The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion.

Q: What new developments in emerging technologies do you see in the coming years?

There’s opportunity for implementation of the technology to solve real problems"

Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems.

Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions.

Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out.

It’s important that we look at how integrators can use the technology to do business more effectively and efficiently"

Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently.

Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities.

Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem?

Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life.

Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?”

Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control

Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers?

Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can.

Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities.

As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem"

Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem.

Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned?

Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication.

We have different architectures within our lock base and among our software partners to allow a mix of technology"

Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology.

Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future.

Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Larry Anderson Editor, &

An experienced journalist and long-time presence in the US security industry, Larry is's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What Are The Latest Trends In Perimeter Security Technology?
What Are The Latest Trends In Perimeter Security Technology?

Perimeter security is the first line of defense against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?

Perimeter Security Today: Protecting People And Assets
Perimeter Security Today: Protecting People And Assets

Perimeter security is by no means a new concept. A phrase used to describe solutions with the primary purpose of limiting access to any area that is prohibited to the public at large, perimeter security has been prevalent for millennia. From Hadrian’s Wall that was built by the Roman Empire in Britain back in AD 122 to the Great Wall of China that winds almost 22,000 kilometers through the Asian country’s eastern regions, it is a concept that remains a fundamental part of global societies today. Fast forward to today and no longer are we reliant on 50-foot-high, 20-foot-thick stone blockades to protect our safety. Perimeter security has evolved over the centuries moving from empires and structures to products and cutting-edge technology and continues to grow today. In fact, in 2020 Perimeter Security was a $61.3 billion industry as more businesses and industries have the need to protect against modern-day threats. This colossal and growing market is powered by industry innovators that are providing advanced solutions that are reliable, integrated, and cost-effective. Layered Perimeter Security Defense The number of perimeter intrusions is a large reason behind the continued surge in security investment, propelled by increasing urbanization, a growing terror threat, and a plethora of other concerning factors. Most organizations are better equipped to protect people and assets today, yet there is still a need for solutions that can grow with our future needs and the unforeseen challenges ahead. For many, this means moving beyond siloed solutions into a multi-layered, integrated physical security strategy – one that provides the best security posture possible. There are a variety of innovative technologies that can create a holistic perimeter security solution that will transform the defences of any organization. The question is, what are the technologies and trends shaping perimeter security in 2021 and beyond? Next-Generation Video Surveillance By combining two powerful visualization technologies in a single form factor, rich data can be captured and deliver more accurate awareness and better application of deterrence measures in real-time, versus the evidentiary use of cameras today. In today’s surveillance market, cameras and video management systems are nothing like those that were available a mere half-decade ago. Cameras now readily feature ultra-HD and 4K resolution that provide an extremely high level of detail, enhancing security teams’ ability to capture evidence and identify perpetrators. This enhanced detail bolsters not only investigation sequences but equally transforms video analytics capabilities, like facial recognition that unlock additional business benefits. Where are cameras heading in the future? Let’s look at Oyla’s cameras as an example. These cameras fuse together artificial intelligence (AI), video, and 3D data, offering a depth camera that can be used to define very accurate intrusion detection perimeters. Its advanced motion detection activates an alert when a user-defined perimeter has been crossed, or if there is a presence in a user-defined area or volume space. By combining two powerful visualization technologies in a single form factor, rich data can be captured and deliver more accurate awareness and better application of deterrence measures in real-time, versus the evidentiary use of cameras today. Thermal Cameras Thermal cameras are a relatively novel yet growing security phenomenon, having come to the forefront during the pandemic. Where such technology was once a novelty, their widespread application in detecting raised temperatures which might indicate a COVID-19-related fever has seen them become increasingly applied to a broader market in the past 18 months. Not only are these cameras now more accessible, but they have also advanced from a technical perspective. Modern thermal cameras now offer a more accurate thermal resolution, longer detection ranges, ONVIF compliance and edge-based analytics for the benefit of VMS solutions. They are also a useful technology for solving visibility challenges in complete darkness. Radar Radar is a technology that’s increasingly being used in physical perimeter security applications. Capable of conducting 360-degree scans of a property on a continual basis every couple of seconds, it is an extremely powerful intrusion detection technology. Radars stand up better than other technologies in difficult conditions such as smoke and fog. When paired with other sensors, false alarms can also be reduced in these conditions – something that is a major challenge more broadly. While law enforcement responds to millions of security alarms every year, a study from the United States Department of Justice's Office of Community Oriented Policing Services previously showed that between 94 and 98 percent of these turn out to be false, costing as much as $1.8 billion a year in wasted police time and resources. LiDAR What is LiDAR? LiDAR has been around since the 1960s, with one of LiDAR’s first use cases was being attached to aircraft to emit laser light towards the surface of the earth to provide distance readings. Spurred by its necessity for the coming autonomous driving revolution, today, the application of LiDAR technology has become more widespread. According to research by Fortune Business Insights, the size of the global LiDAR market is set to surpass $6.7 billion by 2026, a monumental increase on the $1.32 billion spent on LiDAR in 2018. In the security space, LiDAR technology is already proving it carries a string of benefits and upgrades on what is currently available on the video surveillance market. The major upside of LiDAR is that like video, it brings a high level of detail to a physical environment that other sensors simply cannot provide. Pairing Lidar with video, machine learning, AI, and other advanced sensor technologies can help validate alarm accuracy. Indeed, it is technologies such as these, designed to reduce the burden of security personnel by conducting the heavy lifting in alarm validation, that we can expect to become increasingly prevalent soon. Drones It is technologies such as these, designed to reduce the burden of security personnel by conducting the heavy lifting in alarm validation Often referred to as unmanned aerial vehicles (UAVs), drones are another technology that is becoming both more accessible and more capable from a security perspective. In sizable areas of land or hard-to-reach critical infrastructure sites, drones can be dispatched instead of security personnel as a means of first response to an intrusion alert. They can also work in tandem with thermal imaging, radar, lidar, and next-generation video surveillance technologies, either incorporating them onboard directly or supporting them in wider, integrated security infrastructures. Developing the Right Multi-Layered Perimeter Security Strategy These are just a handful of some of the more progressive perimeter security-centric technologies on the market today. The challenge for many organizations is knowing which solutions will suit their needs and address the challenges of tomorrow. Take the time to understand what you need to protect. Is it people, data, or assets? Where do you feel your potential vulnerabilities may lie? By assessing your risks, you will better understand potential target areas and address them accordingly. For perimeter security, a multi-layered solution will likely be the most secure approach. From basic needs to the more advanced, there are a broad variety of possible solutions available. Yet taking the time to understand which solutions are the most successful, cost-effective, and relevant to your business will yield the best results.

Why Access Control Is Important
Why Access Control Is Important

When we talk about security, people are often quick to jump to conclusions and picture bouncers, heavy steel doors and alarms that go off as soon as a door is opened. Access control is in fact one of the most common and least invasive methods of adding extra security to a home, communal or business premises – controlling who is able to enter a space based on the use of entry codes, key fobs, and/or access cards. Communal flats and office blocks are where access control is often an important factor in keeping the building secure, though private residences also have their own lowkey methods of access control with burglar alarms and personalized codes. With that said, what is it that makes access codes so effective across so many spaces – and why are they so important in today’s society? Benefits of access control Every time you visit an office space, enter a block of flats, or drive into a gated community, you will likely be faced with restricted access and a code pad – plus a button to ring through if you are a visitor. This is a prime example of access control, whereby the owner of the premises has installed a gate or security door which requires a code to enter from the outside. Pressing the request button puts you through to a controller who can then either grant access or deny access. The primary benefit of access control is that it ensures that a space remains secure Some of these code pads have cameras so that the controller can see the visitor – some just have a microphone and speaker. The primary benefit of access control is that it ensures that a space remains secure – only visited by those who are granted access. This restriction helps to keep residents and property safe, not only deterring burglars but ensuring that they are unable to gain entry without permission. Access control panels Some of the examples of access control panels in use include: Private car parks, granting access to employees or residents or paying guests based on the location. Communal buildings and flat entranceways, granting access to residents. These kinds of access control panels will have multiple buttons, one for each flat so that guests can buzz and speak to their contacts. Offices, granting access to employees and their guests. Another key benefit of access control is that entry and exit data can be tracked Another key benefit of access control is that entry and exit data can be tracked, and data can be used for anything from tracking the use of a building, to understanding and logging when individuals have entered and left the premises. For those who have ever watched a Detective drama, you will know how crucial this kind of data can be to determining alibis! Replacing lost keys Inhouse, this can also be useful in identifying who is around when an incident occurs, and in ascertaining how many people are in the premises in the event of a fire or emergency situation. On top of knowing when individuals are accessing certain spaces, access controls can also be used to restrict access to spaces during certain time periods – for example at the end of a shift, or overnight. This is most often found in commercial spaces and car parks, as private residences will grant access at all hours to residents. Access control plays an important role in security and can impact everything from your insurance bills and insurance cover to the amount you spend on replacing lost keys. By keeping certain spaces restricted, only granting access to those who are supposed to be there for work or through their private residence, you are able to keep individuals safe and protect them from the effect of theft. Preventing unlawful access Access control is particularly crucial in tracking the movement of employees should an incident occur In a workspace, access control is particularly crucial in tracking the movement of employees should an incident occur, as well as making the life of your team much easier in allowing them to move between spaces without security personnel and site managers present. It can also reduce the outgoings of a business by reducing the need for security individuals to be hired and paid to remain on site. For a private homeowner or flat owner, access control is what grants you the privacy and security that you deserve in your own space. Whether the control is placed on the outside of a bin store, car parks, communal entrance way or your own personal flat, creating barriers to prevent unlawful access can make a private residence more appealing to tenants or homeowners, and can also provide information and data about who has entered a building and when. Vacant property security The value of access control is that there are a range of solutions according to your budget, your requirements, and the way that you intend to use access control across your site or inside space. For the most part, access control is considered to be a cost effective way of increasing security, cutting back on personnel while ensuring that access is only granted to those who are supposed to be a specific space. The value of access control is that there are a range of solutions according to your budget According to construction site and vacant property security company Sicuro, access control systems with a built in camera are becoming increasingly popular, particularly on the exterior of a building when it comes to granting access to visitors – as those inside can see who is asking to be let in. Managing access control Meanwhile, across inside workspaces and sites, access control managed by pin numbers or fingerprints is often sufficient. Access control is an important part of modern security, ensuring that everywhere from office spaces to private residences are protected from unwanted or unlawful visitors. For the most part, access control is managed automatically, tracking and storing data on who has entered and exited a specific space and at what time – though some examples are tracked and managed manually (for example in a school reception or private residence).