Vanderbilt’s ACTpro 1500 PoE Ultra controllers were launched in March 2019. What Is It? The ACTpro 1500 is a single door IP Controller and includes a dual-port Ethernet switch. The controller supports 60,000 users and includes a rich set of advanced features, including voltage monitoring and break glass monitoring. These controllers are ideal for a single door system or systems that need to grow up to 4,000 doors. How Does It Work? The PoE Ultra hardware in the controllers ensures support for all power requirements. This includes local door accessories and components such as card readers, door locks and request to exit buttons. PoE Ultra ensures that all of this is accomplished without the need for additional Power Supply Units (PSUs). Essentially, this saves the system user time and money. Moreover, as this is all powered over the Ethernet, it translates to less cabling and more convenience for installers too. Why Does It Matter? This is an important feature for installers because when a system is fast to install and more straightforward to set-up and quote, it removes the complexity from access control and allows installers to get more done, more efficiently, and in less time. This ultimately benefits their business and their bottom line.Add to Compare
The new DSC1500 portable beam barricade sets up quickly and temporarily to block vehicles and secure locations during short-term events and anywhere a beam barricade is needed for interim security. With a clear opening of 16 feet (4.8 m), the DSC1500 is M30 certified, able to stop a 15,000 pound (66.7 kN) vehicle going 30 mph (48 kph). Many organizations have the need for easy to install, temporary drop-arm barriers that can install within 10 minutes to transitorily close down a roadway to one or two lanes or block parking lot exits to deter thefts. Previous beam barriers had to be filled with sand, gravel or cement to be operable. To remove the DSC1500 from its temporary site, it is simply repacked in ten (10) minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves using manual hydraulics to raise and lower the barriers off their wheels. A self-deploying trailer with integrated lifting device facilitates rapid installation. The process is simply reversed when the event is over or the time comes to deploy the beam barrier at another location. From a purchasing standpoint, it can be easier to buy portable beam barricades than permanent solutions. The latter are oftentimes placed into an organization’s real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable beam barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department. For one time uses, a lease plan has been created where organizations can simply lease the portable barriers, use them, pack them up and return them. Delta always keeps an inventory for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. That’s because, in many cases, they are needed for events that come up quickly, such as emergency road or bridge construction or unexpected parking lot requirements.
Gallagher Command Centre is a powerful access and control solution designed to give you complete site control. Fully configurable to suit the unique needs of your site, Command Centre allows you to define, manage and report on all aspects of your system. Everything that happens on-site is relayed to your Command Centre operators in real time, enabling a swift and appropriate response to security threats. Seamless integration with complimentary security and site management solutions means Command Centre delivers on its promise. You’re in command. Command Centre v8 introduces new Site Plan functionality for greater situational awareness and responsiveness; Broadcast notifications to Mobile Connect for better communication in emergency situations; and Status and Overrides REST APIs for increased integration flexibility. To learn more about Gallagher Command Centre, please visit security.gallagher.com or contact your local Gallagher representative.
8 onboard zones 8 Areas, 2 partitions for each Area 3 programmable outputs, including 1 relay output, 2 MOS outputs Outputs operation follows system events, zone events, Area, Link events and timer schedule 100 users with 8 authority levels for users(Supervisor, Manager, Master, User, Temporary, Duress, Patrol and Technician) 1000 events log 8 independent timers for automatic control Up to 8 keypads (ARK30C) 1 case tamper and 1 leave-wall tamper supported Supports more than 11 zone types 7 sorts of zone terminations, including NO, NC, EOL, 2EOL, 3EOL, Interial type and Impulse type EOL resistance configurable (2K7, 4K7 or 6K8) Built-in 10/100M self-adaptive Ethernet interface 2 RS485 ports can be used to connect with keypads and other modules 3 telephone numbers for monitor station(PSTN), 8 numbers for vocal message, 8 numbers for SMS Combined with additional PSTN modules (ARA58-P) for dialing to the digital receiver in the CMS, transmitting CID protocol Combined with additional GPRS/GSM modules (ARA58-G-EN or ARA58-G-IT) to receive SMS notifications and remotely control, as well as receiving voice event messaging and remotely control by full voice menu guide Cellular backup in case of IP network failure with GPRS/GSM Modules App DMSS to push alarm message and remotely control Firmware upgrade with a PC using Alarm Config softwareAdd to Compare
Dahua Technology, a leading solution provider in the global video surveillance industry, has launched a new apartment outdoor station VTO9341D, providing new access control solutions to fence and lobby entrance with the cutting-edge face recognition technology. The apartment outdoor station elevates the safety and convenience of resident security system to a new level with the fashionable non-touch face-recognition entry, while conventional unlocking ways are preserved in case of emergency. The product’s working temperature is between -20°C to 60°C, meaning it can operate smoothly across a variety of weather conditions and geographical areas. With a shell made of aluminium alloy plate, it meets IP55 standard for water and dust resistance, and IK07 standard for impact resistance. Further enhanced by the Intrusion Prevention System, the product will offer ideal ingress protection to property owners and facilitate the work of security guards. Face Recognition Once a person steps into the 0.5-metre distance within VTO9341D that triggers its approaching induction, the 2MP CMOS image sensor will capture the face in high-definition colour image for identification. In as quick as 0.5 second, it can complete recognition and open the door for the residents. With strong capacity to store up to 20000 faces, the system would suffice the demand of large housing estates or commercial lots. The Auto Gain Control supplements white light to cope with poorly-lighted conditions, enabling night vision for the outdoor station. Multiple Unlocking Approaches VTO9341D is also equipped with Mifare Card reader, fingerprint recognition (with a memory of 3000 fingerprints), and touch screen key pad, which provide multiple unlocking approaches via card, fingerprint and password. Working together with VTS5240B Master Station that can forward image to mobile devices, owners can even enjoy the remote unlock function while away from home. Additionally, the audio system supports bidirectional talk, which assists visitors and owners in dual-way communication as an auxiliary to face identification. As a high-end product with unique features and full market potential, VTO9341D will benefit both Dahua dealers and system integrators. With DSS EXPRESS monitoring access control & other Dahua exclusive technologies, the apartment outdoor station would lower the time cost of integration and maintenance.
The H4 Video Intercom integrates a 3 MP camera with a high-performance intercom and features exceptional wide dynamic range, low-light, noise reduction and echo-cancelling technologies for clear viewing and two-way communication with visitors. Combined with Avigilon Control Center (ACC) video management software, this secured entry system enables operators to quickly and easily identify and communicate with a visitor before remotely granting access.
Complete access control and video management A browser and an internet connection are all that's required to access Vanderbilt’s latest addition to its cloud-based arsenal. ACT365 is a complete access control and video management solution. Ease of use and convenience are key ingredients to the product’s strength and depth in the field. ACT365 eases the installer's job for simple and quick installations and performing maintenance tasks remotely. The result is delivering ultimate control while saving time and money. With access to all sites from one online interface, installers can get more done, more easily, and in less time. Managing systems remotely Moreover, as ACT365 hardware is connected directly to the IP network, and no software needs to be installed as hosting is effectively outsourced, it ensures that the IT headaches of creating backups, VPNs, and port forwarding are things of the past. ACT365 also allows end-users the ability to manage their systems remotely including viewing live cameras. This remote monitoring capability makes it well-suited to multiple sectors. For example, dealing with early morning deliveries at a retail store is an ideal example of ACT365 in its prime. From the ACT365 app on their smartphone, the store manager can identify the courier through a live video feed and then remotely open the doors of the loading bay to allow the delivery to be made. The manager can monitor all of this remotely and once the delivery is finished, they can close the loading bay door and it will automatically rearm. Spotting misuse of gym membership Another instance of ACT365’s firepower can be seen at gyms or other types of membership clubs. If gym members are passing their access fobs to friends who are not members, ACT365 enables the gym manager to quickly match up access control events with relevant camera footage and email the clips to those members who are allowing their fobs to be misused. This is an effective way of ensuring the practice does not continue. As seen through numerous product demonstrations during IFSEC, ACT365’s features put the customer first. They eradicate once burdensome responsibilities that can now be promptly completed through the click of a button on mobile or desktop devices. Vanderbilt’s investment and innovation in cloud-based solutions harness the best efforts of the company’s core qualities – agility, adaptability, and dependability. Through the power of remote monitoring available from ACT365, Vanderbilt offers both installers and end-users convenience thorough simplicity.
SALTO's ProAccess SPACE web-based software brings a new level of powerful flexibility to access control so that users can order the functionalities that they most need and upgrade accordingly as a system and needs grow. And in addition to the abundance of important new functionalities, SPACE also has a modern interface that is more user-friendly to help users find and operate the functions they want to use as quickly and intuitively as possible.
Baran Advanced Technologies, manufacturer of the Everswitch access control products, introduces the Everswitch ATP2 family of products. It is another first from Everswitch: a fully sealed polycarbonate Piezo keypad with or without an integrated HID reader, either 125 KHz or 13.56 MHz. Inside the keypad is the same innovative patented Piezo technology that is used in the Everswitch rugged metal vandal-proof keypads. This design is fully weatherproof, IP68 dust & waterproof rated, and has no moving parts. The ATP2 comes with a variety of product features such as background illumination and choice of keypad color. The ATP2 operation temperature is from -4 F (-20 Celsius) and up to 167 F (75 Celsius). These keypads feature a single gang back plate.
CyberLock electronic cylinders are manufactured to the exact dimensions of the mechanical lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to traditional lock picking techniques. The cylinders are powered by CyberKey smart keys and require no power or wiring for installation. Electronic Cylinder Features Installs without power or wiring Contains a unique ID that cannot be changed or duplicated Has the ability to store over a thousand access events Key ID Date & Time Event Type Retains encrypted access codes that bind the lock to a specific system Contains a list of blocked keys Can be installed indoor or outdoor
The CyberKey Air is a programmable smart key that can be uploaded with key-holder schedules and permissions for accessing CyberLock electronic cylinders. The battery from the key energizes the electronics within a CyberLock cylinder allowing for locks to be installed virtually anywhere without power or wiring. The CyberKey Air is Wi-Fi enabled, allowing for wireless key programming of access schedules and permissions as well as real-time tracking and reporting of access events.
Successfully track multiple users and locations instantly with Traka's RFID locker system. Through secure storage and unique RFID tagging capabilities, organizations can strategically manage and control various equipment and important assets. The system simply requires the user to identify oneself by entering a 4-digit PIN, swiping a company magnetic ID card or using their fingerprint if the biometrics reader access is specified. The software will verify the user’s identity and permit access to the lockers and its contents accordingly. Keeping all the data centralized, Traka’s RFID system runs through an ‘advanced locker administration mode,’ which can be controlled from one networked server. In addition to advanced recalibration settings, automatic door features and text and email options for activity notifications, Traka’s lockers can also encompass the following problem-solving abilities: Control and restrict user access to each specific device based on a skill level or need-to-have basis Automatic lock-in for equipment that needs to maintained or updated Ensure that housed devices have had adequate time to recharge since previous use Issue devices on a last-in, last-out basis Determine liability when equipment is returned by someone other than the person of original point of access Capabilities to raise an alert on any item which is not returned on time and automatically send notification to appropriate supervisor
The Linear eMerge™ E3 Series browser-based Access Control platform sets new standards of excellence for reliability, ease-of-use, expandability, best-in-class value and lowest cost of ownership. For larger facilities, eMerge E3 Elite replaces PC-based systems with open architecture, solid-state hardware that is easier to install, integrate and use. Elite is available in the eMerge Elite-36 (for 36 doors/72 readers), Elite-64 Upgrade License (for 64 doors/128 readers), and Elite-128 Upgrade License (for 128 doors / 256 readers) Elite provides: Advanced access control features & capabilities Remote monitoring and management (via LAN, WAN, WWW, from a PC, laptop, or mobile device) A lower Total Cost of Ownership (TCO) compared with traditional systems Easy and low-cost expansion (up to 192 doors) via software key to the eMerge Enterprise system with higher capacities, enhanced features and capabilities Simple addition of video monitoring (with software key) for Digital Watchdog™ DVR (or, integrate an E3 system to an existing Digital Watchdog system) Check out the superior capabilities of E3 eMerge in action at www.linearcorp.com/e3emerge, or, contact Linear at (800) 421-1587.
Who's targeting your data? Traka is the leading worldwide specialist in intelligent key and asset management solutions. They manufacture secure systems that allow you to control and audit who has access to your valuable assets – keeping them out of the wrong hands. Traka’s rack manager is an intelligent solution that allows you to restrict rack access to authorized users only. Furthermore, it allows you to maintain a full audit of who has accessed which rack, and when. How easy is it to access your data racks? Traka’s rack manager provides a secure solution to ensuring access is available 24/7 to authorized users only. Who had access to your data racks? Rack manager has full audit capabilities and retains a complete history of all user transactions. Reports can be downloaded quickly and easily via a USB port. How does it work? The rack manager can be fully integrated with your current access control system. The interface to the system is a 7 inch touch sensitive pod, which uses the latest embedded processing technology. With the rack manager all access to data racks is managed via the touch screen pod. Each authorized user identifies themself at the pod (via Smart card, biometrics or PIN) and selects the rack they wish to access. Traka’s rack manager module can manage access to 60 racks/120 doors and drives the entrance and exit doors to server rooms with feedback from both doors and two locks.
The CyberLock electronic access control system offers a cost-effective turnkey solution for any entity seeking to increase security and key control. The CyberLock system is made up of electronic locks, programmable smart keys, and management software. Cylinders are installed without the need for power or hard-wiring which is ideal for securing remote and mobile assets. CyberKey smart keys feature a unique electronic ID, preventing key duplication. Keys are programmed for each user, detailing what locks it can open and when. CyberLock offers a variety of CyberKey smart keys for flexible key management including replaceable battery keys and rechargeable battery keys. The newest CyberKey, the CyberKey II, features a micro USB port that allows users to recharge the key from a computer, car charger, or any other compatible USB device.
Traditionally, an advanced access control system has consisted of several layers of hardware, with each layer comprised of multiple components. The LNL-2220 flattens this into a single layer, eliminating the separate controller layer entirely.The LNL-2220 revolutionises access control system architecture by allowing Ethernet connection directly from an entry location to the server. It provides the security, functionality, and modularity of Lenel's proven hardware platform, by combining an IP-enabled intelligent system controller with a full-featured, two-door reader interface module. It is a new class of device that makes access control simpler, more powerful and more reliable, and is the perfect solution to enable any reader to become an IP reader.Key features include:Native Ethernet for direct connection from its processor to the security LANUp to eight times the throughput of serial-to-Ethernet conversion used in previous generation devicesFaster downloads, a dramatic increase in performance, reduced installation time, and fewer connections-for greater reliabilityThe convenience of IP-to-the-edge with the security of dedicated reader wiring through the secure perimeterOn-board reader ports support D1/D0, Clock/Data, F2F, and the OSDP open standard for bi-directional communication with access readersComplete flexibility in choice of reader brand, technology and form factorBroadest support for biometric and smart card technologies in the industryDownstream RS-485 port connects up to 32 devices (64 doors), providing an inherent growth pathFault-tolerant, with the highest level of offline performance possibleAdd to Compare
HID Global®, trusted leader in solutions for the delivery of secure identity, recently announced the production release of its next generation EDGE EVO and VertX EVO™ controller platform that brings intelligence and decision-making to the door for advanced and highly customisable networked access control solutions. EDGE EVO and VertX EVO offer an open and scalable development platform for the deployment of a wide range of access control functionality, including remote management options, real-time monitoring, report generation and a powerful custom rules engine that enables the use of the system hardware for complimentary applications. Protecting the hardware investments of end user organizations, the new platform builds on the success of the company’s EDGE and VertX solutions and provides the most extensive access control architecture that delivers enhanced security features and superior performance with versatile installation and future upgrade options. According to ARC Advisory Group, the physical security and access control market is experiencing a major shift toward IP-based solutions. “End users want ease of operation,” said Joseph Gillespie, principal author of ARC Advisory’s December 2011 study, “Physical Security and Access Control Systems for Industry Worldwide Outlook. They also want security solutions that are easier to expand, customize, and integrate with other solutions. They want each part of the system to be optimized to work together, and to avoid integration and compatibility issues. With its latest EDGE EVO and VertX EVO solutions, HID Global has shown its commitment to this approach and as the result can now offer more intelligent and valuable solutions to end users.” The scalability of the EDGE EVO and VertX EVO controller platform enables a comprehensive range of future access control functions that are interoperable with wireless locks and deliver enhanced security, such as implementations of highly advanced access rules, keypad door commands and large-scale anti-passback. Additionally, VertX EVO controllers operate within the company’s Trusted Identity Platform® (TIP™). These components will enable this version and future revisions of the controller platform to operate with fully trusted connections from host to controller to reader, substantially increasing security options for access control systems of the future. “HID Global’s EDGE EVO and VertX EVO controller platform, including a Developer Tool Kit with OPIN application programming interface (API), offers expanded capacity and higher performance, demonstrating our commitment to providing open solutions based on direct feedback from our partners,” said John Fenske, vice president of product marketing with HID Global. “The state-of-the-art features in our next generation IP-enabled platform emphasize HID Global’s dedication to driving market innovation to efficiently manage identities for access control while also ensuring our customers optimize their Genuine HID investment.” EDGE EVO and VertX EVO platform components include: EDGE EVO Controllers, Reader/Controllers and IO Modules that enable higher security with an on-board encrypted Hi-O communication bus. EDGE EVO also broadens its worldwide usability of networked access control solutions with the addition of 12/24VDC lock support, mounting options and plug-and-play IO modules that extend IO at and behind the door. VertX EVO V1000 Controller and the V2000 Controller/Reader Interface solutions that expand cardholder capacity, decrease door transaction time and increase door uptime, while offering 100% plug-in compatibility with existing HID Global access control systems and associated V100, V200 and V300 downstream devices. A comprehensive Developer Tool Kit (DTK) for developing to OPIN API when migrating from first generation EDGE and VertX or for new development using the latest platform. The DTK is equipped pre-wired EDGE EVO Controller, VertX EVO V1000 and VertX interface boards and IO switchboard, as well as a full set of documentation.Add to Compare
Networkable, 1 doors/controller, 100,000 cardholders, Offline Capabilities, Networkable, TCP/IP Network Interface and RS-485 Interface, Universal / Wiegand Reader Interface, 12 V DC, 370 x 345 x 90, -20 ~ +65 C (-4 ~ +149 F), 10 ~ 90Add to Compare
Edge Solo is HID Global's new cost-effective, stand-alone, single-door IP-based access control solution. Its innovative product design is unique in the market for a number of reasons. Standing apart from other stand-alone readers on the market, the product allows users to retain their initial investment value over time, or as security requirements increase by upgrading to be part of a complete hosted system through the OPIN development partner program of Open Architecture solution providers. Edge Solo has a user-friendly, instructional web browser based environment, designed and focus-group tested for use in the "real world", allowing cardholder information, schedules and card assignment management through its intuitive user interface.Run through standard CAT 5/6 wiring and able to use PoE or external power supply, Edge simplifies installation while providing a low fixed cost per door. Bringing intelligence to the door, the flexible design includes an integrated iCLASS® reader or allows connection to any Wiegand or most clock and data readers.Edge Solo is part of HID Global's new Edge platform, a full line of flexible and configurable IP-enabled access control processor and host interface solutions, which also includes EdgeReader™ (with integrated iCLASS® reader) and EdgePlus™ (allowing connection to any Wiegand or most clock and data readers). A range of EdgePlus Solo and iCLASS kits are now available under single part numbers to reduce time and save customers' administration costs. Part # Description 83110 EdgePlus Solo and iCLASS R10 Reader Kit 83100 EdgePlus Solo and iCLASS R30 Reader Kit 83120 EdgePlus Solo and iCLASS R40 Reader Kit * 83125 EdgePlus Solo and iCLASS RP40 Reader Kit 83130 EdgePlus Solo and iCLASS RK40 Reader Kit *(Option for single fully integrated unit)Edge is a perfect solution for new building installations, as it is designed to provide complete and full-featured access control infrastructure and contactless smart card capability at "the edge" of the network for stand-alone or OEM software host systems. Edge products require less wiring and are IP addressable, which means they are cost-effective and are ideally suited for today's IT-centric security environment.Add to Compare
Browse Access Controllers
Access control controller products updated recently
Mercury Security LP4502 Intelligent Controller w/ Extended Applications (2 Rdrs, 8 Inputs, 4 Outputs)
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
OSDP Is The Strongest Access Control For Your BusinessDownload
Preparing Your Organization With Quality Situational AwarenessDownload
Is Your Access Control As Effective As You Think?Download
- Apstec Systems To Safeguard Palexpo Exhibition Centre With Its Human Security Radar System
- CriticalArc Safeguards Aston University By Providing SafeZone Solution For Students And Staff Safety
- IDF Aluminum Safeguards A Building In London’s Finsbury Square By Installing Alpro’s Transom Closers And Locks
- Interphone Safeguards Ardmore Construction Buildings By Installing Integrated Security Systems