Genetec Synergis brings together IP video surveillance and access control into one easy-to-use solution
Decision-making and investigations are faster if operators don’t have to navigate among different applications

Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market.

AMAG: Easy Migration, Simple Pricing Model

AMAG’s Symmetry platform includes access control, photo ID badging, visitor management and digital video server software, all standard in an integrated solution. The pricing model is easy – up to 512 readers can be added to the software platform; most options are covered with the base charge. The platform is cost-effective, even for small systems. The Symmetry Retrofit program provides easy migration (without a screwdriver) from legacy or end-of-life products such as Casi/GE systems. Options include the Threat Level Manager, which can customize system settings based on a selected level of threat. Symmetry is also compatible with G4S’ One Facility workflow management system, and Symmetry Web thin client application enables use of mobile devices. AMAG’s new true two-door PoE controller includes two reader ports, two lock relays, two REQs and two door status inputs. AMAG has a long list of third-party integrations.

Brivo Systems: A Truly Cloud-Based System

Brivo Systems provides access control in a truly cloud-based system in a software as a service (SaaS), recurring revenue model. All firmware and software systems are updated automatically. The cloud service works with Brivo’s IP door controllers. End users only pay for what they use.

Continental Access: From One Door to Ten Thousand

CardAccess 3000 software by Continental Access is easy to use and yet enterprise class – able to control access to one door or to ten thousands of doors in locations worldwide. Designed by Continental Access in the United States, the robust hardware continues a legacy of the company founded in 1961. Total cost of ownership is low; Continental Access does not charge mandatory end user support fees to integrators. Additionally, CardAccess 3000 is integrated with video management systems and other systems such as visitor management, time and attendance, gated community software and several sister companies’ products – Napco intrusion products and Alarm Lock wireless Networx and ArchiTech Locks (with Marks locking hardware).

S2 Security access control products use a web-delivered user interface
Web-delivered user interface benefits end users and integrators in terms of lower total cost of ownership as well as ease of operability

Frontier Security’s Deep Integration with Video

Frontier Security’s access control system features deep integration with video, providing a more efficient and powerful process to correlate access events and transactions with corresponding video. Another capability is advanced alarm filtering and routing to provide alarms to the appropriate parties. Frontier also provides powerful capabilities to filter and view card transactions. The new HTML5 web interface provides an easy way to access common functionalities from browsers and tablets.

Galaxy Control Systems: Easy to Upsell

Galaxy Control Systems' System Galaxy software solution is not “brand”-dependent and is easily implemented in existing systems to enhance functionality. Improvements in performance and efficiency available with new and evolving access control technologies are even more valuable to integrators and end users when they are interoperable with earlier generations of systems. System Galaxy enables systems integrators to cost-effectively upsell business. The backwards-compatible software enables future business development with new customers who have old systems. The advanced architecture also allows dealers and integrators to offer access control as a managed service. Multi-client functionality can manage and control several systems on a single backbone, much like the approach found in facilities that have multiple tenants. 

Genetec’s Unified Security Center

The Genetec access control system, Synergis, is built into to the company’s unified Security Center platform, which brings together IP video surveillance and access control into one easy-to-use solution. Common security operations from multiple systems are standardized, including monitoring, reporting, alarm management and configuration. Within a single intuitive client application, operators can see corresponding video each time a cardholder touches their card to a reader. The cardholder information is displayed automatically. In case of an access-denied alarm, operators can quickly address the situation by confirming the cardholder’s identity and assigned access rights. Decision-making and investigations are faster because operators don’t have to navigate among different applications to understand what took place.

PCSC’s Fault Tolerant access controller uses a patented process for automated system recovery
Redundancy is achieved at the controller level, not simply from a redundant network server

Honeywell: A Choice for Anybody

Honeywell offers two access control systems – the ProWatch geared toward enterprise customers and the self-contained WinPak for entry-level to mid-market applications. Sold through dealer/integrators, ProWatch implementations are customized for each customer and include the Honeywell SDK to ensure integration with a wide range of existing equipment. Customers include enterprise, Fortune 500, and multi-city and countrywide applications, including multiple points of control. There is no limit to the number of doors and card-holders – one center manages 10,000 doors. WinPak comes in three “flavors” – the XE entry level for 1 to 16 doors, the mid-range SE for 16 to 32 doors, and the PE (professional edition) geared toward multiple locations, including field offices or satellites. WinPak has dozens of native integrations.

PCSC’s Fault Tolerant Controller

PCSC’s flagship access control product, the Fault Tolerant access controller, uses a patented process for automated system recovery. If a primary controller should fail, an alternative controller automatically takes over the duties of the failed controller. Redundancy is achieved at the controller level, not simply from a redundant network server. The Fault Tolerant Controller also uses a Hydra Protocol to use peer-to-peer communication to keep the system updated. Ethernet and PoE are standard, and optional wireless mesh communication is also available. For integrators, the system provides better reliability with fewer problems both from a system network and physical security point of view. Result: Lower installation and operating expenses and better performance and security.

S2 Security Features Web-Delivered Interface

S2 Security access control products use a web-delivered user interface. Customers can access their systems without requiring an installed client, whether in a fixed or mobile environment. Credential-based access control, intrusion detection and video applications are integrated seamlessly for a unified management and administration experience. The web-delivered user interface benefits end users and integrators in terms of lower total cost of ownership as well as ease of operability. No software installation or client license fees are required. The system can be accessed from any authorized computer, and key access control functions are also available on mobile devices using S2 Mobile Security Officer.

Security is more unified because
both physical and logical security
apps can share a common database

Tyco Security Provides Plenty of Options

Software House’s C-Cure 9000 combines its iSTAR Door Controller with enterprise-level access control features. A scalable, fully distributed and robust architecture – empowered by iSTAR controllers – can meet complex regional, global and enterprise access control challenges. Kantech access control solutions from Tyco Security Products offers low installation cost and ease of use. Minimizing installation time and need for product knowledge decreases total cost of ownership, both related to software and hardware-based solutions. CEM Systems’ AC2000 access control system differentiates itself by its IP Edge devices, such as the Emerald reader, a terminal at the door that has the ability to run applications like a smart phone or tablet. This capability allows customers to post announcements on the keypad or even add a checklist to access control decisions for things like health and safety or hazardous areas.

Viscount Systems Emphasizes IT

Eliminating proprietary panels altogether, the software and databases of Viscount Systems’ Freedom access control system are hosted on physical or virtual servers. Multiple synchronized servers provide higher security, built-in resiliency and the ability for IT departments to leverage existing infrastructure. With the Freedom solution, integrators and end users can utilize native IT software that resides on a non-proprietary server and is deployed virtually across multiple servers or in the cloud. Updates are done in real-time and under the control of the customer. Leveraging existing IT infrastructure and resources also makes the Freedom solution cost-efficient and scalable. Security is more unified because both physical and logical security apps can share a common database.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Larry Anderson Editor, &

An experienced journalist and long-time presence in the US security industry, Larry is's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

New Markets For AI-Powered Smart Cameras In 2021
New Markets For AI-Powered Smart Cameras In 2021

Organizations faced a number of unforeseen challenges in nearly every business sector throughout 2020 – and continuing into 2021. Until now, businesses have been on the defensive, reacting to the shifting workforce and economic conditions, however, COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans. This is now giving decision-makers the chance to take a proactive approach to mitigate current and post-pandemic risks. These long-term technology solutions can be used for today’s new world of social distancing and face mask policies and flexibly repurposed for tomorrow’s renewed focus on efficiency and business optimization. For many, this emphasis on optimization will likely be precipitated by not only the resulting economic impacts of the pandemic but also the growing sophistication and maturity of technologies such as Artificial Intelligence (AI) and Machine Learning (ML), technologies that are coming of age just when they seem to be needed the most.COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans Combined with today’s cutting-edge computer vision capabilities, AI and ML have produced smart cameras that have enabled organizations to more easily implement and comply with new health and safety requirements. Smart cameras equipped with AI-enabled intelligent video analytic applications can also be used in a variety of use cases that take into account traditional security applications, as well as business or operational optimization, uses – all on a single camera. As the applications for video analytics become more and more mainstream - providing valuable insights to a variety of industries - 2021 will be a year to explore new areas of use for AI-powered cameras. Optimizing production workflows and product quality in agriculture Surveillance and monitoring technologies are offering value to industries such as agriculture by providing a cost-effective solution for monitoring of crops, business assets and optimizing production processes. As many in the agriculture sector seek to find new technologies to assist in reducing energy usage, as well as reduce the environmental strain of modern farming, they can find an unusual ally in smart surveillance. Some niche farming organizations are already implementing AI solutions to monitor crops for peak production freshness in order to reduce waste and increase product quality.  For users who face environmental threats, such as mold, parasites, or other insects, smart surveillance monitoring can assist in the early identification of these pests and notify proper personnel before damage has occurred. They can also monitor vast amounts of livestock in fields to ensure safety from predators or to identify if an animal is injured. Using video monitoring in the growing environment as well as along the supply chain can also prove valuable to large-scale agriculture production. Applications can track and manage inventory in real-time, improving knowledge of high-demand items and allowing for better supply chain planning, further reducing potential spoilage. Efficient monitoring in manufacturing and logistics New challenges have arisen in the transportation and logistics sector, with the industry experiencing global growth. While security and operational requirements are changing, smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye, but have a significant impact on the overall customer experience. Smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye. Video analytics can assist logistic service providers in successfully delivering the correct product to the right location and customer in its original condition, which normally requires the supply chain to be both secure and ultra-efficient. The latest camera technology and intelligent software algorithms can analyze footage directly on the camera – detecting a damaged package at the loading dock before it is loaded onto a truck for delivery. When shipments come in, smart cameras can also alert drivers of empty loading bays available for offloading or alert facility staff of potential blockages or hazards for incoming and outgoing vehicles that could delay delivery schedules planned down to the minute. For monitoring and detecting specific vehicles, computer vision in combination with video analysis enables security cameras to streamline access control measures with license plate recognition. Smart cameras equipped with this technology can identify incoming and outgoing trucks - ensuring that only authorized vehicles gain access to transfer points or warehouses. Enhance regulatory safety measures in industrial settings  Smart surveillance and AI-enabled applications can be used to ensure compliance with organizational or regulatory safety measures in industrial environments. Object detection apps can identify if employees are wearing proper safety gear, such as facial coverings, hard hats, or lifting belts. Similar to the prevention of break-ins and theft, cameras equipped with behavior detection can help to automatically recognize accidents at an early stage. For example, if a worker falls to the ground or is hit by a falling object, the system recognizes this as unusual behavior and reports it immediately. Going beyond employee safety is the ability to use this technology for vital preventative maintenance on machinery and structures. A camera can identify potential safety hazards, such as a loose cable causing sparks, potential wiring hazards, or even detect defects in raw materials. Other more subtle changes, such as gradual structural shifts/crack or increases in vibrations – ones that would take the human eye months or years to discover – are detectable by smart cameras trained to detect the first signs of mechanical deterioration that could potentially pose a physical safety risk to people or assets. Early recognition of fire and smoke is another use case where industrial decision-makers can find value. Conventional fire alarms are often difficult to properly mount in buildings or outdoor spaces and they require a lot of maintenance. Smart security cameras can be deployed in difficult or hard-to-reach areas. When equipped with fire detection applications, they can trigger notification far earlier than a conventional fire alarm – as well as reduce false alarms by distinguishing between smoke, fog, or other objects that trigger false alarms. By digitizing analog environments, whether a smoke detector or an analog pressure gauge, decision-makers will have access to a wealth of data for analysis that will enable them to optimize highly technical processes along different stages of manufacturing - as well as ensure employee safety and security of industrial assets and resources. Looking forward to the future of smart surveillance With the rise of automation in all three of these markets, from intelligent shelving systems in warehouses to autonomous-driving trucks, object detection for security threats, and the use of AI in monitoring agricultural crops and livestock, the overall demand for computer vision and video analytics will continue to grow. That is why now is the best time for decision-makers across a number of industries to examine their current infrastructure and determine if they are ready to make an investment in a sustainable, multi-use, and long-term security and business optimization solution.

How Technology Can Elevate Guest Services And Their Security
How Technology Can Elevate Guest Services And Their Security

The return to the workplace is a focal point for many in the built environment but one of the most important elements is easy to overlook. Guest services will be vital in the return to the workplace. Front-of-house teams will be responsible for welcoming building users back and reassuring them as they negotiate shared spaces in the post-Covid era. The workplace will inevitably look different after Covid. We have become more aware of our spaces, how clean they are, and what spaces building users share. Employees have also become more conscious of the pros and cons of the workplace. For some, a year of working from home has been a welcome break from the stress and time taken by a commute. Many organizations are considering moving to hybrid workplace approaches, downsizing their corporate real estate portfolio, and using shared spaces more consciously, be that for focussed quiet work or collaboration. We will also see heightened care in workplace cleaning and more data-led solutions. Front-of-house teams will be at the center of helping building users get used to these changes. The role of technology Front-of-house personnel will likely be responsible for ensuring buildings do not exceed safe occupancy levels and will be aided by visitor management systems.  Another change to look out for in the workplace will be the use of technology. Tech-led organizations have long reminded us that gut instinct and trusting our senses is not enough anymore, but Covid-19 has forced us to come to terms with this. Now that adopting technology has become crucial in cleaning, we will see a reticence to adopt it elsewhere fade too. A survey from McKinsey suggests that the pandemic has accelerated the adoption of technologies by several years. Why is this important for guest services? Much like other workplace changes, new technologies will alter how building users interact with their environment. Tech will also enable front-of-house teams to focus on the key ingredient of their role – human interaction. This will be vital in helping occupants feel comfortable, safe, and happy. Occupancy and visitor management systems These systems have been around in the workplace for many years, and pre-Covid were used to help us maximize our space and utilization. These systems are even more important as we are likely to see some return to the workplace before everyone has been vaccinated. We may see systems that contact only those occupants in an affected area of a building, rather than a whole workforce, to limit worry and ensure most people can remain confident in the hygiene of their workspace. For the rest of 2021 at least, precautions such as social distancing will need to be in place. Workplaces will continue to function at limited occupancy for some time to keep people safe. Front-of-house personnel will likely be responsible for ensuring buildings do not exceed safe occupancy levels and will be aided by visitor management systems. These may be used by individual organizations or by multi-tenanted buildings. Temperature checks and identity verification systems Organizations are mitigating risks where possible. Handheld digital thermometers have been in high demand. The use of such devices has reshaped the role of security officers over the past year. Officers have become familiar faces in shops and shared spaces, keeping people safe and acting as the first point of contact. The security sector has been placed under immense pressure, balancing the need to enforce precautions with responding to stressed building users in an empathetic way. Officers have demonstrated agility that security technology cannot replace. Post-pandemic, we will likely see a greater appreciation for what manned guarding can offer and a greater potential for officers in front of house roles. Front-of-House staff are becoming responsible for temperature verification. Some organizations may choose to increase the collaboration between their front-of-house and security teams. This could include implementing identity verification systems, as well as touchless systems. This will allow the focus of front-of-house teams to remain on the people and giving a warm welcome to users as they return to the office. Using monitoring to make guest services more available  Monitoring solutions may be the first things that come to mind when discussing security technology. We have seen an increasing trend toward integrating remote monitoring with manned guarding since before the pandemic. Such a move may be even more important now.Beyond keeping employees safe, guest services are going to play a central role in making the workplace an attractive option. For many organizations, the pandemic has forced a rapid switch in focus. Organizations have had to face the security challenges of caring for vacant premises and the additional complications of managing cybersecurity for remote work. Rebalancing the cost and focus of security may feel as though it has left some businesses without the capacity to utilize front-of-house officers. Yet when employees return to the workplace, front-of-house teams will be more important than ever. For those that did not do so during the pandemic, now is the time to be investing in effective monitoring solutions. The falling cost of technology means such a solution can be combined with manned guarding and front-of-house roles. Organizations may need to invest in fewer officers, but their roles can be more focused upon the occupant experience. Encouraging employees back Beyond keeping employees safe, guest services are going to play a central role in making the workplace an attractive option. Remote working has had both pros and cons but many of those downsides will be diminished with the end of the pandemic. Loneliness will no longer be such a challenge when seeing friends and neighbours is an option, and the return of children and partners to school and work will relieve distractions. It may be tempting, then, for many employees to continue working from home. As a result, many opportunities for collaborative work will be lost. For employers looking to encourage their workforce to return, creating an amazing workplace experience is key. Technology alone can’t offer this. Rather, too much tech could create an environment that feels clinical and impersonal. Use technology to streamline the boring or stressful elements of the workplace and invest in friendly faces who will welcome your workforce back.

What are the Security Challenges of Protecting the Cannabis Industry?
What are the Security Challenges of Protecting the Cannabis Industry?

The advent of a truly new market for the physical security industry is a rare occurrence. Particularly rare is a new market that is both fast-growing and provides an environment that is not just conducive to application of physical security technologies but that actually demands it. Such is the case with the market for legalized marijuana. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting the cannabis industry?