Hirsch Electronics Access Controllers(20)
Standalone, 8 doors/controller, 4,000 cardholders, Offline Capabilities, Networkable, LAN, RS-485, RS-232, 8 alarm inputs, Universal / Wiegand Reader Interface, Dial-up Functionality, 115 ~ 230 V AC, 2.9 Amp, 559 x 510 x 159, 27,200, 0 ~ 60, 0 ~ 90Add to Compare
Standalone, 2 doors/controller, 4,000 cardholders, Offline Capabilities, Networkable, LAN, RS-485, RS-232, 2 alarm inputs, Universal / Wiegand Reader Interface, Dial-up Functionality, 115 ~ 230 V AC, 1.05 Amp, 457 x 387 x 140, 13,600, 0 ~ 60, 0 ~ 90Add to Compare
Standalone, 1 doors/controller, 4,000 cardholders, Offline Capabilities, Networkable, LAN, RS-485, RS-232, 3 alarm inputs, 3 alarm outputs, Universal / Wiegand Reader Interface, Dial-up Functionality, 115 ~ 230 V AC, 500 mA, 305 x 305 x 98, 8.17 kg, 0 ~ 60, 0 ~ 90Add to Compare
Standalone, 16 doors/controller, 4,000 cardholders, Offline Capabilities, Networkable, LAN, RS-485, RS-232, 16 alarm inputs, Universal / Wiegand Reader Interface, Dial-up Functionality, 115 ~ 230 V AC, 1.15 Amp, 457 x 387 x 14, 13,600, 0 ~ 60, 0 ~ 90Add to Compare
Standalone, 64 doors/controller, 4,000 cardholders, Offline Capabilities, Networkable, LAN, RS-485, RS-232, Universal / Wiegand Reader Interface, Dial-up Functionality, 90 ~ 130 V AC, 2.15 Amp, 559 x 510 x 159, 27,200, 0 ~ 60, 0 ~ 90Add to Compare
Browse Access Controllers
- Hirsch Electronics
Access control controller products updated recently
The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for mail and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing while obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc while sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for maneuver. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.
The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupants in any emergency requires preparation and clear communication. This is especially critical in a health crisis involving an infectious disease. These are some of the essential best practices that could help organizations reduce the impact on their employees and operations during this pandemic. 1. Use a visitor management system With a visitor management system, organizations have a single source of real-time and historical insights into who is, or was recently, in the workplace. This is especially important because of the need to perform contact tracing should anyone in the organization show symptoms of COVID-19, meaning everyone they have been in contact with needs to be contacted and asked to isolate. Yet still, first impressions are made at the front desk or lobby, where the visitor experience needs to be a positive one. At the same time, though, any emergency event requires that there be strict control over who is entering the workplace. This policy also needs to be clearly communicated to visitors. Doing this minimizes risk to visitors as well as the workforce. In addition to delivering a high-quality visitor experience, the ideal visitor management system must: Enable organizations to meet regulatory compliance mandates and facilitate check-in at a self-service kiosk to minimize wait times. Customize the visitor experience to support specific security needs, such as accelerating and simplifying check-in or requiring additional security pre-checks. Automate compliance as it relates to visitor access rules with historical visit reports. 2. Pre-check questions at visitor registration kiosks Organizations can strengthen security at the registration kiosk using a flexible, enterprise-grade visitor management system to add visitor sign-in steps. This has proven successful in the past when used to control the spread of infectious disease during an outbreak. An example of this is a U.S. children's hospital which managed to reduce facility infection rates by 25 percent over a two-year period using a commercial, off-the-shelf physical identity and access management (PIAM) solution from HID Global. The solution provides two particularly important capabilities that can be used by organizations to protect their workplace from the uncontrolled spread of an infectious disease: Enhance visitor registration policy with additional mandatory questions to help identify any visitors who may need other screenings. Extend the visitor registration kiosk with a mandatory pop-up asking further questions during visitor check-in. 3. Understand who has visited your workplace Successful controlling the spread of infection throughout a facility requires the ability to automatically maintain an auditable trail of activity. This can be done using an enterprise-grade visitor management system that makes it easy to retrieve historical visit reports. This provides a timeline of who was in the workplace, and when they were there. Key features include: A single dashboard providing useful visitor insights at your fingertips. Historical reports that provide visitor details including location and contact information, all in compliance with General Data Protection Regulation (GDPR) and other privacy regulations. 4. Clearly communicate how infection risks can be reduced Global organizations must actively communicate with visitors and employees on the outbreak of infectious diseases and follow best practices outlined by the World Health Organization (WHO). Here are several things organizations can do in this area to help maintain a safe and healthy workplace: Re-enforce and communicate WHO best practices with guideline posters in the front lobby and throughout the workplace. Add posters that also encourage regular and thorough washing of hands. Encourage everyone to cough or sneese into their shirt sleeve in their flexed elbow or cover their mouth and nose with a tissue. Encourage everyone to keep a relatively safe distance from each other and use alternatives to handshakes when saying hello. Organizations must contend with a variety of workplace challenges during the outbreak of an infectious disease. These challenges can be solved with best practices that include a comprehensive visitor management system that automates critical check-in policies and maintains an auditable trail of visitor activity.
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From Kindergartens to Colleges Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognizes outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customized solution Chubb Sicli’s quality, capability, and security expertise provided a customized solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
Identiv, Inc. has announced its cohesive collection of COVID-19 response solutions in order to support enterprises and government customers in worldwide offices that are now reopening. Identiv’s frictionless, touchless solutions create healthier and more hygienic offices. The hands-free technology also streamlines transactions and access, temperature tracking, and contact tracing to help employees and visitors feel safe and secure. Frictionless, hands-free technology “With the threat of COVID-19 still around us, frictionless, hands-free solutions are a key part of any organization’s efforts to make a healthier, safer environment,” said Steven Humphreys, Identiv Chief Executive Officer (CEO). Identiv’s highly secure access and identity solutions address multiple business needs to re-open and grow" Steven adds, “Identiv’s highly secure access and identity solutions address multiple needs for businesses to re-open and grow again in the new pandemic-era normal.” Quick, affordable temperature tracking “As large public venues begin to reopen, quick, affordable temperature tracking will be the first line of defense to assure visitors and employees that operators have their safety at top of mind,” added Dr. Manfred Mueller, Identiv Chief Operations Officer (COO) and General Manager, Identity. Dr. Mueller adds, “For those not yet comfortable returning to work, secure network log-in options facilitate a bridge between on-site and telecommuting teams.” Identiv’s complete portfolio of COVID-19 response solutions include: Smart, frictionless access control MobilisID uses the latest in Bluetooth and capacitive technologies to allow complete frictionless access, no touching required. The MobilisID App (available via Apple iOS and Android) acts as a physical credential — the user can keep their mobile device in their pocket, wave their hand near the MobilisID Reader and the door automatically unlocks. MobilisID can also integrate with ADA-compliant automatic door hardware to form a complete touchless solution. With the Freedom access control system, no reader is even required at the door. Freedom’s software-defined architecture uses the location of a user’s mobile device to determine their proximity to a door for hands-free ingress and egress. The system can also be used in parallel with conventional reader doors. Frictionless, battery-less uTrust UHF Credentials work with identification applications that require long-distance reading (i.e., more than 18 - 21 feet). Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. The credentials can be read through badge holders, handbags, pockets, and No-touch time and attendance uTrust 3721 F multi-technology smart card reader features multiple frequency options and a keyboard emulation. Perfect for employers who use a mixture of technologies for logical access, uTrust 3721 F leverages existing 125 kHz low-frequency (LF) or 13.56 MHz high-frequency (HF) cards. Out-of-the-box, uTrust 3721 F can work with most time and attendance systems, letting employees simply tap a card to the reader to clock in. Nearly hands-free transactions and access With Near Field Communication (NFC) technology, it’s easy to get near an access point without ever actually touching it. Identiv’s NFC-enabled solutions feature a catalog of transponders compatible with NFC Forum created for secure contactless transactions and connecting electronic devices with a simple tap-and-go model. Designed for comfort and wearability, the uTrust Proximity Wristband keeps wearers from reaching for their phone or card every time they need to gain access to a parking garage, building, room, or elevator. A passive radio frequency identification (RFID) device, the no-battery credential is robust, resistant to cracking, and impervious to moisture. Temperature tracking and contact tracing Identiv’s Body Temperature Measurement Patch is a wearable NFC-enabled transponder that supports the reopening of public spaces worldwide, including theme parks and stadiums, and helps operators keep attendees and employees comfortable, confident, and safe. The patch also supports global governments and healthcare workers that need to periodically monitor quarantined patients diagnosed with COVID-19. The new solution combines the simplicity of using NFC and the smart technology potential of the Internet of Things (IoT), making body temperature monitoring easier than ever. Identiv has partnered with Telaeris to deliver a rapidly deployable, industry-renowned, mobile access control hardware and software solution that provides security in a variety of mission-critical situations where traditional systems cannot be supported. By leveraging Telaeris’ mobile credential verification hardware, Hirsch Velocity Software-based access control systems can go beyond protecting the perimeter and empower security staff to authenticate and authorize users with photos from anywhere, at any time, with real-time server synchronization. Telaeris handheld units with HealthCheck functionality can prompt staff to ask a series of health questions and input the taken temperature of a validated user to create a ‘health/access check’ profile upon entering which can then be repeated upon exiting. If a person enters a building and is later found to be symptomatic, Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. While this is useful during the days of COVID-19, it can also be used for other applications, such as the seasonal influenza. This means every office can be proactive in responding to potential outbreaks, while simultaneously providing employees with the peace of mind that there are measures in place to keep them safe. Working from Home For some organizations, even as worldwide economies are restarting, employees continue to or are more comfortable working from home. Identiv’s smart card reader portfolio keeps work flowing while ensuring everyone’s data and health stays safe and secure. Top selections for secure network log-in while telecommuting include, uTrust Token Pro Mini Type A (smallest form factor, strong PKI, and Java Card technology, uTrust Token Pro Mini Type C (USB C and can feature user branding and applets), uTrust 2700R Contact (supports all PC operating systems and cards ICs), 0 USB (ultra-compact, CAC and PIV-approved, and available in USB C, uTrust 4701 F Dual Interface (combines contact, contactless, and NFC tech), and uTrust SmartFold SCR3500 A (USB A, ultra-compact, and CAC and PIV-approved). As the economy begins to open up and people around the world return to work, it’s critical to have solutions in place that keep employees and visitors feeling safe, comfortable, and confident.
Identiv, Inc. announced the availability of Hirsch Velocity Software with Contact Tracing. Available via download for Hirsch customers, the free feature has been launched to support worldwide office re-openings with improved health and safety management tools. Based on the Centers for Disease Control and Preventions’ (CDC) recommendations, contract tracing is a key strategy for preventing further spread of the novel coronavirus (COVID-19). Hirsch Velocity Software with Contact Tracing is a means of proactively and reactively protecting visitors. If a person enters a building and is later found to be symptomatic of an illness, Velocity can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. The feature is free, easy to download, and simple to implement into existing Velocity physical access control system (PACS) platforms. Manage access control While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza" “While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza,” said Mark Allen, Identiv GM, Premises. “This means your office can be proactive in responding to potential outbreaks, while simultaneously providing your employees with the peace of mind that there are measures in place to keep them safe.” Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry-level packages. Velocity is an integrated platform that manages access control and security operations in thousands of different facilities, from single high secure rooms to multi-building, multi-location campuses with the most stringent security compliance. Prevent unwanted access With Velocity, users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitor behavior, prevent unwanted access, maintain compliance, and provide a robust audit trail. The latest version of the software platform is designed to deliver the highest level of security, interoperability, and backwards compatibility, and it accommodates the evolution of security technology.
Identiv, Inc. has announced that after extensive testing of its Hirsch Physical Access Control System (PACS) CPNI solution, the platform is now approved by the Center for the Protection of National Infrastructure (CPNI), the UK government authority for protective security advice to the country’s national infrastructure. CPNI-approved physical access control platform The CPNI works with partners in government, police, industry, and academia to protect the nation from threats and terrorism, only recommending physical security equipment that meets its stringent certification requirements. “UK sites classified as critical infrastructure, where deep encryption standards are paramount, can confidently deploy the Hirsch CPNI-approved physical access control platform,” said Mark Allen, Identiv General Manager, Premises Security Solutions. Hirsch products, like our innovative Scramblepad readers, protect critical government and infrastructure facilities" Hirsch Velocity Software Mark adds, “Hirsch products, like our innovative Scramblepad readers, protect critical government and infrastructure facilities across the UK, the U.S., and other governments around the world. Our CPNI-approved Hirsch Velocity Software security management system provides a highly scalable, end-to-end physical access control solution from the door to the server cluster, ideal for mission-critical environments. He further stated, “We are proud to continue to work with the UK government’s risk-critical sites to provide the most robust, reliable, highly secure yet cost-effective access control solution.” Hirsch PACS CPNI solution The Hirsch PACS CPNI solution encompasses Identiv’s highly secure product portfolio, including Hirsch Velocity Software, Hirsch Mx-8 Controllers, and Secure Network Interface Board 3 (SNIB3). Identiv’s suite of advanced access control solutions is approved for use in some of the world’s most security-sensitive organizations, including many UK government agencies. Hirsch Velocity Software’s security management system is an integrated platform that manages access control and security operations across thousands of disparate facilities, from single highly secure rooms to multi-building, multi-location campuses, with the most stringent security compliance. Hirsch Mx-8 Controllers Users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitors as they move around a facility, prevent unwanted access, maintain compliance, and provide a robust audit trail. Hirsch Mx-8 Controllers provide scalable, networked communication and are also available in two or four supervised door models. The modular design and scalable architecture enable an installation to start small and grow large, from a single controller system to a larger, multi-site enterprise. The Mx Controller is fully firmware, function, and communication protocol compatible with Hirsch systems so that existing credentials, readers, and databases can be retained. SNIB3 communication device SNIB3 is a renowned communication device that provides IPv6, Gigabit Ethernet, and AES 256 bit encryption SNIB3 is a renowned communication device that provides IPv6, Gigabit Ethernet, and AES 256 bit encryption. These features are already foundational for the critical U.S. FICAM security standard. For deployments already equipped with a Hirsch solution, SNIB3 is a drop-in replacement for Identiv’s SNIB2 and SNIB communications boards. Identiv Global Services Identiv Global Services (IGS) provides a comprehensive cybersecurity-hardening service to ensure the solution is deployed to the rigorous CPNI standard. This covers securing the operating system, database, and services, including all Identiv-supplied server components and networking equipment, as well as the Velocity client workstation. To protect against the rapidly evolving threat landscape, IGS through service-level agreement (SLA) supports the customer and the solution, updating security patches and applying the latest information assurance guidelines following UK standards and best practices.
Related white papers
Physical Access Control In Higher Education
'Boosting On-Site Safety And Security
OSDP Is The Strongest Access Control For Your Business
5 Security Lessons For Navigating COVID-19Download
Cloud Video and Smart CitiesDownload
Security Investments Retailers Should Consider For Their 2021 BudgetDownload
IDEMIA Installs Biometric Access Control Solution With MorphoWave Compact Devices And Digicon DFlow Speedgates At Paris HQ
Supra To Provide TRAC-Box Key Management Solution To Guaranty RV For Tracking Keys Of Recreational Vehicles
- IDEMIA Installs Biometric Access Control Solution With MorphoWave Compact Devices And Digicon DFlow Speedgates At Paris HQ
- City Security Services Adopts SmartTask Workforce Management Software To Support Its Ambitious Growth Plans
- Supra To Provide TRAC-Box Key Management Solution To Guaranty RV For Tracking Keys Of Recreational Vehicles
- Almabani General Contractors Deploy Matrix Solutions For Centralized Access Control And Time-Attendance Management