Power supplies & batteries - Expert commentary

Key-Centric Access Management System: Providing The Highest Possible Levels Of Security
Key-Centric Access Management System: Providing The Highest Possible Levels Of Security

In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximize benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realize the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronized to the management terminal. Remote authorized unlocking With the key-centric access management system, remote authorized unlocking can be realized Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorized unlocking can be realized. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.

Wire-Free, Mobile First And Data Rich? The Future Of Access Control Is Within Almost Anyone’s Reach
Wire-Free, Mobile First And Data Rich? The Future Of Access Control Is Within Almost Anyone’s Reach

The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labor costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organizations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practise, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.

Surge Protection For Security Installations: 2017 Saw Increased Investment
Surge Protection For Security Installations: 2017 Saw Increased Investment

In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive Approach To Risk Mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 And Beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond.  Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating Security Integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.

Latest Axis Communications news

LENSEC Launches Perspective VMS Version 4.4.1 That Will Provide Users Access To Integrations With Intrusion
LENSEC Launches Perspective VMS Version 4.4.1 That Will Provide Users Access To Integrations With Intrusion

LENSEC, the provider of IP-based video surveillance management, announces the release of its perspective VMS Version 4.4.1 that will provide users access to integrations with intrusion, access control, and video surveillance companies and the ability to pair critical video data with input sensors from access control and intrusion detection platforms. In consecutive months, LENSEC has released Version 4.4.0 and 4.4.1 to allow customers access to a broad array of new features and integrations within its Unified Security Management Platform. Security management platform Perspective VMS® (PVMS) is the central component of a security management platform, allowing users to access critical security and business operations data via a video-centric interface, pairing live or archived video data feeds with various integrated security or building automation components. The releases of PVMS 4.4 allows users access to new and/or improved integrations with DMP The releases of PVMS 4.4 allows users access to new and/or improved integrations with DMP (Intrusion and Access Control), Open Options’ DNA Fusion Access Control, CredoID Access Control, RS2 Access It! Access Control, and Axis Body Worn Camera Systems. The PVMS 4.4 release also introduces new methods of archive video playback leveraging WebAssembly (Wasm) for large megapixel cameras with higher frame rates, allowing for faster archive playback and review. Several user interface modifications were made as well to improve the overall user experience for novice and advanced users. A complete list of features can be found on LENSEC’s website. Additional body cameras “PVMS 4.4.x allows users an improved opportunity to take advantage of integrated sub-systems, pairing critical video data with input sensors from various access control platforms and intrusion detection,” says LENSEC’s Chief Product Officer, Jeff Kellick. “Of note, the integration with the Axis Body Worn Camera system is a huge benefit to districts or municipalities leveraging video evidence on behalf of their officers and staff with the ability for retrieval and review directly within Perspective VMS.” “This integration also allows for a combination of evidence data points within a single interface. Along with the body camera video, users or operators have side-by-side (synchronized) access to additional body cameras, fixed cameras, PTZ cameras, audio, as well as integrated sensor data, all of which allows for a more complete investigation of events.” Perspective VMS® Version 4.4 is available for download now. Existing users can contact their systems integrators for support or upgrades of their current version.

Electronic Security Association Successfully Wraps Up Their Virtual ESX 2021 By Delivering Educational Content And Networking Opportunities
Electronic Security Association Successfully Wraps Up Their Virtual ESX 2021 By Delivering Educational Content And Networking Opportunities

The Electronic Security Expo (ESX) 2021 Virtual Experience, presented by the Electronic Security Association (ESA), wrapped up on June 17, delivering a wide breadth of educational content, product innovations, and networking opportunities. Security professionals from all corners of the industry attended ESX to hear from thought leaders and industry experts on business strategies and best practices. The Main Stage delivered thoughtful strategies for security dealers, integrators, and monitoring companies to implement into their businesses. During the opening keynote, sponsored by NAPCO StarLink, Ryan Estis delivered a powerful message on how to take the company to the next level with his ‘Adapt and Thrive’ presentation. Industry-Specific sessions At the OpenXchange, sponsored by Security Central, the CEOs of Brilliant, RapidSOS, and RSPNDR gave their perspectives on how security professionals should consider navigating the changing competitive landscape. And for the General Session, sponsored by NMC, John Mack from Imperial Capital provided a session about the challenges, trends, and opportunities in the business of security.   Over 24 educational sessions, presented by industry peers and business experts, revealed best practices and ideas on how to achieve exceptional operational and financial performance and gain valuable business strategies. Industry-specific sessions and case studies delivered actionable content for a wide range of solutions for security professionals to consider and adapt. Attendees also benefited from a host of opportunities to review the latest technologies and product innovations in the industry. Smart home systems The Innovation Award program recognized breakthrough technologies that were recently introduced Through the Virtual Expo and TechTalks, solutions providers, such as ADI, Alarm.com, Axis, DMP, NAPCO, and Resideo, showcased products and services that help security professionals provide more value to end-users, and increase revenues and profits. As part of the overall ESX 2021 Virtual Experience program, the Innovation Award program recognized breakthrough technologies that were recently introduced to the market. More than a dozen products were recognized as category winners across a portfolio that included access control, intrusion systems, monitoring systems, video surveillance, and smart home systems. "Once again, ESX brought together the best and most innovative business leaders along with a full suite of highly relevant and valuable content, to learn, share, and explore new ways to leverage technology and business strategies that drive the security industry forward,” said George De Marco, ESX Chairman. Mark the calendar and stay tuned for more information about ESX 2022, taking place live and in-person June 14-17, 2022, Fort Worth, Texas.

SAFR From RealNetworks, Inc. To Showcase Latest Version Of Computer Vision Platform At ISC West 2021
SAFR From RealNetworks, Inc. To Showcase Latest Version Of Computer Vision Platform At ISC West 2021

At ISC West 2021, in booth #11109, SAFR from RealNetworks, Inc., the premier facial recognition platform for live video, will showcase the latest version of its high-performance computer vision platform. Attendees will be able to see demonstrations of SAFR for Surveillance, featuring VMS integrations with Genetec and SAFR Inside edge integrations with Axis cameras, as well as NVIDIA and Android platforms. SAFR for Access Control SAFR for Access Control will also be on display along with a new Passive Liveness detection feature, improving the security of unattended access control use cases and immediately alerting security teams to an attempted in-progress perimeter breach. With fast, accurate, unbiased face recognition and additional face and person-based AI features, SAFR leverages the power of AI to enhance security and convenience for customers. Touchless secure access control SAFR has the best combination of live video performance and low bias of any facial recognition system" Specializing in touchless secure access, real-time automated surveillance, and digital identity authentication, SAFR is optimized to process video from virtually any camera or camera-enabled device or run inside devices with embedded AI-enabled chipsets. “SAFR has the best combination of live video performance and low bias of any facial recognition system on the market,” said Brad Donaldson, Vice President, Computer Vision & General Manager, SAFR, adding “We’re looking forward to connecting with everyone at ISC West again to show the continued evolution of this powerful platform.” Transforming security operations SAFR turns live video feeds into data streams that transform security operations. Users can identify persons or activity of interest in real-time, and alert teams immediately so that they can respond faster. SAFR enables operators using popular systems from Genetec, Milestone Systems, Avigilon, Digifort, Geutebrueck (GEUTEBRUCK GmbH), and Panasonic to boost their VMS with state-of-the-art facial recognition technology. SAFR Alerts SAFR Alerts and person-related event data are available in the VMS, enabling surveillance staff to remain focused on the VMS while benefiting from advanced analytics only available from SAFR. SAFR will also be showcasing its solutions in Axis Communications’ booth #14051, at ISC West 2021. Demos will include SAFR Inside (Axis integration), SAFR Dual-Factor Access Control, and SAFR for Real-Time Monitoring.