Electronic keypads - Expert commentary

Smart Home Access Control Growth And The Future Of Door Security
Smart Home Access Control Growth And The Future Of Door Security

There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system Educating The Smart Home Consumer Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app. Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities.  Smart technology is increasingly becoming the new norm in terms of home security  Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. Secure Homes Through Smart Technology Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door. It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course.  In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi. "Smart" Security On The Move  The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change. Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock.  Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore Vacation Rentals And Smart Home Tech ASSA ABLOY research published in 2017 forecasts continued growth in the European vacation rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travelers. A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built vacation rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. travelers use their phones and an app to unlock their apartment. For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.

Are Mobile Credentials More Secure Than Smart Cards?
Are Mobile Credentials More Secure Than Smart Cards?

For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option  Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types Of Access Control Authentication Access control authenticates you by following three things:  Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organizations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have.                 To emphasize, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organizations want to use smart phones in their upcoming access control implementations. Smart Phone Access Control Is Secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks.            When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices. Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone.All that should be needed to activate newer systems is simply the phone number of the smart phone Bluetooth And NFC The Safer Options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defense of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging Systems Could Cause Problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organizations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organizations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!

Surveillance In 2017: 360-degree Cameras  A Primary Device For Total Situational Awareness
Surveillance In 2017: 360-degree Cameras A Primary Device For Total Situational Awareness

The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase In Cybersecurity Threats And Breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organizations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand For Safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalize on opportunities for growth in the coming year.

Latest Baran Advanced Technologies (1986) Ltd. news

HID Global To Demonstrates Its New ICLASS SE Platform And Secure Identity Solutions At ASIS 2013
HID Global To Demonstrates Its New ICLASS SE Platform And Secure Identity Solutions At ASIS 2013

HID will highlight its new iCLASS SE Encoder at ASIS 2013 HID Global, a worldwide leader in secure identity solutions, is demonstrating its new iCLASS SE platform and secure identity solutions at ASIS International 2013 in Chicago. The company will highlight its new iCLASS SE Encoder for locally encoding credentials and managing keys and showcase its expanded pivCLASS Government Solutions portfolio. In addition to demonstrating its broad range of solutions for creating, using and managing secure identities, the company’s new experience zones will feature products and services that address the specific needs of Government, Healthcare, Enterprise, Education, Financial and Banking markets. At ASIS 2013, HID Global will demonstrate its extensive portfolio of secure identity solutions in booth #329 at McCormick Place, South Hall from September 24-26, 2013. Announcements Include: HID Global Extends Its iCLASS SE Platform with Credential Encoding Solution that Simplifies Migration to Higher Security and Mobile Access HID Global Expands pivCLASS Portfolio to Include Credential Registration and Verification of FIPS 201-based Credentials for Government Agencies Top Demonstrations Include: Card and Reader Migration Solutions: for moving to higher security, interoperability and mobile access. Demonstrations will include HID Global’s iCLASS platform readers and smart cards including its iCLASS Seos credential for powering mobile access, and its new iCLASS SE Encoder that enables organizations to encode/manage credentials and configure readers. The multi-technology encoder makes it possible for customers to format a number of credential technologies using a single device, on demand. Government Solutions: featuring pivCLASS solutions that enable government agencies to comply with physical access control mandates to PIV-enable their existing physical access control systems (PACS) to meet any mandated assurance level without requiring a “rip and replace” of their existing PACS infrastructure. The recently expanded pivCLASS portfolio includes an extensive line of solutions for credential registration and verification of FIPS 201-based credentials from Codebench, part of HID Global. The recently expanded pivCLASS portfolio includes an extensive line of solutions for credential registration and verification of FIPS 201-based credentials from Codebench, part of HID Global Healthcare Solutions: that enhances workflow efficiencies and help meet regulatory compliance while increasing security without sacrificing convenience. Demonstrations will include: EasyLobby Visitor Management Solutions for visitor registration, badge printing, tracking and reporting; Genuine HID Technology in partner terminals; and HID Secure Identity Services that help customers manage the daily flow of ID card badge requests and large-volume re-badging projects as well as combine multiple technology platforms onto one credential and “tap in /out” authentication with OMNIKEY desktop readers. Enterprise Solutions: to help organizations maintain operational efficiency and reduce costs, while providing optimum security for their facilities and properties. Demonstrations will include: HID Global’s FARGO HDP5000 Printer/Encoder; iCLASS SE readers with OSDP; ActivID Authentication for secure computer log-on and identity verification; one-time password (OTP) tokens; and EDGE EVO and VertX EVO IP-enabled open architecture access control solutions. Education Solutions: for educational institutions with unique requirements for securing their facilities, improving administrative efficiencies, and doing more than opening doors with student ID badges. Higher education demonstrations will include: iCLASS SE Magstripe readers, EDGE EVO networked access control products, mobile access solutions including iCLASS Seos credentials that can be embedded into NFC-enabled smartphones, and the HDP8500LE Industrial Series Card Printer/Laser Engraver for high duty cycle, high-volume ID programs with Asure ID card personalisation software. Additional demonstrations in the K-12 zone will showcase enterprise-class EasyLobby Visitor Management Solutions and FARGO Direct-to-Card (DTC) Printer/Encoders.  HID Global’s strategic partners offer RFID and contactless solutionsthat use Genuine HID Technology to solve enterprise business problems Financial and Banking Solutions: for financial institutions to secure buildings, control access to critical network resources and sensitive data, and secure online banking services for their customers. Demonstrations will include: ActivID solutions that provide five critical layers for true, multi-factor authentication to enable trusted online transactions; Crescendo smart cards for strong PKI-based authentication supporting logical and physical control; and OMNIKEYdesktop readers. Partner Solutions: HID Global’s strategic partners offer RFID and contactless solutions that use Genuine HID Technology to solve enterprise business problems. Access control solutions that extend the use of a single secure credential will be on display by Networked Access Solutions, and HID Connect, partners including AMT, ASSA ABLOY, Baran Advanced Technologies Ltd., Freedom Pay, Innometriks, Integrated-MATRIX-Solutions, Essex Electronics, Inc., PCSC and others. During ASIS International Security Conference and Exposition, HID Global executives will present at their annual educational luncheon and other ASIS events: “Leading Change in the Secure Identity Ecosystem – HID Global president and CEO Denis Hébert will moderate a panel with leading organizations AIG, Academy Of Art University and Houston Methodist Hospital to discuss how they are working with HID Global to significantly improve their access control infrastructure. The organizations will explain how the changes they are making to their access control systems are delivering tangible value today, while better positioning their organizations for future benefits including the addition of mobile credentials on smartphones. The luncheon is being held on Tuesday, September 24, 2013. Customers interested in attending can contact HID Global. “Cryptography and PKI in Access Control,” Session 2306 – Robert Fontana, vice president of engineering, Federal Identity Solutions with Codebench, part of HID Global, on Tuesday, September 24 from 4:30 p.m. to 5:30 p.m. The session is sponsored by ASIS Information Technology Security Council and ASIS Critical Infrastructure Working Group.

HID To Showcase Latest Solutions On Secure Identity At ASIS 2012
HID To Showcase Latest Solutions On Secure Identity At ASIS 2012

HID will also demonstrate its suite of technologies, products and services at ASIS 2012 HID Global, trusted leader in solutions for the delivery of secure identity, recently announced it will showcase its comprehensive range of breakthrough innovations to create, use and manage secure identity at next week’s ASIS International 2012 in Philadelphia. In addition to announcing the latest additions to its award-winning iCLASS SE® platform that provides the highest level of security, privacy and portability, the company will also conduct live demonstrations of its mobile access solutions. HID Global will demonstrate its extensive suite of technologies, products, solutions and services in Booth 1509 at the Pennsylvania Convention Center from September 10-13, 2012, including: Solutions for creating a secure identity Secure Identity Services: A comprehensive suite of services to help customers address every aspect of requirements for cards and digital credentials for mobile access, including managing the daily flow of ID card badge requests, large-volume re-badging projects, and combining multiple technology platforms onto one credential. PIV Enablement Solutions: pivCLASS® solutions that allow U.S. Federal Government agencies, contractors and other facilities to PIV-enable their existing physical access control systems to meet any mandated assurance level without requiring a “rip and replace” of their existing PACS infrastructure. Card Personalisation Solutions: HID Global will showcase its FARGO® HDP8500 Industrial Series Card Printer/Encoder for high duty cycle, high-volume ID programs; its FARGO Direct-to-Card (DTC) and High Definition Printing™ (HDP®) printer/encoder solutions; and Asure ID® card personalisation software. Visitor Management Solutions: HID’s EasyLobby® visitor management solutions for visitor badges and detailed visitor logs. Embedded Technologies: Embedded platforms to enable third parties to develop hardware that works within the Genuine HID™ ecosystem including the new iCLASS SE Reader module and the SIO® Processor that can be used across a variety of platforms to SIO-enable third-party hardware.  Partner Solutions: Access control solutions that expand the use of Genuine HID Technology™ will be on display by key Networked Access and HID Connect® partners including AMT, ASSA ABLOY, Baran/EverSwitch, Essex Electronics FreedomPay, Innometriks, NetAccess Controls and PCSC. Solutions for using secure identity Genuine HID Credentials and Readers: New Crescendo® credentials for strong PKI-based authentication supporting logical and physical control. Also highlighted will be its new OMNIKEY desktop readers in addition to HID’s new iCLASS SE platform credentials and reader solutions and its line of iCLASS SE/multiCLASS SE readers for higher security and migration to mobile access. Networked Access Solutions: Next generation EDGE EVO and VertX EVO™ IP-enabled access control solutions for fully distributed intelligence and decision making at the door. Solutions for managing secure identities Mobile Access Solutions: HID’s technology-independent iCLASS SE access control platform that delivers advanced security, portability and flexibility, while enabling the use NFC-enabled smartphones for access control and other applications. Come see our 2012 “ASIS Accolades Security’s Best” award-winning solution. Credential Management Solutions: ActivID Credential Management System appliance for easy issuance and management of strong and PKI-enabled smart cards and credentials, Authentication Solutions: naviGO, 4TRESS Authentication for secure computer log-on and identity verification, and one time password (OTP) tokens.

Baran Group Launches Baran Access Solutions To Target North America Access Control Market
Baran Group Launches Baran Access Solutions To Target North America Access Control Market

  Baran Access Solutions, subsidiary of Baran Advanced Technologies Ltd., will leverage the Piezo technology in its product line  New and old have come together with the launch of Baran Access Solutions, a reorganization of the familiar Barantec family of products that will now concentrate on access control solutions, including Everswitch single-door keypads and controllers, contactless smart card readers, proximity readers and magstripe readers. As part of the restructuring, security industry veteran and RFID technology expert, Bill Newill, has been named the company's president. The company is setting up its corporate offices in southern California. "Baran Access Solutions can now concentrate its efforts on the unique demands of the access control market without being distracted by ancillary products," said Newill. "In the end, greater focus will translate to tighter internal processes, better engineered products and a higher level of customer satisfaction." The new company will leverage the patented and highly reliable Piezo technology in its product line. "Having access to this industry-leading technology gives us a huge leg up on the competition," Newill added. Baran Access Solutions will begin by focusing specifically on the manufacture and delivery of access control solutions for commercial customers Baran Access Solutions is a subsidiary of Baran Advanced Technologies Ltd. and the Baran Group, a global leader in engineering, technology and construction services and a name which has come to epitomize excellence. While the Baran brand is not as familiar in the United States, Newill and the rest of the company's senior management team understand the deep roots of Baran Access Solutions' parent companies - and are fully committed to continuing the Baran tradition of excellence. Baran Access Solutions will begin by focusing specifically on the manufacture and delivery of access control solutions for commercial customers throughout the United States and Canada and gradually extend its reach globally.