Scott Lindley

Scott Lindley
President, Farpointe Data, Inc.Since 2003, Scott Lindley has been President of Farpointe Data. Formerly, he was RFID Director at Keri Systems and Sales Manager-North America for Motorola Indala. As such, he has been directly involved in the growth of electronic access control for over 20 years and has become one of the security industry's leading authorities.
Round table contributions
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud.” Or does there? We asked this week’s Expert Panel Roundtable: What is “the cloud?” Is there agreement in the market about what the term means?
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Industry standards make it possible for systems and technologies to connect and work together. Standards enable today’s integrated systems. But does adherence to standards stifle innovation? Does the necessity to interface using an industry-wide standard slow down the implementation of newer (and possibly not standards-compliant) capabilities? Or do standards eliminate extraneous variables, empower more integration and encourage greater innovation? We asked this week’s Expert Panel Roundtable: How does the use of standards either stifle or jump-start innovation?
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away with a range of thoughts on its changing – and expanding – role in the physical security market (and beyond). We asked this week’s Expert Panel Roundtable: How is a greater emphasis on data changing the physical security market?
Articles by Scott Lindley
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types Of Access Control Authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organizations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasize, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organizations want to use smart phones in their upcoming access control implementations. Smart Phone Access Control Is Secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices. Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone.All that should be needed to activate newer systems is simply the phone number of the smart phone Bluetooth And NFC The Safer Options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defense of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging Systems Could Cause Problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organizations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organizations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
Farpointe Data started 2015 in newly relocated offices featuring a larger, more proficient layout that added new manufacturing equipment and increased its production and inventory capabilities. Shortly into the year, Farpointe introduced new WRR-22 and WRR-44 433 MHz receivers that use either 2-button or 4-button transmitters to open two or four different doors from ranges up to 200 feet (61 m). Each button outputs transmitter data over separate Wiegand outputs, yet the receiver installs just like a Farpointe proximity reader for easy integration with popular proximity or contactless smart card access control systems. This solution, ETL listed to the UL 294 standard, is for long-range access control applications such as gates and vehicle barriers, moving aircraft in and out of secure hangars, arming and disarming alarm systems as well as situations calling for emergency duress. It greatly exceeded our sales expectations. Durable Contactless Readers For Educational & Correctional Applications Another product line that surpassed 2014 numbers were our Guardian vandal-resistant and Gibraltar bullet-resistant contactless readers, which are ideal for installations where more durability is required than with a standard reader. They became big hits, especially at schools, universities, correctional institutions, housing authorities, factories, hospitals and other locales where RFID proximity and smart card readers take a beating. Energy-Saving Cost-Efficient Access Controllers As organizations continue to contain costs in any way they can combined with interest in being as green as possible, Farpointe saw increased interest in access control readers with our fleaPower option, which provides long term energy savings. The fleaPower option is available on all Farpointe Data proximity and smart card readers. In emergency power situations, proximity readers using the fleaPower option to reduce average current draw by as much as 50 percent, providing significantly longer up-times with their back-up batteries. Users and their integrators are learning that there are many ways to obviate card system security, whether via the card itself or via the Wiegand communication protocol. As a result, Farpointe highlighted a series of options and measures that prevent such concerns. The percentage of readers sold incorporating these options increased substantially over 2014 and will continue to grow throughout 2016 as companies address concerns of their access control systems being hacked. See the full coverage of 2015/2016 Review and Forecast articles here
End users continue to move to smart cards and smart readers, wanting the extra flexibilities they offer 2014 was very good year at Farpointe Data. Significantly, it became part of the DORMA group, which helps cement our standing as a global partner of premium RFID solutions, including proximity, smart card and long-range solutions, for access control professionals around the world. This is a good market as there has been sustained migration among end user customers of our OEM system partners to keyless electronic access control. Three trends will continue into 2015 for access control system providers who resell the cards and readers. First of all, end users continue to move to smart cards and smart readers, wanting the extra flexibilities they offer – recognized global standards, higher security levels and multiple applications with a single credential. Some are migrating directly to smart card solutions from mechanical. Next, there continues to be movement of end users wanting to protect their proximity and smart card systems more fully with an additional layer of security. As a result, many access professionals are selecting the MAXSecure option for their end users. It integrates a high-security handshake, or code, between credential and reader to help prevent card and tag duplication and ensure that a facility's readers will only collect data from its coded credentials. Lastly, more and more end users are requesting long-range solutions in the form of receivers and transmitters. Such receivers support either 2- or 4-button transmitters and may be used from ranges up to 200 feet (61 m). Each button outputs transmitter data over its own separate Wiegand output, letting the receiver install just like a proximity reader for easy integration with the most popular card systems. Access control integrators find receivers and transmitters to be a solution for long-range access control applications such as gates and vehicle barriers, moving aircraft in and out of secure hangars, arming and disarming alarm systems, as well as situations calling for emergency duress. Instead of using a card, which could activate more than one device or door at a time, the transmitter holder selects, in the form of a button press, exactly the mechanism to be immediately triggered. See the full coverage of 2014/2015 Review and Forecast articles here
News mentions
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that the Security Industry Association's (SIA) approved Open Supervised Device Protocol (OSDP), which was recently made a global standard by the International Electrotechnical Commission (IEC) and can be used by any manufacturer, has become a major requested feature on Farpointe's mobile, contactless smart card and proximity readers. OSDP provides interoperability among various companies’ access control and security products card readers, door controllers, and other peripherals at secured access doors/gates. Access control installations "Farpointe is honored to be among the first three manufacturers to have earned the SIA’s new OSDP Verified mark on its mobile, contactless smartcard and proximity solutions," advises Scott Lindley, general manager of Farpointe Data. "SIA and IEC encourage broad implementation of the OSDP standard and integrators are following through.” Farpointe is honored to be among the first three manufacturers to have earned the SIA’s new OSDP Verified mark" “The recommendation is to specify OSDP for any access control installations that require real security such as government and other higher-security settings.” With OSDP, all the functions which used to require many physical conductors in the cable run between the reader installed at the physical door location and the access control panel can be fully implemented using just two data wires. Facilitate encrypted communications "Customers especially appreciate that OSDP provides the transfer of large data sets for firmware updates," adds Lindley. "It also fosters clearer instructions for the implementation of SecureChannel, the OSDP encryption piece, to facilitate encrypted communications and updated messages for handling smartcard applications within the protocol.” “OSDP importantly offers the option of secured, two-way encrypted communications between reader and controller. This is independent of the encryption between credential and reader, building trust and confidence. Also, significant to highlight, OSDP is a real SIA and IEC approved industry standard," emphasizes Lindley. "It is not a piece of technology owned by any company and, thus, not proprietary. Today, it is an open standard that is global in scope and available for use by any manufacturer."
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud.” Or does there? We asked this week’s Expert Panel Roundtable: What is “the cloud?” Is there agreement in the market about what the term means?
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Farpointe Data, the access control industry's OEM for RFID credentials and readers, has announced that at ISC East 2019 on November 20-21 in Booth 947, attendees can see how the company’s Conekt mobile smart phone access control identification solution integrates the same advantages for Android smartphones as Apple iOS delivers, such as 3-D Touch, Widget and Auto-Unlock, into the Conekt Wallet App version 1.1.0. All new improvements create the same increased user conveniences for Android users as iPhone users obtained in May. Mobile access credentials Conekt's Android solution provides the easiest way to distribute mobile access credentials" "As these improved Wallet App features have been provided to iPhone end users since May, this new version lets access control system manufacturers, integrators and dealers provide their Android customer base with the simplest to use mobile access credentials in the market," explains Scott Lindley, general manager of Farpointe Data. He adds, "Similar to our most recent Wallet App supporting Apple's latest iOS version13.1.3, Conekt's Android solution provides the easiest way to distribute mobile access credentials with features that include allowing the user to register only once and requiring only the handset's phone number. No portal accounts or activation features are required. By removing these and additional personal information disclosures, we also address privacy concerns that have been slowing adoption of this technology." Parking, lobby and suite specific access control systems For instance, the newly improved Widget lets the user make up to three mobile control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as parking, lobby and suite specific access control systems, directly from the Android's home screen. With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their personal preferred combination. For example, a delivery driver may choose to simply enter the van parking area, receiving dock and restrooms, while the vice president gets access to the boardroom, executive dining room and reserved parking facility. Auto-Unlock with Conekt mobile access credential Lastly, Auto-Unlock lets a user select the Conekt mobile access credential they want as their favorite. Once activated and designated, a little star appears in the upper right corner of the mobile access credential. As the favorite, this mobile credential is transmitted immediately whenever the Wallet App is selected. All new Android Wallet App features are available for immediate no-cost download on the Google Play Store and will continue to operate securely behind the smart phone's PIN code and biometric defenses.
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that its Conekt mobile smart phone access control identification solution now integrates advantages that Apple iOS 12 delivers, such as 3-D touch, Widget and Auto-Unlock, into the Conekt Wallet App, version 1.1.0. All new improvements create increased user convenience. “These improved Wallet App features let access control system manufacturers, integrators and dealers provide their customers with the simplest to use mobile access credentials in the market,” explains Scott Lindley, general manager of Farpointe Data. Mobile Access Control “Our Conekt solution provides the easiest way to distribute mobile credentials with features that include allowing the user to register only once and requires only the handset's phone number. We need no portal accounts or activation features. By removing these and additional information disclosures, we've also addressed privacy concerns that have been slowing adoption of this technology.” The newly improved Widget lets the user make up to three mobile access control credentials as widgets For instance, the newly improved Widget lets the user make up to three mobile access control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as payroll, parking and cafeteria systems, directly from the smartphone's home screen. Biometric Defences With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their own combination. For example, a delivery driver may gain entrance to the van parking area while the vice president gets access to the boardroom. Lastly, Auto-Unlock lets a user select a MAC as their favorite. Once designated, a little star appears in the upper right corner of the mobile access credential. As the favorite, it is transmitted immediately whenever the Wallet App is selected. All new Wallet App features are available immediately and will continue to operate securely behind the smart phone's PIN code and biometric defences.
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announced that end-users, dealers, integrators and system providers can assess how easy it is to convert from card access control to cellphone access control though a quick trial provided by Farpointe Data. By simply clicking on a link or accepting a bar code via their smart phone, individuals can obtain a free cellphone credential. Access Control Systems "What implementers will quickly find when moving from card to smartphone-based access credentials is that many legacy access control systems require the use of back-end portal accounts," explains Scott Lindley, Farpointe Data general manager. "However, newer solutions provide an easier way to distribute credentials with features that allow the user to register their handset only once and need no other portal accounts, activation features or hidden fees." Sensitive End-User Data For hackers, these portal accounts have become rich, easy to access caches of sensitive end-user data. These older cellphone systems also force the user to register themselves and their integrators for every application. The bookkeeping alone can be confusing. For instance, who signs you up, hidden fees, who is in charge of security and who is ultimately responsible can all be questions left unanswered. "Today, all that should be needed to activate the new cellphone credentials system is the phone number of the smart phone," emphasises Lindley.
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that it has moved into its expanded new facility in San Jose, Calif. Since 2003, Farpointe Data has become the trusted OEM partner for premium RFID readers and credentials and the only full-line producer of proximity, smart card, long range and 2nd generation mobile smart phone credentials and readers in various formats for access control professionals around the world. Extremely Competitive Pricing "We have simply outgrown our Sunnyvale facility which served us well for the past four years," reports Scott Lindley, Farpointe Data general manager. "The new San Jose location will help assure that we can continue providing extremely competitive pricing on our full line of products, quick delivery of typically one to three days and lifetime warranty on all readers.” “The introduction of our Conekt smartphone series which eliminates all portals, easing installation procedures and eliminating fees, has created enormous demand. Add to this that researchers predict that 20 percent of all access control users will deploy smartphone systems within the year and you can understand why we needed more space."
By leveraging each other‘s technologies as companies sharing the dormakaba banner, LEGIC and Farpointe Data are at the forefront of the new expanding market for secure mobile credentials. LEGIC‘s 6000 series reader ICs and the mobile service LEGIC Connect are at the heart of Farpointe‘s new, award-winning Conekt mobile smartphone access control solution. Farpointe’s first Conekt products are the K-BLE mobile access credentials and K-SMART3 electronic access readers with Wiegand output that support both mobile and traditional physical credentials. Electronic access control mobile smartphone-based credentials are an evolution of traditional RFID cards and tags, joining proximity and smartcard credentials to identify a user as he moves about a secured facility. Mobile Access Credential Mobile credentials Gartner suggests that by 2020, 20 percent of organizations will use mobile credentials for physical access Mobile credentials make it possible for smartphones, such as the Apple iPhone and the range of Google Android devices, to be used as an electronic access control credential. Mobile credentials Gartner suggests that by 2020, 20 percent of organizations will use mobile credentials for physical access. Security professionals creating electronic access control systems need to be aware that over 95 percent of all adults between the age of 18 and 44 own smartphones. Plus, 69 percent of the entire population already uses smartphones. And, the average smartphone user touches their device 2617 times a day (Dscout Research). Thus, practically anyone using an access system already carries a smartphone. Another way to look at it is that every smartphone user, or almost everybody, could now easily download a mobile access credential. Sensitive Confidential Information High security Conekt recognizes the latest cybersecurity responsibilities expected of access control system providers. Original solutions often compelled end users to disclose sensitive confidential information about themselves and their installation. Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way" The new Conekt solution provides an easy way to distribute credentials with features that allow the user to register only once, needing just the smartphone’s number, and requiring no other portal accounts or activation features. “Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way.” Scott Lindley, General Manager, Farpointe Data, Inc. Classic Access Control Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way. How about using a smartphone as an intelligent key for a car? Want to know where a child or loved one is driving, how fast, if he/she added gas or oil or if anyone else is in the car? How about using it to access the gym, automatically sync to a piece of equipment, immediately gain expert advice or analyze the effectiveness of the workout? Use a smartphone for everything, forget all those other tags and cards. a smartphone will become the passport to all aspects of life, from work to home to avocations. And at a fraction of the investment in traditional credentials, secure mobile Conekt credentials are all anyone will need.
Sielox LLC, a provider of integrated access control, video surveillance, perimeter security, and event management systems, is showcasing mobility in their booth (#7103), here at ISC West with the demonstration of Conekt mobile credentials and readers from Farpointe Data. The mobile reader will work with Sielox’s AnyWare and Pinnacle software platforms connecting to their 1700 Controller. “We are now offering Conekt to provide our customers with a more convenient solution for multiple credentials with significant ease of use and security,” said Karen Evans, CEO and President, Sielox. “With the simple download of a free app to the user’s smartphone, it’s easy to manage credentials and make access control even more seamless.” With its core compliant to the Certified Common Criteria EAS5+ Computer Interface Standard, Conekt resists skimming, eavesdropping and replay attacks Resistant To Skimming, Eavesdropping Integrated with Sielox’s 1700 Controller and the AnyWare and Pinnacle software platforms, Conekt uses Bluetooth to enable communication between smartphones and readers. No personal data is required or collected from the user or integrator, and multiple credentials can be stored on the app. Users can be confident that the solution is hardened for cybersecurity as well. With its core compliant to the Certified Common Criteria EAS5+ Computer Interface Standard, Conekt resists skimming, eavesdropping and replay attacks. AES Encryption For Data Security Conekt makes use of strong AES encryption when transferring data, plus the mobile credentials remain protected behind a smartphone’s security parameters, such as biometrics and PINs, and work only when the Conekt app is in use. “Sielox is an ideal partner to help expand awareness and adoption of our Conekt solution,” said Scott Lindley, Vice President and General Manager, Farpointe Data. “It’s a win for both companies, but even more so for the users who will benefit from this new mobile solution that goes beyond current capabilities to eliminate the frustrations with present smartphone apps and hardware.”
Farpointe Data has announced that access control system manufacturers, integrators and dealers will be able to provide their customers with a mobile, smart phone application and hardware that provides free download, user's choice of smart phone or smart card, and distribution via existing or independent access control software. Multiple Conekt credentials can fit into a single smart phone wallet app. Installer adjustable read ranges can be in excess of 15 feet (4.5 m). Previewed at ISC East so that OEM customers can plan for their own introductions at ISC West in April 2018, the new Farpointe Conekt Series will provide extremely generous gross margins. Demand For Mobile Smart Phone Solution "Our channel customers have been requesting a mobile, smart phone solution that eliminates so many of the frustrations that they have discovered with present smart phone apps and hardware," announced Scott Lindley, general manager, Farpointe Data. "Therefore, we have gone the extra mile to assure that our Conekt solution provides the easiest way to distribute credentials with features that include allowing the user to register only once and needing no other portal accounts or activation features. By removing these and additional information disclosures, we've also eliminated privacy concerns that have been slowing down adoption of this technology.” "We feel this is the type of smart phone based-access control our channel and their customers have wanted" Smart Phone And Wearables "We feel this is the type of smart phone based-access control our channel and their customers have wanted," continued Lindley. "With the Conekt Series, there are no physical cards to order, ship or store, making credential distribution much easier and more profitable. With this app and products, we help our channel customers more straightforwardly enhance existing installations and gain a competitive advantage when bidding on new opportunities. Farpointe has added the features that installers and their end user customers have been wanting for smart phone and wearables-based physical access control." Hardware Cybersecurity With its core compliant to the Certified Common Criteria EAS5+ Computer Interface Standard, Farpointe's Conekt solution provides increased hardware cybersecurity to resist skimming, eavesdropping and relay attacks. With the U.S. Federal Trade Commission (FTC), among others, now holding the business community responsible for implementing good cybersecurity practices, such security has become an increasingly important consideration. Leveraging the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), Farpointe's Conekt solution will interface easily with control panels or other security management systems, fostering interoperability among security devices.
Farpointe Data, the access control industry's trusted OEM partner for RFID solutions, alerted its access control manufacturer, distributor, integrator, dealer, and specifier partners about the potential impact on their businesses of the settlement of Edenborough v. ADT LLC, Case No. 3:16-cv-02233, in the U.S. District Court for the Northern District of California. Referred to as the ADT Hacking Vulnerability Class Action Lawsuit, ADT will pay $16 million to settle five hacking vulnerability class actions because of claims that ADT's wireless security systems were vulnerable to hacking because ADT failed to include any encryption within them. Failing To Implement Good Cybersecurity Practices "This settlement comes on top of the U.S. Federal Trade Commission, through court actions, holding Wyndham Worldwide, a hotel chain, and D-Link, a wireless router and IP camera manufacturer, responsible for failing to implement good cybersecurity practices," emphasizes Scott Lindley, Farpointe Data president. "It's become very clear. If you are involved in any type of security, including electronic access control equipment, you can be liable if you don't provide adequate cybersecurity safeguards. That includes encryption which is readily available." According to Lindley, "All modern contactless smart card credentials support cryptography but legacy credential technology may not. Look for terms such as 3DES, AES (which the government uses to protect classified information), TEA and RSA." Secure Smart Credentials Security professionals should always consider more secure 13.56 MHz smart credentials over 125 KHz proximity cards. "Mifare," a technology from NXP Semiconductors, is a leading brand of contactless smart IC. The newest Mifare standard, DESFire EV1, includes a cryptographic module on the card, adding an additional layer of encryption to the card/reader transaction. DESFire EV1 protection is especially important for customers wanting to use secure multi-application cards for access management, public transportation, or closed-loop e-payment. Another valuable option is Valid ID, an anti-tamper feature for contactless smartcard readers, cards, and tags. Embedded, it adds yet an additional layer of authentication and integrity assurance to traditional Mifare smartcards. Valid ID helps verify that sensitive access data programmed to a card or tag is indeed genuine and not counterfeit. "Whether you need to guard against state sponsored terrorists or the neighborhood teen from hacking the electronic access control systems that you implement and use, security today starts with encryption," warns Lindley. "But, that's just a beginning. To take steps that will further hinder hackers, ask for your manufacturer's Cybersecurity Vulnerability Checklist."
Farpointe Data, the access control industry's trusted global partner for RFID solutions, has just posted the first radio frequency identification(RFID) Cybersecurity Vulnerability Checklist for access control manufacturers, distributors, integrators, and end users to use to protect their access control systems from becoming hacker gateways to their facilities and IT systems. Knowing what to do is especially important now that government agencies, such as the United States Federal Trade Commission, have begun filing lawsuits against businesses that do not provide good cybersecurity practices. "Seemingly daily, end users are being reminded of how their access control systems are no longer secure," emphasises Farpointe Data President Scott Lindley. "They learn how a hotel had to pay a ransom to release guests that got locked into their rooms via a hack of the electronic key system or how easy it is to spoof popular access cards." Series Of Cybersecurity Attacks Since the start of 2017, end users have been informed of a series of hacks on various credentials states Lindley. The Chaos Computer Club stated that they "hacked a padlock product and its accompanying mobile app which communicates via Bluetooth Low Energy (BLE) to the padlock. This could potentially also affect hotels with mobile room keys as their door locks also communicate with smart phones via BLE technology and exchange confidential information." IPVM reported how a $30 copier easily spoofed a popular proximity card. The column stated that the copier "used to copy the cards works much the same way as normal card readers, with transceiver coil, power supply, IC chip, buzzer and even LEDs components shared by both. Given the principal operation of contactless card readers, the copier excites the coil and delivers power wirelessly to the card, which then momentarily stores energy and then uses it to broadcast card details back to the copier." In an on-site demonstration at the ShmooCon hacker conference, an ESPKey, a small device that costs about $100 to make and has half a dozen wire clamps, a Wi-Fi transmitter and 4MB of memory, showed that it takes two or three minutes to break into an RFID card reader wall plate, attach the ESPKey and reinstall the wall plate to capture the ID codes of everyone in the workplace. Prevention Of Cybersecurity Attacks To help prevent such attacks, the new Farpointe Cybersecurity Vulnerability Checklist covers a range of topics that can lead to hacks of contactless cards and readers. Sections include default codes, Wiegand issues, reader implementation tips, card protection solutions, leveraging long range readers, assuring anti-hacking compatibility throughout the system and leveraging additional security components. "We are encouraging every access control manufacturer, dealer, distributor, integrator or end user to go to our website to either download or print out this Cybersecurity Vulnerability Checklist and use it," adds Lindsey. "The link is available right on our home page. With increasing news stories of hacking throughout the world and the fact government agencies are now reviewing such cybersecurity lapses should make channel partners providing access control products and systems take notice and implement anti-hacking solutions, such as Farpointe provides, to their customers."
The enthusiasm of ISC West 2017 continued through to the final hours of Friday, reflective of a show jam-packed with new technologies to address industry trends. Exhibitors seemed happy enough with booth traffic, which held up even on the final day. Security Industry Trends Industry trends drove much of the technology. For example, cameras are getting less expensive, which means it’s more cost-effective to specify systems with higher camera counts. Also, cameras are providing more data than ever, including megapixel and 4K resolutions and retention times are getting longer, driven both by regulatory issues and the increasing use of video in operational functions beyond security. These trends point to a growing importance of video data storage systems. Themes at ISC West included the need for integrators to consider carefully system storage requirements, and that storage systems should be designed specifically for use with video. Seagate Technology Skyhawk Seagate Technology emphasized the importance of simplicity related to video storage, which should be easy to buy, to deploy and to upgrade. For systems up to 64 cameras and needing up to 10 terabytes of storage, Seagate offers the Skyhawk NVR/DVR-ready system, compatible with all the large video management system (VMS) partners. Image Perfect software optimizes the equipment for use with video, resulting in fewer dropped frames. Higher security smart cards such as MIFARE DESFire EV2 can provide additional security instead of prox cards Beyond 64 cameras, Seagate offers more sophisticated, customized systems; up to a petabyte of storage; and the ability to stack additional units for expansion. A common mistake when specifying storage is to underestimate capacity need. Because camera prices are coming down, it’s easy to add more cameras as a system plan evolves, but the additional cameras must also be considered in the storage equation. Promise Technology SmartBoost Promise Technology was another storage company with a high profile at ISC West, also highlighting products that are optimized and built specifically for the video market. The company’s SmartBoost technology refines how the system reads and writes data. It uses tools and algorithms such as Predictive Playback and a sequential pattern recording (Full Stripe) feature to reduce the CPU load and optimize performance. The result is more efficient and dependable operation – and no lost video frames. Quantum simplifies the complexity of storage for end users – unifying various tiers of storage and presenting it as a single “drive letter.” Invisible to the end user, Quantum’s system manages multiple tiers of storage, including high-performance primary, high-capacity secondary, less expensive file-based tape and even cloud storage. Cybersecurity In Access Control Attendees will have heard a lot about cybersecurity at ISC West, mostly as it relates to IP video systems, but it is also an issue for access control. Scott Lindley, president of Farpointe Data, says too many companies – including big corporations – are leaving their access control systems unnecessarily vulnerable to being hacked. Two points of vulnerability in particular are 125 kHz prox cards and the Wiegand interface. Both are older technologies that continue to be used although there are more secure choices easily available. Higher security smart cards such as MIFARE DESFire EV2 can provide additional security instead of prox cards, as can addition of two-factor authentication such as a keypad requiring a personal identification number (PIN). Alternatives to the Wiegand output include ABA Track 2, TCP/IP and the OSDP (Open Supervised Device Protocol) interfaces. Use of long-range readers can make systems more secure by enabling a reader to be located inside a secure area, up to 200 feet away and less susceptible to tampering. Security Robotics At ISC West There were several security robot companies at ISC West, including a section called the “Unmanned Security Expo.” One robotic company on display was Robotic Assistance Devices (RAD). They are using a robot "base" from SMP Robotics and adding additional intelligence (from NVIDIA). The first products should be available in July, after which RAD looks to produce 25 to 50 robots per month The idea is a robot that can detect humans and vehicles (to take the place of guards). There is a sophisticated system for navigation and avoidance. The robot collects information along its route; takes snapshots of what it "sees,” and uses scene matching to interpret what it encounters. The "layered" visual navigation system has been in development for seven years. The first products should be available in July, after which Robotic Assistance Devices looks to produce 25 to 50 robots per month. They are taking "pre-orders” – $1,000 will reserve you a robot. Reportedly, “demand has been in the hundreds." They won't be selling the robots, but rather "renting” them at a rate that equates to around $7 per hour (24 hours a day/seven days a week). Critical infrastructure is one major market. All in all, it was a great show and it could have gone on for two more days at least. (For some of us, delayed by canceled Delta flights, it might as well have. I finally returned home on Monday morning after a “bonus” weekend in Vegas.)
Wiegand over-the-air protocol is no longer secure due to its original obscure and non-standard nature Farpointe Data, the access control provider of RFID solutions, is notifying its access control manufacturers, distributors, integrators, and dealers that hacking of access control systems has become a threat far bigger than most think. Protecting their end-users from hackers is imperative for channel partners. Cyber Security Breaches "The U.S. federal government suffered a staggering 61,000 cyber-security breaches, that it knows of, last year alone," reports Farpointe Data President Scott Lindley. "Several recent events highlight the importance of why the access control channel must work with their customers to deal with accelerating hacking attacks." According to Lindley, the most important is that the U.S. Federal Trade Commission (FTC) has decided that it will hold the business community responsible for failing to implement good cyber security practices and is now filing lawsuits against those that don't. An appeals court has backed its lawsuit against the hotel chain operator Wyndham Worldwide for not protecting consumers' information and, just recently, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers. Wiegand Over-The-Air Protocol "Prospective penalties go beyond FTC threats, though," Lindley warns. "A luxury hotel in Austria, the Romantik Seehotel Jaegerwirt, recently had to pay hackers a ransom after they managed to access its electronic key system and lock all the hotel guests in their rooms. Approximately 180 people were staying at the hotel on that day. Many were locked in their rooms, while others were locked out of theirs. The hackers demanded €1,500, about $1,600. The hotel decided to pay, explaining that they felt that they had no other choice, especially because neither police nor insurance could help them." "The U.S. federal government suffered a staggering 61,000 cyber-security breaches, that it knows of, last year alone" Adding to the problem, states Lindley, is that Wiegand, the industry standard over-the-air protocol commonly used to communicate credential data from a card to an electronic access reader, is no longer inherently secure due to its original obscure and non-standard nature. MIFARE DESFire EV1 Smartcard Platform For this reason, Farpointe has introduced features such as potting all readers and options that can be added to the readers. The first is MAXSecure, which provides a higher-security handshake, or code, between the proximity or smart card, tag, and reader to help ensure that readers will only accept information from specially coded credentials. The second is Valid ID, a new anti-tamper feature available with contactless smartcard readers, cards, and tags. It can add an additional layer of authentication assurance to NXP's MIFARE DESFire EV1 smartcard platform, operating independently, in addition to, and above the significant standard level of security that DESFire EV1 delivers. Valid ID lets a smartcard reader effectively help verify that the sensitive access control data programmed to a card or tag is not counterfeit. "With the increasing incidences of hacking throughout the world and the fact that the FTC is now reviewing such cyber security lapses should make channel partners providing access control products and systems take notice and suggest anti-hacking solutions to their customers," Lindley argues.
Farpointe’s tactile laser engraving option creates an extra level of security for proximity and smart card access control solutions Farpointe Data, the access control industry's global partner of choice for premium RFID solutions, announced that security system access control manufacturers, integrators and dealers can order proximity and smart card credentials with tactile laser engraving. Whether clamshell, printable, printable with magnetic stripe card or key ring or disc tag, Farpointe will permanently laser engrave logos and text, URLs, signature blocks, messaging, other graphics or whatever the manufacturer, integrator or end customer wants. "Many system manufacturers, integrators and dealers find that monochromatic credential laser engraving is helpful in building their brand and encouraging credential re-orders," relates Scott Lindley, Farpointe Data president. "Laser engraving provides a longer lasting, much cleaner appearance than dye sublimation printing. It remains for the lifetime of the card." Widespread Usage According to Lindley, the laser engraving for security purposes is ideal for identification cards. Recently, laser engraving is becoming much more widespread in its use. Historically, dye transfer has been the preferred method for adding graphics on identification cards but laser engraving is quickly surpassing it worldwide. Tamper-Proof Solution Laser engraving lets security systems manufacturers, integrators and dealers mark access cards and tags permanently, creating an extra level of security by ensuring their credentials are safe from fraud with a tamper-proof solution. The extremely high quality tactile images and text can be highly individualized for each customer's or organization's needs while meeting security standards imposed by national and international law. The laser printing option is available from Farpointe now.
OSDP helps ensure that numerous manufacturers' products will work with each other The Open Supervised Device Protocol (OSDP) is a communication standard adopted by the Security Industry Association (SIA) that lets security equipment, such as card and biometric readers from one company interface easily with control panels and equipment from another manufacturer. In other words, OSDP fosters interoperability among security devices. It also adds sophistication and security benefits through features such as bi-directional communication and read/write capabilities. Forward-Looking Security Applications A two-way channel paves the way for forward-looking security applications such as the handling of advanced smartcard technology, PKI, and mobile device access. Not only does it provide a concise set of commonly used commands and responses, it eliminates guesswork, since encryption and authentication is predefined. How will that impact security equipment manufacturers, integrators, and users? Here's one example. For years, Wiegand has been the industry standard but it is no longer inherently secure due to its original obscure and non-standard nature. Plus, the multiple definitions associated with the Wiegand name have created confusion over the years. OSDP moves us forward. Continuous Security Monitoring OSDP helps ensure that numerous manufacturers' products will work with each other. Interoperability can be achieved regardless of system architecture. For instance, the specification can handle smartcards by constantly monitoring wiring to protect against attack threats and serves as a solution for high-end encryption such as required in federal applications. The specification for handling LEDs, text, buzzers, and other feedback mechanisms provides a rich, user-centric access control environment. OSDP helps ensure that numerousmanufacturers' products will workwith each other. Interoperabilitycan be achieved regardless ofsystem architecture Significantly, the SIA Access Control & Identity Subcommittee is in the process of making OSDP v 2.1.6 an American National Standards Institute (ANSI) standard. Many manufacturers have already implemented OSDP and there are many other companies with OSDP devices in development. To encourage this, the SIA has released tools that will ensure that these numbers continue to grow. SIA Open OSDP Test Tool Software The SIA Open OSDP Test Tool is open-source software that lets manufacturers of OSDP compatible equipment test their products against the specification. The test tool emulates an OSDP peripheral device or an OSDP control panel or acts as a message sniffer between two real OSDP devices. The test tool runs on several widely available and low-to-no-cost platforms and hardware. It reduces physical barriers to achieving interoperability such as shipping prototypes to numerous vendors for testing. The underlying source code, also available, is another aspect of the tool that can be leveraged by device manufacturers in developing their OSDP interoperable products. Because it is backed by the SIA, OSDP is going to become very visible. It is recommended that those dealing with smart security in any format will want to start incorporating the use of the OSDP standard in their equipment and systems. Save
Farpointe Data’s P-640 and P-620 proximity readers and Delta6.4 smart card reader meet the impending requirements for 2-factor authentication as described by NIST’s federal guideline Farpointe Data, the access control industry's trusted global partner for RFID solutions, announced that its Pyramid P-640 proximity card reader with keypad, P-620 mullion style proximity card reader with keypad and Delta6.4 smart card reader with keypad meet the impending requirements for 2-factor authentication as described by the National Institute of Standards and Technology (NIST) federal guideline. Two-factor authentication is achieved because the card is something you carry and the PIN (Personal Identification Number) is something you know. Incorporating Two-Factor Authentication "Next year's deadline for incorporating the 2-factor solution is quickly approaching so we encourage our integrator partners to contact their federal contractor customers immediately," emphasizes Scott Lindley, president of Farpointe Data. "Whether the customer prefers a proximity, standard size or mullion, or smart card reader with keypad, we are often able to help our access control system partners by shipping any of these models in no more than three days to their integrators, thereby assisting their federal contractor customers meet the deadline and not be subject to a fine." The new NIST SP800-171 guideline states in Section 3.5.3 that federal contractors must "use multi-factor authentication for local and network access to privileged accounts and for network access to non-privileged accounts" or risk losing their contracts. This is to ensure only authorized individuals may have physical and logical access to critical assets. Strong two-factor authentication must be used for remote access to the networks, access to the physical security perimeter, access to the electronic security perimeter and access to specific critical assets. Life-Time Warranties The P-640 and P-620 proximity readers and Delta6.4 smart card reader carry lifetime warranties even though, in federal applications, many of the readers are slated to be used outdoors in dusty or humid environments. The card/keypad combinations are designed to meet IP67 certification and feature tamper-proof and weather-resistant epoxy potting to avoid problems with dust, mist or water. They work in temperature extremes from -40°F to +149°F (-40°C to +65°). With distinctive blue backlit keys, the 2-factor validation solutions are very easy to read in dark environments. Save
Experts sections
How To Ramp Up Perimeter Security With License Plate Reader Technology
DownloadSolve Access Control Challenges in the Healthcare Sector
DownloadGetting the Most Value From Software Subscription Agreements
DownloadShifting Trends in Operation Centers and Control Rooms for 2021
Download