Browse Access Controllers

Access control controllers - Expert commentary

Key-Centric Access Management System: Providing The Highest Possible Levels Of Security
Key-Centric Access Management System: Providing The Highest Possible Levels Of Security

In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximize benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realize the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronized to the management terminal. Remote authorized unlocking With the key-centric access management system, remote authorized unlocking can be realized Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorized unlocking can be realized. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.

The Benefits Of Installing High Security Doors
The Benefits Of Installing High Security Doors

Whenever you say the word “security” in today’s world of digitalization and technology, minds immediately jump to online security. Encryption, passwords, and website security are all common areas of concern for today’s security teams – so much so that we often pass over physical security installations entirely. But we shouldn’t, because contrary to popular belief, security doors aren’t just for banks and safes. High-security doors are deployed and used across everything from home spaces to offices, venues, communal entrances, and more – offering an extra level of safety designed to keep unwanted guests out and keep the people inside safe. In this blog, we will be uncovering some of the benefits of installing high-security doors besides the obvious – offering a high level of security. Benefits of high-security doors When you start telling someone about high-security doors, they often immediately think of thick steel doors with unbreakable locks. But modern security doors are nothing like that, with the marketplace filled with different options including ventilated louvre doors, reinforced hammer glass doors, and classic metal doors. And with each style comes a different set of benefits. 1) High-security doors keep businesses and properties safe If anything is going to put burglars off and keep your inside space safe, it’s high-security doors. High-security doors not only help keep burglars away but also saves on the cost of investing in expensive home security systems With such a wide array of options on the market, from double or triple glazing through to top-level security doors for industrial properties and homes, customers can choose the weight of their door and its finish – meaning that they have a choice between making their high-security decision obvious or concealing it for the benefit of aesthetics. This not only helps keep burglars away from your home or office space and reduces the crime rate, but also saves on the cost of investing in expensive alarms and home security systems. 2) Dual purpose benefits from top-level manufacturers Modern high-security doors from retailers like Premier SSL not only provide industrial-strength but are also classed as fire doors – meaning that they keep people inside safe on two accounts. On top of that, high-security doors no longer look like the entrance to a bank – in fact, most manufacturers now work with materials that deliver an aesthetically pleasing finish that can complement your building or inside space. This means you can benefit from everything from a wood effect finish to a decorative trim and more. 3) Cut costs in Winter and Summer Managing bills at home often mean juggling the art of keeping the house cool enough in summer and warm enough in winter. On one hand, with high-security doors which are effective fire doors and are made to measure and tailored to your home, the heat and warm air inside your home are trapped inside during the winter to keep your home cozy. This helps to cut the cost of heating and ensures your family is protected during the winter months. Mesh layered security Meanwhile, for those who opt for the mesh layered security doors or Louvre doors, in summer you can keep your home or inside space cool and filled with fresh air even while the doors are closed and secured. This ensures adequate ventilation and is a popular choice with homeowners today as it cuts the cost of bills and expensive air conditioning and helps prevent issues like mold which can occur in damp spaces with little airflow. Louvre security doors also help to retain the same level of privacy as a solid door but with a high level of airflow – making them ideal for communal areas and spaces with a high footfall. 4) Keep pets and children safe A security door is enough to deter a burglar to keep your little ones and pets safe and contained inside the house A security door is enough to deter a burglar – so is certainly more than sufficient to keep your little ones and pets safe and contained inside the house. Preventing access to dangerous situations such as being outdoors on their own and entering the kitchen on their own is a benefit that many families revel in – with a range of options including the mesh-covered security doors to retain ventilation and natural light and create more of a homely feel. 5) Feeling safe and secure in your own space This one may seem obvious but it’s one of the biggest benefits – feeling safe even when on your own. Security doors mean that you can rest easy in your own space, in complete control of the locking mechanism and the entry of anyone besides yourself. Most of the security doors recognized by modern standards can withstand ballistics and crowbar tampering – even those with ventilation breaks. On top of that, they have a certain degree of water tightness and resistance to wind, meaning that they also keep you safe from home or building damage. 6) Versatility The vast array of security doors on the market right now means that versatility is possible – in the way that doors are locked, the way that they look, and the additional features they provide. Many of the high-security doors we and other retailers offer also provide complete sound ventilation and are ideally suited to everything from a modern new build to something more traditional in its feel and aesthetics. Uses of security doors High-security doors are a popular addition to modern homes and office spaces, as well as communal spaces and venues As previously touched on, security doors are no longer just for banks and high-security institutes. High-security doors are a popular addition to modern homes and office spaces, as well as communal spaces and venues. The versatility presented by the locking mechanism and access tools means that users can select everything from an entry fob to a code and a traditional key as a means of getting inside. The Takeaway High-security doors are an increasingly popular solution for nurturing safety both in commercial spaces and private homes. With options from solid steel doors to louver doors, triple and double glazed doors, and fire doors available on the market for every space and with made to measure manufacturing options, it has never been easier to equip your home against intruders and keep your family or work team safe and comfortable. Best of all for the modern homeowner, high-security doors no longer create an eyesore – instead, reflecting the same design aesthetic focus as you might expect from an interior company.

Wire-Free, Mobile First And Data Rich? The Future Of Access Control Is Within Almost Anyone’s Reach
Wire-Free, Mobile First And Data Rich? The Future Of Access Control Is Within Almost Anyone’s Reach

The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labor costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organizations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practise, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.

Latest Mercury Security, part of HID Global news

Genetec Broadens Its Access Control Offering For US Federal Government Customers
Genetec Broadens Its Access Control Offering For US Federal Government Customers

Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis™ access control system with the support of Veridt Stealth access control readers. Traditionally, the options for Federal Government organizations to replace a non-FICAM compliant system or to secure a new site were restricted to a limited choice of proprietary solutions. Because Security Center Synergis is a FICAM-approved open platform access control system, customers can choose from a range of non-proprietary choices to efficiently validate Personal Identity Verification (PIV, PIV-I, CAC, and TWIC) for federal employees and contractors. Cost-effective solutions “By bringing these new non-proprietary options to market with partners such as Veridt, HID, and Mercury, we are offering government customers a choice of simple-to-deploy and cost-effective solutions so that they can easily comply with FICAM requirements while leveraging the most robust and extensible software solution on the market,” said Justin Himelberger, Enterprise Systems Business Development Manager, Federal & DOD at Genetec. Access management solution Veridt Stealth Series™ readers provide a full complement of capability enabling identity and access management solutions for traditional and trusted PACS using PIV, TWIC, and CAC based credentials. This family of readers encompasses both biometric and non-biometric configurations while offering fixed, wireless, and mobile platforms. Veridt readers are well known for their compact design and operating capability in the harshest environments. Identifying federal standards “We are pleased to work with Genetec to offer our joint US-Federal market customers FICAM-compliant solutions that will enable them to comply with the most stringent access and identity federal standards as well as the flexibility to maintain and protect their investment for years to come,” said Bryce Lamers, Director of Sales and Marketing at Veridt.

HID Global Introduces The HID Aero Platform To Extend Their Portfolio Of Open Platform Controllers
HID Global Introduces The HID Aero Platform To Extend Their Portfolio Of Open Platform Controllers

HID Global, a worldwide provider of trusted identity solutions, announced that it has extended its open-architecture controller line with the introduction of HID Aero. Building on the proven success of its Mercury intelligent controller platform delivering total security beyond the door, HID Aero extends flexibility and access control choices to a wide range of businesses, while future-proofing an organization’s investment as requirements change. “HID Aero is providing features to a broader market that were generally available only in solutions for larger organizations, while eliminating the ongoing cost and complexity of designing, manufacturing and maintaining panel hardware at the same time,” said Stephen Carney, Vice President of Product Marketing, Physical Access Control Solutions with HID Global. Physical access control systems “It also brings end-to-end security to everyday applications with encrypted communication and threat detection, and its robust features to meet corporate compliance.” HID Aero platform controllers are backward compatible with HID VertX modules to simplify upgrades Built with openness in mind, HID’s controller portfolio delivers a nimble platform that provides original equipment manufacturers (OEMs), channel partners and end customers an array of solutions for deploying a broad range of physical access control systems. HID Aero platform controllers that fit in the same footprint as earlier HID VertX controllers and are backward compatible with HID VertX modules to simplify upgrades. Remote management capabilities The controllers include hardware, firmware, software and tools that speed development time, as well as host and controller authentication, and encryption to protect keys. HID Aero enables remote management capabilities with HID Signo and other HID readers supporting Open Supervised Device Protocol (OSDP), minimizing the need for field inspection and reconfiguration. Mercury LP Linux intelligent controllers and MR Series 3 SIO modules bring game-changing level of extensibility, flexibility and value to security and IT departments seeking to stay ahead of the vast changes in technology. The controller’s multi-device and third-party application integration capabilities enable easy integration of wireless locks and other devices, as well as destination control and dispatch, intelligent power supply analytics, FICAM authentication and numerous other advanced applications. Access control software Systems are highly configurable to dynamically enhance situational awareness Mercury MR Series 3 SIO modules are a diverse subset of controllers that are specifically dedicated to point control and monitoring as well as individual door oversight for system expansion of Mercury LP Linux controllers. The modules provide the flexibility to choose the controller configuration that best meets customer needs. With all controllers based on HID’s Mercury hardware platform, users can choose from a large variety of access control software providers over time without any re-investment in hardware. Systems are also easy to migrate to new software and highly configurable to dynamically enhance situational awareness. Access control requirements “With over 25 years in the market and used in more than four million panels shipped globally, HID’s Mercury open platform hardware addresses the full spectrum of access control requirements,” said Matt Barnette, Vice President of Global Accounts and Mercury, Physical Access Control Solutions with HID Global. “This ensures OEM partners, installers and end customers spanning virtually all vertical markets can select from a variety of controller solutions to meet their needs.”

Keep By Feenics Achieves FICAM Compliance And GSA Listing As Approved Access Control Credentialing Product
Keep By Feenics Achieves FICAM Compliance And GSA Listing As Approved Access Control Credentialing Product

Feenics has announced that its Keep by Feenics cloud-hosted access control platform is now certified and approved for government and federal agency use in Personal Identity Verification (PIV) credentialing and Physical Access Control Systems (PACS). FIPS 201-2 Evaluation Testing Feenics attained its listing on the GSA Approved Products List (APL) for all versions of Keep after completing the Federal Information Processing Standard (FIPS) 201-2 Evaluation (sometimes called FICAM) Testing Program. FIPS 201 was developed to satisfy the technical requirements of HSPD-12, the Department of Homeland Security’s mandated common identification standard and database for credentialing federal employees and contractors. After months-long testing, review and validation of the platform by third-party accredited testing lab CertiPath, both on-premise and cloud-hosted server applications of Keep satisfied requirements to become available for procurement by federal entities and listed on the GSA Schedule. Cloud Smart strategy “As the government targets the acceleration of cloud-hosted deployments through its Cloud Smart strategy, Feenics has effectively opened new channels of business for its value-added resellers and integrators”, said Chris Smith, who leads Federal Government efforts at Feenics. This certification affirms the Keep proof of concept as a secure platform for federal government applications “Keep was validated against a rigorous, comprehensive set of functional requirements derived from government-wide specifications”, said Smith, adding that more than 300 tests were conducted in an installed simulation at CertiPath facilities. ‘Keep Access Control as a Service’ software “This certification affirms the Keep proof of concept as a secure platform for federal government applications”, Smith further stated, adding “To maintain this status, Keep Access Control as a Service (ACaaS) software will undergo ongoing evaluation of new and updated versions”. “There’s a cloud-first mentality across U.S. government agencies that will help reduce the carbon footprint of hardware, while improving efficiencies with real-time updates, redundancies and lower maintenance costs”, said Paul Di Peso, Feenics Executive Vice President, adding “Receiving our FIPS 201 approval and attaining our APL validates the direction of access control in this vertical market.” Integration with Mercury Security controller DiPeso said the government is heading rapidly in the direction of increased cloud implementation, especially as new IT modernization initiatives emerge. He said “We believe we can be a major asset to the government’s push to cloud adoption”. Keep software integrates directly with the authentic Mercury Security controller Keep software integrates directly with the authentic Mercury Security controller that authenticates the PIV credential, rather than a separate communication module, further reducing the installed hardware footprint. Enterprise-enabled access control solutions “As the cloud and serverless environment proliferates in the government space, there’s a move to lessen reliance of onsite hardware”, said Matt Barnette, President of Mercury Security. “Having enterprize-enabled access control solutions like Feenics using HID’s pivCLASS solution via Mercury’s LP4502 controller brings additional applications to installers and customers alike”. (Feenics is a Platinum Partner to Mercury Security, an HID company.) Feenics continues to fortify its position as an ACaaS pioneer, certified as an International Organization for Standardization ISO 9001:2015 Company. In addition, the company recently received a 2020 Platinum Govies Award from Security Today in the Access Control Software/Controllers category.

Related white papers

School Security Moves to the Cloud

Cloud-based Access Control And Occupancy Management To Safeguard Workplaces

Wireless Access Control eBook