Door access control
With security threats on the rise, LILIN Americas is answering the call by introducing an advanced yet easy-to-install Access Control System for monitoring entry to a building, resulting in a safer environment for personnel and assets. When integrated with other platforms such as IP cameras, fire alarms, and sensors, the system provides a layered security approach that significantly enhances peace-of-mind and acts as a deterrent for theft and vandalism. "The LILIN Access Control System is a sin...
Camden is proud to introduce its newest innovative offering - Kinetic by Camden. This advanced 900 Mhz. ‘power harvesting’ wireless system uses the energy created by the operation of the switch to power the wireless transmitter. There are no batteries to maintain or replace and no hazardous waste entering landfill. Kinetic by Camden is the only ‘power harvesting’ wireless system to feature an ultra-compact receiver (easily installed in automatic door operator cabinets),...
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the conveni...
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis access control system. Personal Identity Verification In a market that has been traditionally weighed down by limited solutions that are often proprietary, these new options offer non-proprietary, open-a...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasizing the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official tur...
Johnson Controls has updated its Tyco Software House C•CURE 9000 security and event management system with new tools to optimize its security operations. Enhancements include metatags, broadened search capabilities and enhancements in video association, along with adding an additional layer of security with Multi-Factor Authentication mobile integration. C•CURE 9000 v2.80 users now have the ability to add two-factor authentication without needing to upgrade readers. With this added la...
The 2019 editions of Shanghai Intelligent Building Technology (SIBT) and Shanghai Smart Home Technology (SSHT) will be held from 3 ‒ 5 September at the Shanghai New International Expo Centre (SNIEC). Spurred by the fast development of China’s intelligent building, Internet of Things (IoT) and Artificial Intelligence (AI) sectors, the two exhibitions are close to capacity as there has been strong demand from exhibitors to participate at the shows. Smart neighborhoods The total exhibition space is also expected to reach a record of over 28,750 sqm The concurrently held trade fairs are expected to attract over 280 renowned businesses from China and overseas, and welcome a similar number to last year’s 29,423 professional visitors. The total exhibition space is also expected to reach a record of over 28,750 sqm. Fairgoers to SIBT and SSHT will not only be treated to the usual array of smart home and building technologies and solutions, but will once again be able to visit the returning Parking China fair, while a debut ‘Shanghai Smart Office Technology’ (SSOT) feature zone will add yet another element to these growing group of exhibitions. Covering key topics such as IoT, AI, big data, robots, smart offices, smart parking, home security, HVAC, energy conservation, 5G, smart neighborhoods and smart cities, fairgoers and exhibitors alike can benefit from a one-stop market and purchasing platform which positively bring together multiple different industries. Smart parking industries On the development of SIBT, Ms Lucia Wong, Deputy General Manager of Messe Frankfurt (HK) Co Ltd said: “As SIBT welcomes its 13th edition, I must express my sincere gratitude for the unwavering support from the industry. Devoted to demonstrating cutting-edge technology and innovative products, we are looking forward to highlighting new market trends and welcoming fairgoers this September.” Ms Wong also shared her optimism on the fifth edition of SSHT, stating: “The fairs have grown alongside the market. By exploring advanced technology and top-tier products, we strive to promote the widespread implementation of smart homes.” In line with recent policies implemented by China, green building and renewable energy initiatives are being promoted in different parts of the country, while intelligent buildings have also become a common sight across cities. China’s IoT capabilities are also developing rapidly which extends to the smart building, smart office and smart parking industries. Cross-Industry cooperation Over 280 exhibitors from multiple sectors will congregate at the shows As 5G and AI technology continue to improve, smart home is now more than a fictional concept but a lifestyle that is gradually taking over traditional homes. Full smart home implementation are expected to soar in popularity with sensors becoming the epicentre of smart homes. With the rapid development of 5G technology and the enhanced applicability of AIoT and IoT operation systems, the future of home industry will be brimming with exciting possibilities. With both fairs placing a strong emphasis on ‘AI+IoT’, SIBT and SSHT will work in synergy to bring together IoT and smart building suppliers, encouraging cross-industry cooperation and communication. Over 280 exhibitors from multiple sectors will congregate at the shows including Schneider, Hisense, Ezviz, Ave Leelen, ANJUBAO, Dnake, Legrand China, SUREN, ORVIBO, Baiwei, FANTEM, HaiLin, Shuncom, KNX, EnOcean, Crodigy, A-OK, wistarmotor, HDL, Grandland, Daming Laffey, UIOT, Eastsoft, Savekey, Wintom Sun-shade, Auxdio, Sonos, aminasound, D&M, Cinemaster, Levoice, Elite, Changsha Yidai, Ningbo Hope, Bao Feng Cinema, WTi Group, ALCATEL, Dongguan Taitron, and more. Smart control systems Selected exhibitors and their innovations include: HDL - HDL showcases integrated smart control systems, one-stop solutions and equipment. New products on display include the multipurpose S10 touch screen and other smart panels. Ezviz - Concentrating on the safety-related aspects of smart living and technology, the company will demonstrate its intelligent air quality sensor with remote access and history function, as well as its video recorder with internet-connection, 360° high-speed rotation, intelligent human detection, acoustic location, and other functions. Legrand China - Legrand China will offer visitors a multitude of new smart home appliances and systems, including intelligent switches for window blinds, switch modules, gateways, smart plugs, wireless IR transmitters, controllers, and door and window detectors. FANTEM - The latest upgrade to its home system, OOMI3.0, is a stability solution for wireless connections in mansions and duplexes. Targeting the needs of families and those that require large-scale systems, it supports scenario settings with the use of multiple gateways. CTTL-Terminal Labs summit forum envisions smart living Every edition of SIBT and SSHT introduces cutting-edge industry technology through a diverse program of concurrent events. This year, SIBT will be collaborating with CTTL-Terminal Lab under the China Academy of Information and Communications Technology (CAICT) to present forums on smart cities, neighborhoods and buildings. Under CAICT, CTTL-Terminals Lab specializes in ICT development research, product standards and testing, and new ICT development research, offering all-round support for related industries. Led by the lab, this year’s forum will introduce a number of renowned speakers to discuss their latest research on industry trends and innovative new technology. Smart office solutions A new ‘Smart Office’ zone will debut this year to explore the growing market demand for smart office solutions. The zone will highlight a number of technologies and solutions that provide optimal performance for office facilities using IoT and connected technology. The show will explore improved urban parking resource management and better parking eco-systems in buildings The smart parking sector will also be under the spotlight as the Parking China fair will once again be held concurrently to provide a high-level international platform for smart parking solutions in cities. To help the industry thrive, the show will explore improved urban parking resource management and better parking eco-systems in buildings. SIBT is organized by Guangzhou Guangya Messe Frankfurt Co Ltd, Shanghai Hongshan Exhibition Service Co Ltd, China Council for the Promotion of International Trade – Shanghai Pudong Sub-Branch, and The Intelligent Engineering Branch of China Exploration & Design Association. Building technology exhibitions The organizers of SSHT are Guangzhou Guangya Messe Frankfurt Co Ltd, Shanghai Hongshan Exhibition Service Co Ltd, China Council for the Promotion of International Trade – Shanghai Pudong Sub-Branch, and China Smart Home Industry Alliance. The two fairs will be held from 3 – 5 September 2019 at Shanghai New International Expo Centre in China. SIBT and SSHT are both headed by the biennial Light + Building event in Frankfurt, Germany. The fair will be held once every two years. The next edition will be held from 8 -13 March, 2020. Messe Frankfurt also organizes a series of light and building technology exhibitions in Asia including Guangzhou Electrical Building Technology, Guangzhou International Lighting Exhibition and Shanghai International Lighting Fair. The company's light and building technology fairs also extend to markets in Argentina, India, Thailand, Russia, the UAE and other countries and regions.
BlackWire Designs, a distributor in the custom installation market, announced that the company is now offering ProDataKey's (PDK) pdk.io, the industry's first completely cloud-based wireless access control system. The plug-and-play solution is easy for dealers to install, highly scalable, and simple for end users to manage. With its easy-to-use interface, pdk.io allows users to effortlessly manage cloud access control and see the status of every facility door in a single glance, while streamlining the programming process for installers. The platform provides full mobile management from any internet-connected device, real-time monitoring and customisable alerts, automated updates, six months of cloud backups, and more. Better customer experience "Unlike typical access control systems that are extremely complex and require the IT department or a dedicated employee to manage, pdk.io features an intuitive interface that eliminates any learning curve," said Kevin Luther, owner of BlackWire Designs. We are excited to add PDK to our product line-up and to bring all of these benefits to our dealers and their customers""For dealers, this means fewer support calls and a better experience for their customers. And any issues that do arise can be addressed off-site, opening up the possibilities for recurring monthly revenues through remote management programs. We are excited to add PDK to our product line-up and to bring all of these benefits to our dealers and their customers." Quick and cost-effective door installation Each PDK system is built around a CloudNode or a rack-mount CloudNode SE gateway, which connects to the door hardware and network. The CloudNode can be used as a stand-alone device for single-door installations or can connect with up to a thousand doors on a single platform. Doors can be quickly and cost-effectively added with Singleio or Eightio plug-and-play controllers, which offer the flexibility of network, PoE, and wireless connectivity options and are equipped with a fully supervised power circuit that monitors input, output, battery voltage, and overall controller health. Available system readers include the standard Mullion-style, ruggedised touchscreen keypad and the ruggedized HD reader with an eye-catching stainless-steel design. PDK will also soon be introducing a Bluetooth reader for credentialing via mobile devices.
Eagle Eye Networks, the provider of cloud video surveillance worldwide, announced a new partnership with Salto Systems, a global provider of access control systems. In the new and improved Salto KS application, the Eagle Eye Cloud VMS Surveillance product has been integrated via cloud to provide Salto KS customers a more cyber-secure video experience connected to access control events. Within the Salto KS mobile app, a user can confirm a person’s identity before remotely granting access to any door, and share the video footage with offsite, cloud back-up. These and other features delivered by the Salto KS / Eagle Eye Networks Cloud VMS integration, provide considerable benefits to end users in various verticals that need a seamless integration between video and access control. Additionally, the partnership showcases the continuous expansion within the Cloud ecosystem of security products manufacturers. Benefits of cloud integrations “It is great to be able to provide this integration with what we perceive is our twin in the industry for CCTV. Twins because our companies are almost the same age, we share the Cloud vision and both share core values like security, reliability and both sell and support through a global network." - Rick Voogt, MD SALTO KS. SALTO KS provides a flexible access control management system that requires no software to be installed Through secure, restful APIs, cloud integrations are superior to on-site integrations in terms of speed, security and the redundancy of valuable customer data. For system integrators, this new partnership enables valuable opportunities to gain stickier customer relationships with monthly recurring revenues on both video and access control products. Cloud-Based wireless access control system SALTO KS provides a flexible access control management system that requires no software to be installed. The modern cloud-based, wireless access control system is simple to use and the configuration with an Eagle Eye Cloud VMS customer account can be quickly accomplished in a few easy steps with the appropriate Eagle Eye Networks’ customer account credentials. “We are pleased to work alongside Salto Systems globally to provide a better user experience for both end users and channel partners,” says Dean Drako, CEO and Founder of Eagle Eye Networks. “Cloud systems are rapidly becoming the better option in physical security and we are determined to continue leading the transformation with strong partnerships like this one with Salto Systems.”
Continental Access, a division of Napco Security Technologies Inc., is pleased to announce its uniVerse Series Single-Door Controllers, featuring “EZ-learn networking”, are now available in a surface-mount version, model CICP2100S. CICP2100S uniVerse Controller Ideal for cinder block walls and other hard-to-wire surfaces, often found in the construction of schools, healthcare facilities & other institutions, and used in a CA4K enterprise access control software environment, the CICP2100S Power over Ethernet Controller, with locking metal enclosure, supports two ID readers and/or one low current strike via Power over Ethernet (PoE). uniVerse Series also includes 2 Form C Relay outputs, for door and aux Up to 14 uniVerse controllers can be networked together or intermixed with Continental’s conventional, 2-16 door SuperTwo or Accelaterm Controllers, and/or integrated with Trilogy Networx Wireless PIN/Prox Access Control Locks. Compact but value-packed, uniVerse Series supports 200K cards, features a Superfast 54MHz RISC Processor, 4MB on-board memory, a 1000 transaction buffer (expandable to 10,000), 256 time schedules, 30,000 access groups and 5 x100 holidays. Seamless integration and cost-efficient The cost-saving uniVerse Series also includes 2 Form C Relay outputs, for door and aux. (MOV-protected) and supports AES-encrypted, IT-friendly POE or RS485, to downstream 10 controllers on 1 network drop. Mounted on the secured side of the door, CICP2100S’s 22-gauge CRS steel locking enclosure (9.18W x 5.4H x 2.1D”) includes 5 diagnostic ethernet LEDs, plus a power indicator, viewable from the closed cabinet. Like all its products, uniVerse controllers, in surface mount or original double-gang box model (CICP1200), are backed by Continental’s 3-year factory warranty.
In business and at home, the smartphone is a remote control for our lives. It’s a calendar and a credit card. We book holidays and do our daily banking. With video calling technology, we can even be in two places at once (or make it seem that way). Could there be untapped potential in using mobile phones for access control, too? According to official EU data, by 2016 94% of European large businesses were issuing their workers with some sort of connected mobile device. We seem to use our smartphones for everything. Yet mobile phones are under utilized when it comes to building security and access management. Mobile access Evolving technologies now enable us to manage access rights via mobile phone apps Evolving technologies now enable us to manage access rights via mobile phone apps, open a door with a virtual key credential, and much more. An estimated 44 million mobile credentials will be downloaded by 2021, according to a recent IHS Markit forecast. Smartphones enable wireless access control: Convenience: Part of the reason Apple Pay, Instagram and many more mobile services succeed is for the simple reason, we like to carry less stuff. With secure credentials on your phone, there’s no more need for a fob, a plastic smart-card or anything similar. Security: A screen-lock adds an extra layer of PIN, swipe passcode or fingerprint security. With phones, multi-factor authentication is baked into the credential. And how quickly would you notice if a plastic key-card went missing? Nowhere near as fast as you’d spot your smart phone was gone. Flexibility: Security and facility managers can do things with virtual keys that are impossible with a plastic credential. They can issue, revoke or amend them instantly and from anywhere with secure cloud access via a mobile phone. However briefly a temporary visitor needs to enter your building, the easiest way to let them in is with their phone. Efficiency: Scrap the queues at reception waiting for temporary visitor permits, waste fewer hours in plastic key-card handover meetings and spend less of your budget replacing lost and damaged credentials. Phone-based access control saves businesses time and money. Compatibility: Mobile phones are machines built for connectivity, including with your existing RFID locks. Bluetooth and NFC radio technology are already inside most modern smartphones. Every future viable wireless and contactless technology will be there, too. Another recent analyst report suggested as many as 20% of organizations would use smartphones for access, in place of plastic smart-cards, by 2020. The move to mobile access control seems inevitable. “Other highly security-aware industries like banking demonstrate the advantages of the smartphone,” says Thomas Schulz, Director Marketing & Communications Digital and Access Solutions at ASSA ABLOY EMEA. “Similarly, we see fast-growing interest in unlocking doors and other openings with mobile credentials, and in facility managers administering access rights via their smartphone.” SMARTair Openow solution “To take one example from our portfolio of mobile access solutions, security managers using our new SMARTair Openow solution manage all users’ virtual keys inside a secure app. If an administrator cancels a virtual key, it vanishes immediately from a user’s Openow app.” Schulz points to the new Arkansas State University campus in Mexico, where students and staff have no access cards to collect or validate. Every site user installs and validates their own Openow app and collects keys virtually. Wireless access control Smartphones add convenience and functionality right across our wireless access control product" “Smartphones add convenience and functionality right across our wireless access control product and solutions portfolio,” said Schulz. “Users can unlock our Aperio wireless locks with a Seos mobile credential. Small and medium-sized business managers can run their own access control with no specialist knowledge, using just the CLIQ Go app and their phone.” He further adds, “For companies with a remote workforce, the CLIQ Connect app updates access rights of programmable keys with just a secure Bluetooth connection. Access control from your mobile phone offers so many efficiency advantages. I’d encourage everyone involved in managing access control to take a look.”
Cobalt Robotics is a physical security service provider that builds indoor autonomous robots to make security and facility operations more effective. The company announces that it has raised $35 million in Series B financing. The financing was led by global technology investment firm, Coatue, and is intended for geographic expansion of services throughout the domestic United States. “Security is fundamentally about trust and reputation, and it needs to be reinforced across all aspects of the company: founders, employees, technology, and financial backers. Our financial backers—such as Bloomberg Beta, Sequoia Capital, and now Coatue—have been instrumental to our success so far, and they will be instrumental in our next phase of growth too,” said Dr. Travis Deyle, Cobalt CEO. Enhance security programs The physical security market is predicted to reach nearly $119.4 billion in 2023 “Our goal is to combine the best parts of machines (unwavering attention, perfect recall, and super-human sensing) with the best aspects of people (warmth, responsiveness, and adaptability) to create service robots that dramatically improve the quality of life for everyone and fundamentally redefine the modern workplace.” The physical security market is predicted to reach nearly $119.4 billion in 2023. Security robots are an innovative new tool within the industry that enhance security programs by bridging the gap between traditional technologies and services such as cameras, access control, and manned guards. Cobalt’s Robots-as-a-Service model combines autonomous patrolling robots with human specialists, enabling organizations to provide a 24-hour security solution that complements existing security assets like manned security guards and access control systems (ACS). The result is a highly effective security program with significant cost-savings and robots that remain up-to-date with the latest and greatest software. New door integration Since its $13 million Series A funding announcement in March 2018, Cobalt has deployed security and facilities management services to clients in various sectors (technology, defense, finance, and manufacturing) across a variety of organizational sizes (small startups to marquee Fortune 50 companies). This year, Cobalt introduced its new door integration capability that enables robots to seamlessly pass through areas closed off by a door using wireless technology to communicate with access control readers—a first for the industry. In addition to its client base, Cobalt has expanded its engineering and operations teams and enhanced its security and facilities teams, bringing its unparalleled customer service and performance to new markets. Today’s organizations face several physical security challenges—cost-effectively protecting people, assets and intellectual property while ensuring the seamless flow of operations. Trained remote personnel We believe Cobalt’s robotic security guards are revolutionizing the security services space" Cobalt combines its autonomous mobile robots with highly trained remote personnel to provide a new level of situational awareness and real-time response. Cobalt’s robots patrol the workplace, leveraging AI to detect anomalies—open doors, environmental risks or malicious intruders—and then Cobalt’s security specialists can respond in real-time to address any event—whether it’s related to security, facilities or customer service. This unique human-in-the-loop model has enabled Cobalt to position itself as a key player in the physical security arena. “We believe Cobalt’s robotic security guards are revolutionizing the security services space and providing an unmatched experience for customers,” said Kris Fredrickson, Partner at Coatue. “In addition, we have been thoroughly impressed with the team’s philosophy that a great physical security service should positively impact not only the company’s operations but its culture as a whole.”
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase In Revenue For Dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, Connected Smart Locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio Of Home Automation Products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages Of Professional Installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realize they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realize that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling Additional Home Automation Products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labor warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces Connection Instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realize over time. On the other hand, one issue DIYers may recognize right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognizable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not Everyone Is A DIY Customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing Complete And Custom Solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimize the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customized access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorized entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorization to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customization ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Security isn’t easy for schools and universities. As education institutions increasingly become vulnerable targets for threats and attacks, they face the security challenges of maintaining a welcoming and open environment while ensuring the comprehensive safety of the students, teachers and staff. The balance between providing high levels of security with a certain level of convenience becomes crucial, especially when considering the large audience schools work with – the staff, administrators, students, parents and other organizations that utilize the facilities. In addition, schools are budget-conscious and must use their resources wisely. School administrators are often contacted repeatedly by organisations with multiple safety and security products The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products. PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. Data capture form to appear here! Ensuring procedures evolve There is no guarantee that what works to increase safety and security today will also work tomorrow. Because potential threats to safety and security can and do change, it is important that whatever policies, procedures and technology a school implements today can also evolve to address those changes well into the future. It is also important that schools take into account the need to distinguish among a wide variety of possible situations to ensure the appropriate people are notified and correct procedures followed. For example, the response to an active shooter situation is going to be very different from the response to a fight that occurs in a hallway. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, vice president of Facility Engineering Associates, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but says that value is almost completely realized in terms of forensics – reacting after an incident rather than during or before. A second priority for school security is controlling access to the building Communications, specifically mass notification systems, are an important tool for school security, says Timm. Mass notification must be able to provide emergency information to people in the gymnasium, or on a field trip. A second priority for school security is controlling access to the building. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors. But a video intercom works best in conjunction with other complementary products including remote-controlled locks that allow staff to admit visitors while safely sitting behind locked doors. The object of any solution is to eliminate or delay entry of an assailant long enough for police to respond and for school administrators to communicate with teachers and campus staff so they can lock down their classrooms or evacuate, depending on the situation.
Among the cloud’s many impacts on the physical security market is a democratization of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annual licensing previously made a typical electronic card access system cost-prohibitive. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The benefit for the integrator is recurring revenue that increases their profitability The benefit for the integrator is recurring revenue. While helping clients save money on server, software and IT infrastructure costs, integrators secure recurring revenue that increases their profitability. Building recurring revenue not only provides cash flow but also keeps a manufacturer’s name on the top of the minds of customers and leads to additional sales. Mobile Access Continued investment in mobile access and cloud technology is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. Managing access control for end users in different verticals is challenging, thus it’s necessary to deploy wireless, technologically-advanced solutions While the security industry has traditionally been slow to adopt IT technologies, the cloud is the exception. Large IT industry cloud players such as Amazon Web Services, Microsoft, and Google are being used by security industry professionals to provide systems that are easier to install, maintain, and administer and are far more secure and less expensive than a customer can provide on their own. Advancing cloud technology Cloud technologies give people access through their mobile phones and other devices Enterprise customers increasingly want to be able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. They seek to create trusted environments within which they can deliver valuable new user experiences; in effect, there is a demand for “digital cohesion.” Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Application programming interfaces Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. Cloud-based platforms, APIs will help bridge biometrics and access control in the enterprise “A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets,” says Hilding Arrehed, Vice President of Cloud Services, HID Global, one of our Expert Panelists. “They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities.”Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise Cloud-based platforms For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. “Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions,” says Arrehed. “They have the potential to give organizations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.”
The City of Boston is known for many things – from Fenway Park to the Boston Marathon to the bar from Cheers, the city is full of iconic landmarks, events, cultural assets, education centers, and more. Boston is also recognized for its vast history, especially downtown, where hundred-year-old buildings have been preserved or restored. There is also a mixture of new property development, including 33 Congress Street, in the heart of the financial district, which combines the best of historical design with new construction. Building security 33 Congress incorporates more than 400,000 square feet of office and retail space 33 Congress incorporates more than 400,000 square feet of office and retail space, transforming the historic neighborhood and positioning the area as a dynamic downtown destination. The project was designed by Arrowstreet, an award-winning architecture and design firm, and was led by Jason King, AIA, LEED, AP, BD+C, Senior Associate for Arrowstreet. According to King, the 33 Congress Street building consisted of three different structures that were built at separate times: in 1904, 1906, and in 1922 and then all combined into one space. While the space functioned as one building, there were three separate elevator cores, sets of restrooms, sets of stairs, and more. Those entities needed to be reconfigured into one. The most striking feature of 33 Congress is a new, modern glass and steel structure, containing 6 additional floors of office space that sits on top of the original three masonry buildings. Another important project goal was to upgrade the main lobby to a modern design that allowed public access, increased security for building employees, and respected several historical aspects. Secure access control “We needed a way to get people into the new, main elevator lobby quickly due to the high volume of traffic that we were anticipating would take place after the redesign,” King said. “We also wanted to create an entrance that would create a better flow of entry from the sidewalk into the building.” The original building had an existing revolving door, but it was small and surrounded by stone. “It was dark and uninviting,” King said. “We were creating an open and airy Class A lobby space and wanted visitors to clearly see the ornate, coffered ceiling and experience the grand and historic nature of the lobby as they entered.” Crystal TQ revolving door King implemented a Boon Edam Crystal TQ manual revolving door to lead visitors in the double height lobby space King implemented a Boon Edam Crystal TQ manual revolving door to lead visitors in the double height lobby space. The Crystal TQ is constructed virtually completely from glass with only a few stainless steel accents to ensure the solidity of the revolving door. It fits seamlessly with modern glass facades but can also be a beautiful eye catcher in more traditional or classic designs. For employee access, the building’s previous design did not incorporate turnstiles to the elevator banks. “The building did have card reader access, but only at certain doors and locations,” King said. Lifeline Speedlane Swing King installed four lanes of Boon Edam Lifeline Speedlane Swing optical turnstiles and two Winglock Swing model access gates to provide secure employee access to the building’s upper floors. The Lifeline Speedlane Swing turnstile manages and channels the flow of people entering and moving around buildings. It employs sensors that detect visitors approaching, with pulsing light strips to guide the user. A sleep function saves on energy use. It can be customized with dimensional and glass choices, including corporate identity colors or other options, so that it either blends-in or stands-out from its surroundings. Boon Edam Winglock Swing The Boon Edam Winglock Swing is constructed from stainless steel and a single glass panel The Boon Edam Winglock Swing is constructed from stainless steel and a single glass panel, and is unobtrusive in nature and design. The access gate easily manages bi-directional traffic, with LED lights that signal if the gate is in use or on standby. The access gate ties into a manned security desk located near the front doors. Employees gain access to the building through either the Lifeline turnstiles, or a Winglock Swing access gate, while building visitors can receive credentials at the security desk. Entrance solution King said, “We started the process looking at Boon Edam from a security and an aesthetic standpoint. We went through multiple product options but always had a Boon Edam product as the basis of the design. We have been happy with Boon Edam entrance solutions and we are planning to use them again for future projects.”
Allegion, globally renowned provider of security products and solutions, has announced that the Schlage AD electronic locks, NDE networked wireless locks, LE networked wireless locks and MT multi-technology readers now support contactless student IDs in Apple Wallet. Allegion - CBORD collaboration Allegion worked with CBORD and Apple to enable a mobile credential leveraging the industry global standard NXP DESFire EV1 security technology to provide higher education campuses with an easy-to-implement solution for the enablement of contactless student IDs for iPhone and Apple Watch. The University of Tennessee, University of Vermont and University of San Francisco are among the first schools to leverage the solution. “A recent study from The Center for Generational Kinetics found that 95 percent of Gen Z owns a smartphone and being connected is their norm. Because of this, universities are tasked with meeting student preferences while also ensuring campus security,” said Jeff Koziol, Allegion business development manager, campus software partner. “Allegion is proud to expand its product features to provide higher education campuses seamless yet flexible security solutions, and an improved mobile access experience for students and faculty members alike.” Contactless student IDs Having contactless student IDs in Apple Wallet makes it easier and more convenient for students and faculty to access buildings like residence halls or the library, as well as make payments on and around campus for coffee, laundry and other purchases with iPhone and Apple Watch. Universities can remotely issue credentials over-the-air, and those credentials are protected by two-factor authentication and can be remotely deactivated by the student or university. MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard "As an institution that values innovation, it's important to us that we are always adapting to the way students use technology to enhance the campus experience," said Chris Cimino, senior vice chancellor for finance and administration. "Being able to access your VolCard on your iPhone is one of the many ways UT is continuously improving to meet expectations for a modern campus.” MIFARE DESFire EV1 technology MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard and one of the top solutions in contactless credentials. By leveraging Allegion and CBORD’s solution with DESFire, higher education campuses are now able to take advantage of an open architecture and work with various manufacturers without being locked into a siloed proprietary solution. This new capability is compatible with the following Schlage commercial solutions: AD electronic locks - Schlage AD-400 wireless locks were designed to reduce installation costs on interior access-controlled doors, such as student rooms, faculty offices, classrooms and lab spaces, while offering the adaptability to support future evolutions in technology. The AD-400 and AD-300 wired locks are available in cylindrical, mortise, mortise deadbolt and exit trim chassis options, and they integrate into popular physical electronic access control systems (PACS). NDE networked wireless cylindrical locks - NDE wireless locks integrate into popular electronic access control systems from PACS providers to bring the benefits of electronic access control deeper into university buildings. NDE packages the cylindrical lock, credential reader and access control sensors together in to a small footprint that is both easy to install on university campuses and affordable. LE networked wireless mortise locks - The LE design packages the mortise lock, credential reader and access control sensors together into a small footprint that is both elegant and affordable. They feature two sleek trim options with broad range of decorative lever choices to match the style of any residence hall. MT Multi-Technology readers - Schlage MT multi-technology readers are designed to simplify university access control solutions and allow a transition from proximity or magnetic stripe (on a physical student ID) to more secure, encrypted smart card technology or mobile credentials in the Apple Wallet. Schlage’s AD Series Locks This extended offering is the next wave in Allegion’s pursuit to work with other providers in the industry for digital credential rollout in universities. Recently, the company announced its collaboration with Transact to enable contactless student IDs in Apple Wallet through Schlage’s AD Series Locks at Mercer University.
People and vehicle access control specialist, Nortech offers a number of products within the Nedap product range that use vehicle tagging to identify individual vehicles while they are moving through a monitoring point. uPASS Reach reader The uPASS Reach reader offers long-range vehicle identification for up to 5 meters using the latest UHF technology. With consistent reading up to 5 meters and adjustable onsite reading as just two of the benefits of the system, the uPASS Reach reader has an elegant slim design, LED and audible read indication and is encased in weatherproof housing. It also operates with passive UHF tags, self-adhesive widescreen tags and hand-held tags with dual-technology options. Long-range passive UHF tags The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives When the uPASS Reach reader is installed (maximum height two meters) next to an automatic gate or barrier, long-range passive UHF tags are identified at a distance of up to 5 meters as soon as they are visible in direct line of sight of the reader. The reader output allows the access control system to open the gate/barrier when an authorized vehicle arrives without the need for the driver to present a card or badge, and the built-in high intensity LED provides the user visual feedback that the tag has been read. UHF tags are also both battery and maintenance-free. UHF Windshield Tag To work alongside the uPASS Reach, Nedap has designed four different UHF tags to suit all environments. The UHF Windshield Tag is a passive UHF transponder and offers long range identification up to 5 meters when installed inside non metallized windscreens. This provides cost-effective long range vehicle identification for access control applications and is available as a standard peel off version or as a tamperproof version for additional security. Passive UHF Exterior Tag Where vehicle windscreens are fully metallized, Nedap offers a passive UHF Exterior Tag which can be easily fitted onto non-metallic / plastic parts of the vehicle such as the headlights. For added security, the UHF Exterior Tag is a tamper resistant, transparent, adhesive tag. It will show visual proof of removal and is extremely difficult to remove, intact and functional. The chip inside is also protected against harmful UV rays. UHF Heavy Duty Tag This tag features a rugged design for long term use in outdoor and industrial environmentsThe Nedap UHF Heavy Duty Tag is a passive UHF transponder which again offers long-range identification up to 5 meters with the uPASS Reach. However, this tag features a rugged design for long term use in outdoor and industrial environments. The UHF Heavy Duty Tag is a cost-effective solution for installations where the tag needs to be mounted onto the exterior of the vehicle and can also be cable tied or bolted onto bicycles, forklifts and many other industrial devices. Finally, the UHF ISO Combi Card is a card featured with long-range UHF tag and proximity or smartcard technology. Used for both people and vehicle access, it enables the use of one card for both vehicle and building access applications. Available with a range of formats such as Mifare, Legic and HID. Efficient vehicle identification reader The uPASS Reach reader complies with the ISO18000-6C and EPC global Gen 2 directive. This long-range vehicle identification reader is based on latest passive UHF technology. It is used in combination with battery free UHF (EPC Gen 2) tags, making this access control solution totally cost efficient. The uPASS Reach is ideal for convenient vehicle access to public car parks, private-run parking spaces and lots, gated communities and staff parking areas in corporate offices and government buildings.
Health services and their funding have long been in the news, with social care and mental health coming in for particular attention. Both of these core areas are seeing a growing need for their services. While nationally this is a problem, there is good news in East Anglia with the opening of the 16 bedroom Samphire Ward at Chatterton House, a new acute care mental health facility in King’s Lynn, Norfolk. The build comprised of a refurbishment of two redundant wards linked to create one modern compliant 16 bed facility at a cost of £4m which is operated by North and West Norfolk Care Group, part of Norfolk and Suffolk NHS Foundation Trust (NSFT). NSFT provides inpatient and community-based mental health services in both Norfolk and Suffolk. It is also commissioned to provide in some of its localities, learning disability services, along with other specialist services including medium and low secure services and wellbeing. Continuim access control system Many of these sites use a legacy building access control system called Continuim The new facility is one of many sites across Norfolk and Suffolk that fall under management of the trust. Managing over 4,000 staff and controlling over 1500 access controlled doors across multiple sites. Many of these sites use a legacy building access control system called Continuim which is a bolt on module to Trend BMS, where all doors on this system are required to be wired on-line. Several years ago the trust wanted a more modern contactless access control solution for their facilities in Norfolk and Suffolk. They specifically wanted a solution that offered cost savings by not having to wire all doors. SALTO access control was chosen for fitting to new and refurbishment projects, with a view to possibly retro-fitting the new solution across all the existing sites on a rolling upgrade basis as time and future budgets allow. SALTO access control solution Security and Infrastructure Manager for the Strategic Estates department at the trust, Paul Evans, says “By choosing SALTO the trust were able to specify a mix of online and offline equipment. The cost saving for offline equipment enables the trust to specify more internal offline doors to become controllable as part of the access control system, thus giving us greater flexibility and security for our facilities.” Evans continues “Given the nature of our work and that some of our service users can have really challenging behavior issues, it is vital that for their safety and that of the staff, we are able to control access simply and easily yet securely into and around the many different areas of the ward, the administration area and indeed the rest of the rooms in the building.” Contactless smart access control Reduced-ligature hardware working with contactless smart access control was needed in the user areas A standard off-the-shelf access control solution was not suitable as reduced-ligature hardware working with contactless smart access control was needed in the user areas together with anti-barricade doors, vision panels, automatic lockdown abilities, locker locks and a host of other special items and so we wanted a company with specialist experience in this field to carry out the supply and installation.” After going out to a competitive open tending process, local security specialist and certificated SALTO partner AC Leigh, based in Norwich, won the contract to secure the new facility. One of their lead designers, Simon Clarkson, worked with Paul and his team to design and deliver the system. Central monitoring system Clarkson, Health and Safety Director at AC Leigh says “We listened to what Paul and his team needed and especially how they wanted to manage and control the building and delivered a completely focused solution that allows central administration of the facility using hardware and software from SALTO Systems as the core of the solution.” On-line wall readers are used to control access into and around the building and these have been installed on main entry points, alongside bedroom doors and in ‘airlocks’ to control access from one area to another. SALTO slave control units Paul Evans says, “The latest SALTO online CU4200 control units were used on this project where data can be shared to SALTO slave control units via a single master control unit. This reduced the load on the already exhausted IT infrastructure which has meant that more online doors can be added to the SALTO system.” Bedroom doors are all fail secure with mechanical key override and are also anti-barricade. The facility has the bespoke ability to operate a standard 8 male, 8 female bedroom configurations. However, the trust wanted the flexibility to extend either male or female bedrooms to 10 bedrooms. This was achieved by two swing corridor doors. Electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks. In their swing scenario a key switch can be operated which releases the hold open magnet and energizes the SALTO system powering a separate electronic locking device on the door. This enables the trust to easily maintain the required gender separation within the bedroom areas. Paul Evans comments “AC Leigh were able to configure the required solution easily and train the staff in its operation accordingly.” Aelement Fusion smart locks Other doors are fitted with Aelement Fusion smart locks. AC Leigh worked closely with the trust to design and manufacture special reduced ligature handles and reader covers to ensure that ligature points were reduced in conjunction with DHF technical specification TS001:2013 enhanced requirements and test methods for anti-ligature hardware. “The consultation between AC Leigh and the trust took several months with multiple prototypes being presented to the trust for approval.”, Evans says, adding “After looking at all the various options, the trust is happy that the best solution for this type of battery operated offline door has been chosen and installed at Chatterton house.” He also confirms that the bespoke design would be used as their preferred solution on future projects for this type of door. XS4 Mini locks Meanwhile in staff areas XS4 Mini locks are fitted. In open common areas, lockers are equipped with smart XS4 locker locks enabling each service user to have a secure storage place for their individual personal items. To operate the various doors, staff use their smartcard ID badges to gain access while service users use wristbands to access their bedroom, locker and certain permissible doors. SALTO SPACE electronic locking Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform that enables operators to effectively manage every door and user access plan on-site via powerful web-based access control management software. Audit trail information from the doors is held for 31 days before deletion in accordance with the trust data policy. Simon Clarkson concludes “The client needed precise tailoring of access levels and the SALTO access control solution has empowered them with an intuitive, easy to use but adaptive system. The use of this standalone largely battery operated access control system will provide significant cost savings over the years to come compared with other systems, and will deliver a reduction in engineer call-outs and simplify system administration making for a long term secure and reliable access control solution for the trust.”
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorized intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimizes future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
ProdataKey (PDK), an innovator of networked cloud-based access control products and services, and OwnerGo, a complete web-based lease-management, communication and organizational tool for multi-tenant properties, has implemented a fully integrated, comprehensive solution for Freedom Heights and Lofts (Freedom Heights), a condominium community in Atlanta, Georgia. Prodata cloud access control This unique integration between ProdataKey's Cloud Access Control platform and OwnerGo's lease management, communication and organizational tool for multi-tenant properties, is supporting the diverse needs of property management, the Homeowners Association and residents of Freedom Heights and Lofts, an upscale condo community in Atlanta, Georgia. This case offers the perfect example of how everyone wins when multi-tenant residential properties unite security solutions with other property management functions. Integrated security and access control The integrated platform, designed for condo, apartments & townhomes provides enhanced security The integrated platform, designed for condo, apartment, townhome and single-family home communities, provides enhanced security and convenient controlled access to all tenants and workers who service the property while simultaneously providing the Homeowners Association (HOA) board members and property managers with the tools they need to be responsive to residents and function more efficiently. The integrated, user-friendly interface controls 32 access points to external building entrances and common areas and contains a wealth of tools to support work order submissions, resident directories, event calendars, leasing documentation, a fully automated leasing list tool and more. Up to 25% of Freedom Heights homeowners lease their units to renters; the balance of units is owner-occupied. PDK access control system The PDK access control system provides the Freedom Heights HOA with powerful security management capabilities, robust reporting and the ability to segment access to specific buildings by tenant. A mobile interface provides the night security guard with real-time awareness of when doors are being accessed, as well as Instant Alerts if any doors are left propped open. Integration with OwnerGo eliminates redundant data entry while providing continuity in managing lease documents and assigning access credentials. System administrators can more easily keep track of authorized card holders and deactivate cards that have been lost or should no longer be in circulation. In addition, cards assigned to a particular unit can be transferred automatically to the next occupants. OwnerGo integration OwnerGo integration allows residents to unlock doors for which they have permission without the need for access control cards The OwnerGo integration allows residents to unlock doors for which they have permission without the need for physical access control cards. Using the graphical map feature within the OwnerGo web and mobile interface, they can simply tap or click on the door they wish to open. Using this method, they can also open doors remotely for visitors who call ahead from outside. The system also provides the HOA board with leverage when collecting delinquent payment of condo fees. Residents who are significantly late in payments may have their access to community areas, like the pool and gym, temporarily deactivated until payment is received. Cory Jackon, Vice President of Sales for PDK, says, “Using our open API, OwnerGo has been able to pull in a lot of PDK’s features, making the management of security a seamless part of the platform’s capabilities.” Enhanced security “Integrating PDK’s access control capabilities into the OwnerGo platform is an extension that enhances the security and convenience for all involved,” adds Klye Montgomery, President of OwnerGo. Current President of the Freedom Heights HOA, Ken Gwinner, agrees. He says, “I would definitely recommend the OwnerGo/PDK solution to Homeowner Associations, property management companies and other entities responsible for the many challenges associated with properties like ours. It does exactly what we need.”
Round table discussion
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Door access control: Manufacturers & Suppliers
- Aiphone Door access control
- TESA Door access control
- Trimec Door access control
- Adams Rite Door access control
- Magnetic Solutions Door access control
- HID Door access control
- ASSA ABLOY - Aperio® Door access control
- CyberLock Door access control
- SALTO Door access control
- Deedlock Door access control
- CEM Door access control
- Eff-Eff Door access control
- Techniphone Door access control
- Cisa Door access control
- Unican Door access control
- CDV UK Door access control
- TDSi Door access control
- ACT Door access control
- Clarke Instruments Door access control
- BPT Door access control