ISONAS Electronic Locks(2)
Browse Electronic Locks
- Solenoid Bolts
Electronic lock system products updated recently
A defibrillator can save the life of a person suffering from cardiac arrest – but it is most effective when used in the first few minutes of the patient collapsing. Studies have shown that a shock given within the first three minutes provides the best chance of survival and even one minute of further delay can substantially lower the chances of recovering. Public Access Defibrillators (PADs) were created to allow untrained members of the public to deliver life-saving treatment in those precious minutes before an ambulance arrives. There are currently over 10,000 in the UK, located in parks, offices, high streets and sporting venues, and they are especially popular in rural communities, where ambulance response times are longer. Every second counts Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or locked. Leaving them open could lead to theft, vandalism or misuse. Leaving them locked could mean that precious moments are lost waiting for a local guardian to arrive – and could even cost a life. To save as many lives as possible, it’s clear that PADs need to be available 24/7, fully operational and easily accessible to users and local guardians. But there is a solution that can meet all these conditions – a lock that can protect against vandalism while providing convenient instant access when required. Life-saving solutions Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or lockedDigital locks are ideal for securing PADs because they don’t require a key, and anyone can be given access over the phone. In the case of a cardiac arrest, the user calls 999 and the ambulance controller provides them with a simple, easy-to-remember code. The ambulance controller can then advise them, step by step, what to do. Local guardians, who have responsibility for the PAD, can be provided with an override key to enable them to monitor and maintain the defibrillator. The PAD cabinets built by Duchy Defibrillators show exactly how this works in practice. Based in rural Cornwall, Duchy Defibrillators manufactures, supplies and installs monitored PAD cabinets. To provide public access to the defibrillators, it needed a lock that could keep its cabinets secure, make them easily accessible and withstand the stormy Cornish weather. Codelocks recommended a digital electronic lock that could operate on a standalone battery, making it especially suitable for remote areas. As well as offering flexible access, digital locks come with a range of varying options and functions to suit different applications. As Duchy Defibrillator cabinets are installed in a wide variety of locations and sometimes need to withstand outdoor exposure, it opted for a robust electronic digital lock that is both affordable and easy to set up. A digital-access revolution Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end-users The example of Duchy Defibrillators shows how digital locks can be used to keep defibrillator cabinets secure while affording instant access to users when they are needed. But the flexibility of digital locks also makes them suitable for securing property and equipment in a wide variety of situations, especially for shared and public facilities. This is why you’ll increasingly see digital locks used to secure restricted areas in hospitals, schools and offices, as well as shared facilities like hotel and gym lockers, public restrooms and more. Digital locks are available for a number of specific applications, including doors, lockers and cabinets. They can range from simple mechanical locks through to more sophisticated electronic locks and state-of-the-art smart locks. Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end users – making them very popular for contactless entry and with facilities managers that need to manage access to buildings and campuses. One thing is certain – whatever your access control requirements are, there’s a keyless lock solution to suit. The digital access revolution is here.
The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for mail and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing while obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc while sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for maneuver. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
Cozaint Corporation, manufacturer of ‘smart’ physical security platforms, has announced the launch of the BOBBY-W wall-mounted physical security kiosk. Available immediately, this ‘Video Surveillance as a Service’ (VSaaS) device has been designed to augment human security guard environments that need additional eyes and ears on their premises. BOBBY-W physical security kiosk BOBBY-W is based on a custom, Cozaint-built expandable platform that allows for the integration of a multitude of IoT sensors which allow for the monitoring and alerting of motion, water leaks, door/window opening, room temperature, lighting, and much more. All of these sensors are centrally monitored and the service can interact with an organization’s existing security team. BOBBY-W standard features include: 24/7 180-degree video surveillance Facial recognition-based access control Smartphone-based access control IoT Sensor management Remote monitoring and concierge service Panic communication Expandable platform Touchless access control solution The timing couldn’t be more perfect for the need of a touchless access control solution" “The timing couldn’t be more perfect for the need of a touchless access control solution and the BOBBY-W physical security kiosk seems to fit the current market requirements. The integration of the BOBBY-W kiosk, along with Cozaint’s facial recognition technology, and Isonas’ Pure IP Access smartphone reader controller using Pure Access is ideal,” stated Fred Sumner, West Region Account Executive at Isonas, Inc. He adds, “Cozaint has been great to work with and we’re thrilled that our Pure IP access control API was able to integrate so well into the BOBBY-W platform. “ 24/7 remote monitoring With 24/7 remote monitoring included with the BOBBY-W service, customers can rest assured that their environment has the added protection to deal with unauthorized entries or incidents that could cause personal harm or property damage. BOBBY-W’s interactive touchscreen display is designed to showcase company news and information (or even specific advertising) as well as communication in cases of emergency to trained remote monitoring staff. With the current global pandemic challenges, BOBBY-W also has an optional integrated kiosk offering that incorporates the non-contact thermal imaging system from feevr. feevr non-contact thermal imaging system “We are delighted to be an available integration partner with Cozaint’s BOBBY-W security kiosk that allows organizations to monitor individuals that may show possible symptoms of an elevated skin temperature as they enter a particular campus,” said Barry Oberholzer, Founder and CEO of x.labs, the company behind the feevr non-contact thermal imaging system. He adds, “We agree that the integration of the feevr platform with the BOBBY-W physical security kiosk delivers enhanced peace-of-mind and situational awareness to an organization.” Facial recognition access control Every BOBBY-W wall-mounted kiosk comes standard with facial recognition access control Every BOBBY-W wall-mounted kiosk comes standard with facial recognition access control, which utilizes the Isonas Pure IP access control solution with smartphone authentication capabilities, as well as IoT sensors for motion detection, door/window openings, and environmental conditions (temperature, etc). Another integration partner to the BOBBY platform is the Enterprise Asset Tracking platform from Sympler. Enterprise Asset Tracking platform “With Enterprise Asset Tracking, organizations can simply place asset tags (small/thin devices with unique identifiers) onto valuable equipment, keys, lanyards, or even an individual’s wrists with a standard watch band and continually track and locate those company assets,” stated Jeff Debrosse, Principal and Founder of Sympler. Jeff adds, “The tags report asset's positions within the enterprise campus or jobsite. This information is integrated into the BOBBY-W monitoring platform and an asset’s real-time location, distance, and movement pattern can be quickly determined.” BOBBY security towers The BOBBY-W platform is the first in the Cozaint line of physical security kiosks and towers. Cozaint will be delivering new BOBBY security towers later in 2020. BOBBY-W wall-mounted physical security kiosks are available as of August 2020 and are rented to customers on a monthly basis, alleviating any capital equipment expenses and maintenance costs. Complete maintenance and service of the BOBBY-W kiosk is provided throughout the life of agreement, as well as 24/7 online technical support and remote monitoring service.
ISONAS Inc., a globally renowned IP access control and hardware solutions provider, and part of the Allegion family of brands, has announced that the ISONAS Pure IP access control solution has been installed at a new flagship distribution center for Premier Packaging, an international packaging solutions company, with facilities in 14 locations nationwide. ISONAS Pure IP access control In the summer of 2018, Premier Packaging was looking to implement an access control system to help secure their brand-new 320,000-square-foot facility in Louisville, Kentucky. After working closely on a recent project with Orion Networks, a trusted IT infrastructure provider, Premier Packaging relied on their recommendation to implement a cutting-edge access control solution from ISONAS. With no access control system in place at any of their 14 locations and a combination of office workers, support staff, truck drivers and warehouse employees entering and existing the building daily, a process to control access was a necessity. Monitoring and tracking visitors to distribution center A major challenge facing the new distribution center was truck drivers, who came into the facility, were not company employees. With on average 250 people coming in and out of the new facility in Kentucky daily, monitoring and tracking who those people were and if they belonged there was imperative. They were also looking for the flexibility to manage the locking and unlocking of doors remotely, rather than having to rely on physical keys. “After comparing ISONAS to other access control systems out there, we knew that ISONAS was the right flexible access control solution to meet Premier Packaging’s security needs,” states Brock Jamison, VP and Director of Sales at Orion Networks. ISONAS RC-04 reader-controllers installed ISONAS Pure Access software was implemented to give the packaging company remote access capabilities The initial project consisted of 18 ISONAS RC-04 reader-controllers installed at their new distribution center in Louisville. The RC-04 reader-controllers from ISONAS delivers advanced technical functionality with an easy installation process. In addition to the ISONAS hardware, the ISONAS Pure Access software was implemented to give the packaging company remote access capabilities. Pure Access Pure Access, ISONAS’s industry-renowned software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. “We are extremely happy that our unique access control solution could help Premier Packaging improve safety and security at their new distribution center seamlessly,” states Jonathan Mooney, ISONAS Sales Leader. ISONAS cloud-based platform By using both the ISONAS hardware and software solution together, Premier Packaging was able to improve security and keep employees safe. With the ISONAS cloud-based platform, Premier now required all Louisville employees to enter the building using their ID badges to gain access. If an employee was not in the database and verified, then access would be denied. Future plans include rolling out the ISONAS access control solution to additional buildings and possibly integrating it with other security systems.
Cybersecurity has become a major element – and a major source of discussion – in the physical security marketplace as a result of the rise in networked systems. And we may still not be talking enough about cybersecurity. Here is part one of our Cybersecurity series. “Cybersecurity requires everyone in the security industry to be playing offense and defense at the same time, every single day,” says Bill Bozeman, President and CEO of PSA Security Network. “It needs to just become part of the standard conversation when we are talking about physical security because they are so intertwined.” Creating New Industry Leaders Cybersecurity and physical security can be seen as two parts of a single entity, and increasingly the two will be combined at the enterprise level over the next several years. “This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership,” says Rob Lydic of ISONAS, now part of Allegion. Data capture form to appear here! Cybersecurity issues dominate almost every discussion in today’s physical security industry, and the clear message is that “manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities,” says Lydic. He contends that cloud services providers (such as ISONAS) are more cybersecure and reliable ‘by orders of magnitude’ than non-cloud solutions. Cybersecurity is linked to cloud-based systems and managed security service provider models Cloud-Based Services The Security Industry Association (SIA) has listed cybersecurity as one of 2019’s ‘Top Megatrends’ in the physical security market. SIA says it is important to prioritize cybersecurity among security businesses, for customers’ businesses, and for vendors. The trend calls for continual process improvement and investment. Bill Bozeman of PSA Security Network agrees: “Cybersecurity has definitely taken a strong foothold in the industry.” With the continued expansion of cloud-based services, cybersecurity will be more important than ever to integrators, manufacturers and end users alike, he says. Notably, cybersecurity is directly linked to two other important industry trends listed by Bozeman: cloud-based systems and the rise in recurring monthly revenue (RMR) and managed security service provider (MSSP) models, whose focus will include cybersecurity. Loss Prevention Executives The days when cybersecurity was exclusively the domain of the information technology (IT) department are gone. “Cybercrime is one of the biggest threats organizations of all sizes and types face today,” says Michael Malone, CEO of ADT Cybersecurity (formerly known as Datashield). “Considering the magnitude of these crimes, it now falls on the entire organization, including the traditional security or loss prevention executives, to band together to combat these threats.” Cybercrime is one of the biggest threats organizations of all sizes and types face today Malone favors (and his company offers) a managed detection and response (MDR) service, which combines advanced technology and human analysis. Using packet capture on the network, an MDR analyst can ‘replay’ a cyber security event and dig deeper into the incident and determine remediation steps. It’s an approach that significantly cuts through false positive ‘noise’ so security teams can focus on what matters. Helping Security Officers Interestingly, cybersecurity is poised to benefit from another major trend in the physical security market – the rise of artificial intelligence. Specifically, machine learning applications for cybersecurity include: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. But AI in this case is not a panacea. Christopher McDaniels of Mosaic451 recommends pairing human intellect with machine technology to sort through data faster and catch hackers before they do much damage. See part two of our Cybersecurity series here.
Related white papers
Physical Access Control In Higher Education
Mobile Access- What You Need To Know (Part 1)
The Role Of IT In Physical Access Control
Security Investments Retailers Should Consider For Their 2021 BudgetDownload
Cyber Security and High Security in a Business Integrated WorldDownload
Market Report: Cannabis At A GlanceDownload
Aperio Wireless Access Control Solution Provides Integrated Security At Inholland University Of Applied Sciences
- Aperio Wireless Access Control Solution Provides Integrated Security At Inholland University Of Applied Sciences
- SMARTair® Secures Spanish Heritage School
- ASSA ABLOY SMARTair Provides Access Control Solutions To Colegio Diocesano Santo Domingo In Orihuela, Spain
- Boon Edam Enhances Campus Security By Installing Turnstiles And Revolving Doors At The Columbia College Chicago