Articles by Greg Berry
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
ASSA ABLOY, the globally renowned provider of door opening solutions, has collaborated with long-time security partner, LenelS2 to enable mobile access to IP-enabled IN Series access control locks via the LenelS2 BlueDiamond app. Through the app, users can pre-load their most frequented pathways to enjoy streamlined access to doorways, use their phone as a badge even while it remains in a pocket or bag, and utilize voice commands on their smart phone or other connected device to conveniently unlock and open doors. This facilitates enhanced security that helps prevent unauthorized access of information. IN120/IN220 locks integration with ASSA ABLOY access control IN120/IN220 locks work with ASSA ABLOY IP-enabled Access Control Partner software IN120/IN220 locks work with ASSA ABLOY IP-enabled Access Control Partner software, allowing straightforward integration into new or existing access control systems. These system integrations allow for easy changes to access rights, detailed transaction history and other advanced functionality options. “Working together, ASSA ABLOY and LenelS2 are committed to making access to spaces more seamless and convenient without compromising security,” said Joseph Sceviour, Product Manager for ASSA ABLOY’s wireless solutions, adding “We are excited about the flexibility that the BlueDiamond app offers users of IN120 and 220 Series access control locks.” Enhanced access control solution “Further expanding the BlueDiamond ecosystem supports our objective to provide a next-generation, convenient and more secure access control experience,” said Greg Berry, Vice President, Mobile Credentialing, LenelS2, adding “We look forward to bringing this experience to IN120 and 220 users.” IN120 and IN220 are ANSI/BHMA Grade 1 locks available in cylindrical, mortise, multi-point and exit device configurations. They are offered in a wide range of finishes and decorative levers that complement any design style, to serve designers and architects in a variety of vertical markets.
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload