Electronic keypads - Expert commentary

Key-Centric Access Management System: Providing The Highest Possible Levels Of Security
Key-Centric Access Management System: Providing The Highest Possible Levels Of Security

In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximize benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realize the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronized to the management terminal. Remote authorized unlocking With the key-centric access management system, remote authorized unlocking can be realized Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorized unlocking can be realized. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.

Automatic Gates: Making The Right Investment For Access Control
Automatic Gates: Making The Right Investment For Access Control

The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for mail and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing while obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc while sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for maneuver. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.

The Digital Transformation Of Modern Access Control Solutions
The Digital Transformation Of Modern Access Control Solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

Latest Inner Range (Europe) Ltd news

IDIS And Inner Range Tech Partnership Expands Integration Options For Enterprise Sites
IDIS And Inner Range Tech Partnership Expands Integration Options For Enterprise Sites

Demand for more powerful, flexible but simple integrated security and site management solutions - in applications including data centers, healthcare, banking, and critical infrastructure – is being met by a new technology tie-up between Korea’s IDIS and Australian-headquartered Inner Range. The collaboration brings together IDIS’s end-to-end video offering with Inner Range’s enterprise-level access control and intruder detection system Integriti, giving end-users everything they need for more efficient and productive control of their security, safety, and building systems from a single management platform.  Easy integration process IDIS technology is easy to install with Integriti, with a simple three-step process IDIS technology is easy to install with Integriti, with a simple three-step process and is already proving its value with small to enterprise-level projects in key regional markets. The partnership will support continued growth in Asia and Australasia where IDIS has strategic partnerships with some of the most respected distribution partners, including Hills Limited in Australia, while major U.S. and European applications are also now confirmed or in prospect, say the two companies. Examples include a global data and asset storage provider which has just completed a significant upgrade. Projects in retail, commercial office space, and local government are also underway. Control and management Inner Range’s Integriti access control and integrated management platform work seamlessly with the IDIS DirectIP® range of NVRs and cameras, giving them additional control and management via the total cost and license-free video management software (VMS), IDIS Center.  Using Cellphone credentials The comprehensive choice of door controllers, readers, and keypads from Inner Range can be extended with a range of third-party readers including Mifare, HID, biometrics, and cellphone credential support from multiple vendors. Video solutions Linking access and alarm devices with IDIS’ award-winning video tech, including deep learning analytics, allows granular monitoring and recording of activity across single and multiple sites – for example, door entry, forced-door, and a range of alarm trigger events – and provides instant visual verification of threats and faster incident response, together with comprehensive audit trails and reporting for both incident investigations and improved site management. Access control and security management The integrated approach helps customers mitigate current risks while ensuring a futureproof platform Together, the Inner Range intelligent access control and security management system and IDIS’ end-to-end video solutions can be used as the foundation platform for fully integrated solutions that incorporate everything from security, life safety, and building management systems to visitor management and site-specific systems and devices. This integrated approach helps customers mitigate current risks while ensuring a futureproof platform that will provide them with the scalability and flexibility to adapt as they face future operational challenges and an ever-evolving threat landscape. Easy and affordable maintenance “Our modular, out-of-the-box approach integrates simply and effectively with Inner Range’s Integriti system, offering customers integrated security management more affordably.” “Our partnership ensures a lower total cost of ownership (TCO), combined with assured local support, extended equipment warranties, and easier maintenance,” says Andrew Myung, President, IDIS America. Quick and efficient process “Our new seamless integration with IDIS is a simple three-step process, allowing security managers and integrators to quickly and efficiently associate cameras with any entity on the Integriti system and plot them on schematic maps.” “Our partnership extends the technology choice available to systems integrators and offers attractive new options for their customers,” says Tim Northwood, General Manager, Inner Range.

Inner Range Announces Integrations With FLIR Latitude And IDIS CCTV
Inner Range Announces Integrations With FLIR Latitude And IDIS CCTV

Access control and security system manufacturer Inner Range has announced new integrations with FLIR Latitude and IDIS CCTV. The new integrations work with Inner Range’s enterprise-level intelligent, integrated access control system, Integriti, and bolster options for clients around video surveillance. Enhancing VMS and CCTV  FLIR Latitude is a powerful and versatile network VMS with enhanced cybersecurity. Its CCTV cameras automatically load configurations in Integriti, provide 64-bit integration server support, and security managers can set trigger inputs for CCTV events. Cameras by Korean video surveillance firm IDIS can show camera status in Integriti, display video time frames, show on-screen displays, and allow reverse playback. All-in-one security & access Inner Range general manager, Tim Northwood, said, “Integriti’s open IP platform means it can offer clients highly bespoke solutions by seamlessly integrating with a whole host of third-party systems." "CCTV is a key element of any access or security solution and we’re delighted to be working with IDS and FLIR to help our customers create one unified system that meets all their individual security and access needs.”

2N To Host A Virtual Event To Highlight The Benefits Of Integrating Cyber Security, Office Access And Video Analytics Under One Platform
2N To Host A Virtual Event To Highlight The Benefits Of Integrating Cyber Security, Office Access And Video Analytics Under One Platform

2N, the provider of IP intercom systems, has come together with four other tech firms to promote the practical benefits of bringing together building cyber security, smart office access, and video analytics within one unified platform. The companies will showcase the practical benefits to installers, integrators and building users during the latest 2N On Air event at 2pm BST on Thursday, May 20th. The event comes as evidence grows of UK firms rethinking building space in 2021; a survey of 500 HR managers by YouGov found that one quarter intends to close, downsize or consolidate their offices post-pandemic. In addition, just over half is planning some form of remote working. Building management insights The event’s sessions will show the different benefits achievable when combining mobile access to offices, security and greater building management insights. Sessions will include: Together with Milestone, a pioneer in video management software, demonstrating how to maintain maximum office occupancy levels in an office and comply with safety measures, by combining 2N access control with video management systems. With network security solutions provider Axis, how to connect IP-based intercoms to video and surveillance software – enabling organizations to bring vehicle number plate recognition into building security. Alongside Integriti security platform provider Inner Range, looking at the implications of an intruder gaining building access and the role of door communication systems. Learning how 2N intercoms can be set up to call around the entire building and direct visitors’ calls to the right employee with help from Cisco. Comprehensive access solutions Attendees will also gain a bonus preview of 2N’s latest intercom, the 2N® IP Style. Michal Kratochvíl, CEO of 2N, said: “Working alongside other great tech firms like Cisco, Milestone, Axis and Inner Range is strategically important for 2N because it helps us meet the growing demand for smarter, more comprehensive access solutions. We also can’t wait to preview our new 2N® IP Style, one of the most luxurious intercoms we have ever produced.”

Related white papers

School Security Moves to the Cloud

Cloud-based Access Control And Occupancy Management To Safeguard Workplaces

Four Areas to Consider in Frictionless Access Control