also very stable. Barring trauma, an iris pattern will not change over time as characteristic measurements of finger, hand, voice or faces do.

Add to Compare
Honeywell Expands Popular Access Control Family
Honeywell Expands Popular Access Control Family

Honeywell has introduced a new version of its popular NetAXS web-based access control panel ideal for small installations. The new NetAXS™ 2-door web-based control panel provides all the security of an access control system with the convenience of managing it via a web browser. The panel allows users to protect as few as two doors and add more panels as needs change. In addition, the new NetAXS 2-door control panel can be used in conjunction with current NetAXS 4-door panel solutions to meet any access control requirements that customers may have. By combining the 2-door and 4-door solutions over any Ethernet network, users now have a powerful choice that can fit almost any application.NetAXS is quick and easy to install and offers a cost-effective alternative to traditional PC-based systems because it allows end users to easily customize the level of security and functionality based on their needs. The system's built-in web server allows end users to manage the system anywhere an Internet connection is available or alternatively by connecting a laptop directly to the panel's Ethernet port. The web browser allows a customer to run reports, monitor events and alarms, and add and remove users. This flexibility is ideal for remote activity such as facility check-in, managed access and manual override of doors or time zones. With no PC software to install, customers who choose the web interface have no worries about operating system compatibility, virus attacks or other computer issues such as hard drive crashes or system lock-ups.The NetAXS 2-door control panel can also be added to most installations that use Honeywell's WIN-PAK® access control system and offers additional benefits over Honeywell's traditional N-1000 control panels including on-board Ethernet, an expandable footprint, larger memory capacity and faster processing."With the addition of this new panel to the NetAXS family, we can offer an access control solution for any size facility," said René von Franquemont, access control product marketing manager for Honeywell Systems Group EMEA. "This new panel is a strong addition to our access control offering. Its basic functionality provides greater flexibility in cost-effective security system design to answer the needs of our value-driven customers. The installer-friendly features and the intuitive browser-based interface enable NetAXS to be confidently installed by all, including those new to access control."Download NetAXS™ End User Flyer PDF

Add to Compare

Browse Access control systems & kits

Access control systems & kits - Expert commentary

Physical Access Control: Critical Steps To Ensure A Smarter Future
Physical Access Control: Critical Steps To Ensure A Smarter Future

Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalization bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformation While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment. Yet, with more organizations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximize the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge. Improved access control in smart environments These urban constructs are capable of reducing waste, driving efficiencies and optimising resources The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimizing resources and increasing citizen engagement. Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. Frictionless access control During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity. Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimizing the risk of infection, by removing the need to touch shared surfaces. Such systems can be customized and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful. Barriers to adoption Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Many are now beginning to realize that connected network-enabled solutions are here to stay Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space. Time will not stand still, and many are now beginning to realize that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature. The importance of cyber hygiene Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks. Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT). While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited. Cyber security considerations Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognized cyber security principles, incident reporting and best practices. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security. The future of access control There is a natural dispensation towards purchasing low-cost solutions There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organizations by their association. The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world. Cyber security key to keeping businesses safe In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies. As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor. The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.

Automatic Gates – The Latest Development In Access Control
Automatic Gates – The Latest Development In Access Control

Automatic gates remain an increasingly popular security choice for family homes, business premises or public buildings – anywhere that full control over access is needed. While there is much to consider for installers when advising clients on the right solution for their property, from the size, weight and cost of a gate system, it’s useful to be aware of the latest developments in the market, as this can help to find the right option to fit their needs. The need for speed Gates can be automated to either swing or to slide open, and there are many factors to take into consideration, when advising on which option to use. However, swing gate motors tend to be slower than the speeds achievable for sliding gates, which means the latter are usually more popular, especially for commercial sites where timing can be among the more important factors. One of the most recent developments in the sliding gates market is the introduction of faster motors One of the most recent developments in the sliding gates market is the introduction of faster motors, such as those from Bft Automation, which allow for opening and closing at a quicker speed than has previously been achievable. Fast authorized access control From a security point of view, the ability to allow people and goods in and out of a property at a quicker pace reduces the risk of unauthorized entry, while waiting for a gate to close – an important consideration in both commercial and residential contexts. Other benefits of a faster motor include reduced waiting times. This can be particularly useful for properties in busy areas, where a vehicle could risk blocking traffic, while waiting to turn into a site controlled by a slower gate. Faster motors Also, a faster motor could potentially reduce the risk of an accident from vehicles entering a property at speed. For example, this might happen if someone was making their first visit to a property situated off a fast road in an unfamiliar area. Beyond these practical considerations, in today’s fast-paced world, people aren’t as used to having to wait for things and this applies to the time it takes to get in and out of their own property. So, security benefits aside, faster motors are likely to be more appealing for clients who have sliding gates fitted to their domestic property and who prioritize convenience. The choice of which of the new faster motors to use will be impacted by a number of factors, including the weight of the gates. Essentially, the lighter the gate is the higher the speed achievable. And, as always, it’s important to make sure that any installation complies with safety regulations. Intelligent torque management systems A further development in access control technology includes intelligent torque management systems A further development in access control technology includes intelligent torque management systems, which update the level of torque required to perform the gate’s operation, allowing it to work at the optimum level, regardless of weather conditions, temperature or the degree of wear and tear on the device. Depending on the typical weather conditions experienced at the site and the anticipated frequency of use, it’s worth looking at options that take these factors into account. Importance of security rights In some scenarios, it’s important for particular individuals to have security rights. In which case, there are motors available that come with personalized keys, which are unique, providing an additional level of security. Installers often face the challenge of fitting gate motors in confined spaces, potentially making for a time consuming and technically demanding task. Available space When you only have a small space to work with, simple details can go a long way to helping you. For example, by putting the fastening screws on the front of a motor’s casing, installation and maintenance are easier and more convenient, even in particularly compact areas. Working with suppliers that offer more than just a manual means you’ll have access to advice and support on how new products work in practice and what you need to consider before advising on an installation.

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

Related white papers

School Security Moves to the Cloud

Wireless Access Control eBook

Four Areas to Consider in Frictionless Access Control