Door access control
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximize the value of face time with customers until the last second. Building An IoT Ecosystem In SAST At a show lacking in high-profile new technology announcements, the bigges...
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
3xLOGIC, the provider of integrated and intelligent security solutions, has announced the availability of its pioneering VIGIL video management system (VMS) in Europe. Already enormously popular in the USA, 3xLOGIC aims to replicate this success and is targeting VIGIL at those who want all the power of integrated video and access control, without the stress and cost of a complex set-up. VIGIL’s enterprise grade VMS is the driving force behind the VIGIL range of network video recorders (NV...
Openpath, a pioneer in workplace technology and security, unveils at ISC West 2019 its new Elevator Board and Partner Portal to provide channel partners, property managers and tenants with even more comprehensive and convenient office security systems. Elevator Board enables Openpath to connect commercial spaces under a single, streamlined and secure mobile access system. And now, with Partner Portal, integrators can access best-in-class training and education online, enabling them to easily im...
Allegion, a provider of security products and solutions, announced its ENGAGE IP Gateway integrated with the latest version of RS2 Technologies’ Access It! Universal.Net software. RS2 Technologies released Version 7 of its software on March 11, which enables it to support Schlage Control, Schlage LE and Schlage NDE wireless locks as well as the Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options via the ENGAGE IP Gateway. “Allegion is excited to grow our offering wit...
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, has announced the introduction of “touch io”, a new Bluetooth reader and credentialing option for smartphones designed for use with the company’s cloud-based access control solution, pdk io. Touch io Bluetooth Reader touch io does not require the user to unlock the phone in order to gain access through a protected door Touch io brings new levels of convenience and...
Identiv, Inc. announces that it will present its recently expanded Internet of Things (IoT) product portfolio at ISC West 2019, encompassing a wide range of physical and logical access control, video and data analytics, door readers, identity cards, visitor management, mobile security, telephone entry, and radio-frequency identification (RFID) and near-field communication (NFC) solutions for physical and IT-secured businesses. Identiv will be showcasing demos of its complete portfolio of high-performance IoT solutions for government, banking, healthcare, critical infrastructure, retail, and other industries at ISC West 2019, booth L13. Newly Acquired And Developed Solutions The company will have some of its newly acquired and developed solutions on display, including: Enterphone integrates with Freedom and Liberty and will be introduced to the U.S. market for the first time at ISC West Web/Cloud and IoT-Based Architecture - Newly acquired Freedom and Liberty Access Control product lines provide cloud-based, frictionless, cyber-secure access control. Freedom’s software-defined platform and new mobile app enable IoT-driven access control for enterprises and governments. Liberty provides an entry-level, web-based scalable solution for small-to-medium businesses (SMBs). Video and Data Analytics - 3VR by Identiv’s video intelligence solutions provide a single platform for real-time security, analytics, and consumer insights, allowing organizations to protect their employees, customers, and assets, as well as enhance store operations and shopping experiences. 3VR is now fully integrated with Hirsch Velocity. Mobile Security - Thursby by Identiv software solutions provide strong government-grade security for government agency, enterprise, and personal mobility, supporting bring-your-own-device (BYOD) and two-factor authentication (2FA) on mobile devices. Access Control - Identiv’s new Hirsch Mx-1-ME (Metal Enclosure) Controller manages a single fully supervised door for controlled entry and exit at the edge and is protected by a metal enclosure with battery backup and power supply. Phone Entry - Over two million tenants in 35,000 installations within residential and mixed-use properties depend on the Enterphone by Identiv telephone entry system for secure visitor access. Enterphone integrates with Freedom and Liberty and will be introduced to the U.S. market for the first time at ISC West. Secure IoT Tags - Identiv’s high-frequency (HF) and ultra high-frequency (UHF) transponders bring smart identities and security to the IoT, digitising and enabling high-growth applications, like medical devices, athletic apparel, and pharmaceuticals. Identiv’s new Tamper Detection NTAG 424 DNA Tag strengthens IoT security for anti-counterfeiting, document authentication, supply chain traceability, data access, and customer engagement. Physical Security Industry This year, join Mark Allen, General Manager, Physical Access Systems at Identiv, Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions (DSS), and Joe White, President at A-1 Lock, as they present “In Between the Lock and Controller: Why Wireless Locks Are Changing the Game in Access Control” during ISC West on 11th April, 2019, 11:00 AM – 12 PM (IST). The International Security Conference and Exposition — also known as ISC West — is the largest event in the U.S. for the physical security industry, covering access control, alarms and monitoring, biometrics, IP security, video surveillance/CCTV, networked security products, and more.
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is demonstrating the company’s powerful eFusion Security Management Software here at ISC West 2019 (booth #6065). eFusion embraces the advancements of today’s leading PSIM, VMS, access control and numerous other technologies on a single platform to provide a new level of systems intelligence for enterprise-wide security and business intelligence applications. “Maxxess eFusion aggregates data from previously disparate surveillance, security and operations systems on a unified management and control platform, dramatically improving overall situational awareness, safety and security,” said Nancy Islas, President of Maxxess Systems. “Already integrated with over 50 industry leading manufacturers’ solutions, eFusion eliminates the need to rip and replace legacy systems and infrastructure which increases users’ Return on Investment (ROI) for existing capital expenditures.” The powerful eFusion platform provides video, access system management and control capabilities along with alarm monitoringVideo And Access System Management Field-proven worldwide, eFusion Security Management Software correlates data from surveillance, access control and facility systems such as HVAC onto a comprehensive monitoring and reporting dashboard. In addition, the powerful eFusion platform provides video and access system management and control capabilities along with alarm monitoring; remote access credentials tracking; authorization and de-authorization; door/access status and more. New enhancements to eFusion include new Flow Control with Auto Expiration, and Advanced Data Processing. Flow Control allows users to configure the specific door(s) that must be used first to gain primary access to a facility with programmable timer setting. Advanced Data Processing correlates databases to accommodate complex relationship rules between the authoritative database and the Maxxess database. System-Wide Lockdown, VMS Integration To further simplify user engagement with eFusion, Maxxess Systems’ MX+ Web Dashboard has also been further enhanced with new features including: System-wide lockdown; Video Management System (VMS) integration; mobile cardholder management operations with badge printing; access control status indication in an easy-to-read graphical format; and schedule configuration. eFusion can be deployed as a stand-alone management and control platform or supplemented with the unique capabilities of Maxxess Ambit Event Management Communications Software. Both Ambit and eFusion are core components of Maxxess Insite Awareness and Response Coordination System.
Turnstile manufacturers increasingly recognize the value of integrating mobile devices into their lobby security strategy to create more convenient, connected and secure experiences for building occupants and visitors. HID Global, a global provider of trusted identity solutions, announced that it has teamed up with six of the world’s top turnstile manufacturers who have tested and certified HID’s Mobile Access as part of their commitment to a mobile future. Major turnstile manufactures exhibiting at this year’s ISC West exhibition, namely Alvarado, Automatic Systems, Boon Edam, Gunnebo, Orion Entrance Control and Smarter Security, have integrated the new Essex Electronics iROX-T with embedded iCLASS SE technology from HID. Each company will showcase mobile access in their booths to illustrate how mobile is upping the convenience factor at the turnstile. Solving The Challenge Of Turnstile Security “Leveraging mobile and cloud technologies at every access point, from turnstiles and elevators to doors, is a crucial part of creating a truly connected security experience in today’s smart building,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global. The Essex Electronics iROX-T reader with HID’s embedded iCLASS SE technology supports BLE and NFC for mobile access “HID Global and Essex Electronics are making this vision real by solving the challenge of increasing turnstile security with a solution that enables secure access using credentials provisioned to a user’s mobile phone. This will help people move more efficiently through the hustle and bustle of busy building lobbies.” Supports BLE And NFC For Mobile Access Already certified with the six turnstile manufacturers, the Essex Electronics iROX-T reader with HID’s embedded iCLASS SE technology supports Bluetooth Low Energy (BLE) and Near Field Communications (NFC) for mobile access and optional OSDP for secure communications. It is also interoperable with smart cards, HID’s 13.56MHz Seos credentials, iCLASS SE, iCLASS, and other high frequency formats. Garrett Kaufman, President of Essex Electronics, added, “Building on our successful launch of the iRox-T, the latest integration of BLE, NFC and OSDP illustrates the reader’s ability to streamline upgrades in order to meet the demands of today’s mixed credential environment that is increasingly incorporating mobile IDs on smartphones.” Live Demonstration At ISC West Visit HID Global in Booth #11063 and the following turnstile manufacturers to see live demonstrations of HID Mobile Access at ISC West from April 10-12, 2019 at the Sands Expo in Las Vegas. Alvarado Booth #12101 Automatic Systems Booth #2065 Boon Edam Booth #8037 Gunnebo Booth #4077 Orion Entrance Control Booth #5065 Smarter Security Booth #21117
At ISC West 2019 (booth #13109), Sielox LLC is showcasing versatile new enhancements to its Pinnacle v.10.4 Access Control Platform. New functionality allows users to seamlessly access the features of Allegion’s Schlage Engage Wi-Fi locks enabling them to be easily integrated with Pinnacle Schlage Wi-Fi access platform feature. Additionally, Allegion Schlage wireless locks can now receive firmware updates through Sielox’s 1700 controller using Allegion ONR technology, which can save integrators tremendous time and money when upgrading and maintaining layered security systems using cost-effective wireless locks. Pinnacle v.10.4 Access Control Platform Pinnacle v.10.4 provides seamless integration with Allegion Schlage NDE and LE wireless locks “Pinnacle v.10.4 provides a number of features that are exclusive to Sielox that further enhance the implementation and maintenance of Wi-Fi locks on our access control platform,” said Karen Evans, President, Sielox. “This, plus other new feature additions like LDAP (Active Directory) and improved security, further leverage the versatility and cost-efficiency of Pinnacle for myriad access control applications.” Pinnacle v.10.4 provides seamless integration with Allegion Schlage NDE and LE wireless locks so they can easily be incorporated as part of a facility’s overall access control system using existing Wi-Fi infrastructure. Integration With Allegion Schlage Wireless Locks The Pinnacle Schlage Wi-Fi integration provides access to the wireless locks’ features, enabling advanced door management capabilities along with credential management, detailed audit reports, and customizable screen layouts. With this integration, users are able to control an unlimited number of Allegion Schlage NDE and LE wireless locks, manage cardholder records, create access groups, define holiday schedules and more. Additional Schlage wireless lock fields are now reported in Pinnacle providing users a single dashboard to monitor the lock status. An industry first, Allegion Schlage NDE and LE wireless locks can receive firmware updates when using the Sielox 1700 Controller Allegion ONR feature via RS-485 communications. By pushing the ONR Firmware Package for Allegion Schlage wireless locks using 1700 Controllers, users and integrators can save both time and money. Transport Layer Security (TLS 1.2) An additional update to Pinnacle v.10 includes Lightweight Directory Access Protocol (LDAP) Sielox has also added a new Transport Layer Security (TLS 1.2) enhancement to Pinnacle v.10.4. TLS, and its predecessor Secure Sockets Layer (SSL) for improved network security. TLS/SSL operates by establishing an encrypted communication path between two applications, "wrapping" the entire application protocol inside the secure link. This provides complete privacy for the entire transaction so that sensitive information is protected from unauthorized access while in transit. Pinnacle TLS 1.2, which is available to current Pinnacle users, provides compliant level security. An additional update to Pinnacle v.10 includes Lightweight Directory Access Protocol (LDAP), a licensed service that can be installed on the same server as Pinnacle. The feature simplifies administration by assigning roles to users with permissions, which makes the overall solution more efficient and easier to use for larger security systems. Pinnacle 10.4 will be released in Q2 2019 and is available in several configurations that can be specifically tailored to the needs of any size business or facility or integrated in a layered systems model.
Sielox LLC is demonstrating its portfolio of layered security systems at ISC West 2019 in booth #13109, which address the complexity of providing the right combination of features and configurations to best accommodate specific applications and needs. Featured solutions include: the new release of Pinnacle v.10.4 access control solution; Sielox CLASS crisis lockdown alert status system; AnyWare browser-based access control platform; and the company’s highly-touted 1700 Intelligent Controllers. Sielox Access Control Systems Sielox access control and emergency notification systems are also ideal for stand-alone operation Designed for seamless integration with one another, Sielox access control and emergency notification systems are also ideal for stand-alone operation and are scalable for future expansion. “Sielox has always operated under the principle of continuous technology and process improvement in order to consistently deliver solutions that deliver the performance and functionality required to meet our customers’ evolving security and operational challenges,” said Karen Evans, President, Sielox. “Our innovative layered security solutions provide users with a high degree of flexibility when configuring the systems, they need today and tomorrow.” Sielox Solutions On Display At Booth #13109 At ISC West 2019 Include: The newly-released Pinnacle v.10.4 access control platform that allows users to seamlessly access the features of Allegion’s Schlage Engage WiFi locks enabling them to be easily integrated with Pinnacle Schlage WiFi access platform feature. Additionally, Allegion Schlage wireless locks can now receive firmware updates through Sielox’s 1700 Controllers, which can save integrators tremendous amounts of time and money when upgrading and maintaining large systems. Additional enhancements in Pinnacle v.10.4 include: Transport Layer Security (TLS 1.2) that establishes an encrypted communication path between two applications, "wrapping" the entire application protocol inside the secure link; and Pinnacle LDAP Sync Service (Lightweight Directory Access Protocol), that simplifies administration by dynamically importing and verifying user and cardholder data through data synchronization. Sielox CLASS (Crisis Lockdown Alert Status System) Administrators or any designated initiator can issue an emergency alert to notify responders The Sielox CLASS (Crisis Lockdown Alert Status System) emergency notification and response solution provides vital emergency status details to responders so they can best manage events. Administrators or any designated initiator can issue an emergency alert to notify responders of conditions in real time while communicating status via one of five programmable color-coded alert levels. Occupants within a facility can then report status at their specific location enabling responders to view detailed facility maps with compiled room-by-room color-coded conditions that update in real time as the situation evolves. A chat feature enables two-way communications between occupants and first responders to exchange detailed information or instructions. CLASS can also issue messages with response instructions specific to each alert level via email or text and override any PC on the network to ensure the highest visibility of alert status. Sielox AnyWare Browser-Based Access Control The Sielox AnyWare browser-based access control platform features a variety of enhancements that make it faster, easier and more scalable for small to mid-sized businesses to take access management mobile. The intuitive and easy-to-use AnyWare solution features a capacity increase from 8 up to 40 doors, allowing for an increased number of controllers and readers. Other features include; custom fields allowing users the ability to add additional information to the cardholder record including the card holder images, multiple card type formats, reader block and privilege access levels. Sielox 1700 Intelligent Controller No personal data is required or collected from the user or integrator The Sielox 1700 Intelligent Controller is an intelligent fully-distributed controller ensuring decisions even if communications have been interrupted. New I/O series boards provide a flexible, cost-effective means to expand the input and output functionality of the access control solution, a next-generation access control panel, utilising 32-bit technology with real-time operations for speed, performance and reliability. The new series have the same footprint and mounting as the Sielox 1700 controller; are backwards compatible with Sielox Pinnacle and AnyWare systems; and are cost-effective, not requiring a separate backplane and power module. Integrated with Sielox’s 1700 Controller and the AnyWare and Pinnacle software platforms, Conekt mobile credentials and readers from Farpointe Data use Bluetooth to enable communication between smartphones and readers. No personal data is required or collected from the user or integrator, and multiple credentials can be stored on the app.
Dortronics, a pioneer in off-the-shelf and customized door control solutions, is showcasing its 4800 Series Intelligent Interlock Controllers here at ISC West 2019 (booth #1037). The newly enhanced controllers offer an abundance of features providing installers with a higher degree of versatility to meet customers’ specific needs. “Our enhanced line of door interlock controllers are a one board solution that allows the installer complete control of all operating and configuration options without complex software,” said John Fitzpatrick, President of Dortronics Systems, Inc. “This provides installers and end users with an efficient and easy-to-use access control solution.” Control Door Locks The 4800 Series Door Interlock Controller accommodates up to five doors, including doors with automatic openers. The unit features adjustable timers for propped door time, panic release unlock time, and unlock pause time for REX unlock time. Additional features include 12 inputs for door status, request for access, interlock override and emergency unlock. The unit’s 17 outputs control door locks (fail-safe or fail-secure), traffic lights and mirror door status with alarm outputs. Additional features include a watchdog circuit to monitor operation, LED input/output status indication and voltage spike/surge protection. The 4800 Series is available as a controller board only or with a 4-amp Class 2 UL 294 power supply.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Delivering on high expectations, the first day of ISC West 2019 kicked off with a crowded Sands Expo Center and exhibitors putting forward their best new technologies. Developments seemed more evolutionary than revolutionary, but attendees quickly found plenty of interest. Thermal cameras Hanwha Techwin also showed off a new Android camera that can deploy new apps The largest booth at ISC West, Hanwha Techwin, remained crowded throughout the first day as attendees checked out the company’s eight new thermal cameras offering features such as pan-tilt-zoom, H.265 encoding to minimize storage needs, VGA resolution and detection of temperature changes, all built on Hanwha Techwin’s Wisenet chip. There is also a new 5-megapixel version of Hanwha’s popular 2-megapixel multi-sensor camera, and a new panoramic camera; multi-sensor panoramic cameras ‘stitch’ the images together rather than just aligning them. Hanwha Techwin also showed off a new Android camera that can deploy new apps developed as part of the Korean company’s role as a founding member of Open Security & Safety Alliance (OSSA). Avigilon's H5 series Avigilon is introducing a new line of cameras — the H5 series — with improved imaging and designed to provide deep learning/neural network processing at the edge. Improvements to video analytics will enable the cameras to track multiple moving objects simultaneously in a field of view and to track objects more accurately. More granularity enables better differentiation among types of vehicles, and the cameras enable more detailed data to be pulled from video. The improved analytics engine will also support better face detection and recognition. Operators can view the dashboard and react to information provided in a more digestible format The new version of Avigilon Control Center 7 (ACC7) software will apply principles of AI to enhance an operator’s ‘Focus of Attention’ when monitoring live video. Video is fed into an AI engine that determines which events in the live footage are most worthy of an operator’s attention. Monitoring live video can be a challenge for human operators, whose short attention spans undermine the best surveillance systems. Automation helps to direct that limited attention span to events most worthy of attention. A ‘dashboard’ displays clusters of cameras that are color-coded to reflect the types of activity that are detected. Rather than watching video, operators can view the dashboard and react to information provided in a more digestible format. Clicking brings up the live video. Quantum Cloud Storage Platform Video storage is another area of innovation at ISC West. The Quantum Cloud Storage Platform is flexible for video surveillance and industrial IoT applications. The architecture is built from the ground up for video surveillance applications and can scale from five cameras to millions of cameras in a simple deployment model — no settings or configurations needed. Products range from a small ‘mini-tower’ configuration for a retail store or gas station up to rack-mount servers that can accommodate thousands of cameras. We make the storage piece so simple that you don’t have to think about it" Quantum introduced the VS-Series in a range of server choices at ISC West. The hyperconverged and software-defined environment will support a combination of video management systems (VMS), along with access control, HVAC and lighting controls. Quantum worked with Johnson Controls to develop the products. “It’s designed for an installer, not for an IT guru,” says Jamie Lerner, Quantum’s CEO, President and Chairman of the Board. “We make the storage piece so simple that you don’t have to think about it.” Quantum is showing its VS-Series publicly for the risk time at ISC West. S2’s Magic Monitor LenelS2 is a newly coined name in the industry — resulting from a recent acquisition. The combination of Lenel and the acquired S2 is playing out to the benefit of both product lines. For example, Lenel’s Blue Diamond mobile credentialing system can now be used along with the S2 Netbox hardware. Lenel’s OnGuard is being combined into S2’s Magic Monitor unified solution that combines video, access control, and digital messaging. OnGuard is also benefitting from Magic Monitor’s graphics maps. The S2 Cumulus cloud-based service, focused on system health monitoring, is being applied to OnGuard. LenelS2 is also developing a full commercial access control as a service (ACaaS) offering The combined LenelS2 is stepping up with new solutions for frictionless access control, too. A ‘phone as a badge’ approach enables a door to be unlocked by a smart phone, even if it is in a pocket, locked and/or the app has not been opened. Another alternative is a ‘shake to open’ action that sends the credential to the nearest reader. LenelS2 is also developing a full commercial access control as a service (ACaaS) offering, which is being previewed at ISC Show and will be released commercially later in the year. Video surveillance product line Mobotix is expanding its MOVE video surveillance product line with six new models announced at the show and broadening its reach into new vertical markets. A solutions approach offers both end-to-end Mobotix systems and other systems offered in conjunction with technology partnerships displayed in the Mobotix booth. Top of the list of new verticals is education, and Mobotix’s edge-based approach includes programmable logic built in so that ‘technology can take over when the human element is the weakest.’ Automated response is faster and ‘seconds equal lives’ during an emergency. In an education scenario, the Mobotix system acts as an Internet of Things (IoT) device that offers more functionality than other manufacturers’ ‘cameras.’ There are 22 steps involved to ensure the cybersecurity of Mobotix products, reflecting a higher level of cybersecurity commitment Mobotix has thermal products that are also finding uses in a variety of verticals, from oil and gas to manufacturing process control. Mobotix systems that can detect defects in products in the manufacturing process are expanding usage in applications beyond the traditional ‘security’ industry. Cybersecurity Commitment Mobotix is looking at the market in a completely different way, redefining how their products can fit into a variety of scenarios, and with a focus on cybersecurity. There are 22 steps involved to ensure the cybersecurity of Mobotix products, reflecting a higher level of cybersecurity commitment than some other manufacturers. “There are so many features within our solutions, and we want to get the word out to the end users, so they understand the features,” says Thomas Lausten, Mobotix CEO. “There is untapped potential.”
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System Helps In Tailgating Mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy Enrollment And Deployment Enrollment in the system is easy. Companies can deploy a separate enrollment station, or any reader can be used for enrollment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrollment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting Intent From Positioning Of Eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems And Video Surveillance As A Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video And Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimize operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realize other operational and performance efficiencies. Topic: Robotics And Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place In Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics In Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realize a more secure future. Topic: Voice Control In The Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces that its SmartCode 888 Deadbolt Lock was chosen to become part of the new Home is Connected smart home system from D.R. Horton, Inc. The inclusion of Kwikset’s SmartCode 888 in the system was based on its value (great functionality at an entry-level price), reliability, and high degree of security. Incorporating the latest Z-Wave 500 chipset, the SmartCode 888 offers keyless entry through a convenient, easy-to-use touchpad. Kwikset’s patented Home Connect technology enables the lock to wirelessly communicate with other devices in the home through a third-party smart home controller, as well as to remotely check the door lock status, lock or unlock the door and receive notifications. Innovative Program D.R. Horton’s Home Is Connected system is included in the base price of each new home from the company’s family of brands D.R. Horton’s 'Home Is Connected' system is included in the base price of each new home from the company’s family of brands. The system includes a robust central hub by Qolsys that controls the smart home features, including a home alarm and automation platform by Alarm.com, Honeywell Home thermostat from Resideo, smart switches by Eaton Corporation, video doorbell by SkyBell and hands-free, voice-first experiences with Amazon Alexa. “We are pleased to be part of such an innovative program created by the nation’s largest volume homebuilder,” said Dave Seeman, Director of National Builder Accounts, Kwikset and Baldwin, Spectrum Brands, Inc. – Hardware & Home Improvement Division. Convenience Of Keyless Entry “We are confident that buyers of D.R. Horton homes will not only appreciate the security and convenience of keyless entry that our SmartCode 888 provides, but also the endless benefits of whole home automation. To be a part of a system that includes such well-known, reputable brands indicates to us the high level of trust D.R. Horton puts in our products.” Brad Conlon, Vice President of National Accounts for D.R. Horton, said, “We are pleased to work with Kwikset to provide this essential component to D.R. Horton’s new Home is Connected smart home system. We know our customers will appreciate the peace of mind that comes from Kwikset’s SmartCode 888 lock and the Home is Connected system overall.”
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective Solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralized Management Software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorized to access) as part of their job. A lost key is easily disabled within the centralized management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic Access Management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorize subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending Electronic Key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimize the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling Common Areas Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organizations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-Based System “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access Control System Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix Things Remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
Pomelit Door Entry has been specified as the stylish system of choice at the much anticipated, Renaissance Retirement’s new luxury independent living, Fleur-de-Lis site in Marlborough. The development of 28 superior one and two bedroom apartments, built on the former Old Yard is the first new build site of its kind in the town for over 10 years. Designed in part by ex-England Heritage consultants, it adopts an ‘arts and crafts style’ consisting of sweeping, sprocketed roofs, Voysey dormers and large chimneys. Door Entry Panels With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited, the complete specification for the Fleur de Lis development right through to Comelit’s bespoke door entry panels, had to work with the ambition to present an independent lifestyle in a contemporary setting, and a modern and stylish environment. Says Paul Williams, Construction Director for Renaissance Retirement: “Fleur de Lis stands as one of our major new home launches. Not only does it look aspirational from the outside, but each apartment presents a real opportunity for those seeking to maintain a quality standard of independent living and uphold a luxury style of life.” Fully Integrated Solution “Throughout the project, from initial design through to specification and works completion, we have relied upon our trusted suppliers to advise on how to deliver on our vision. From a security perspective, it was integral that each of the properties connected to emergency call systems and 24-hour response, as well as an on-site concierge who is on hand to assist owners and oversee the development’s daily operation.” Orestone Controls worked with Renaissance Retirement right from the initial design and specification of security and fire systems on site, to installation, ensuring a fully integrated solution. For smart door entry, Comelit’s 2-wire SimpleBus system with mini handsfree monitors were selected to operate with KMS Access Control and FAAC gate control kit, installed to control the front gates and main entrance to the site. Seamless Security Experience And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living"Richard Chadd, Orestone Controls’ Engineering Manager added: “We have worked with Renaissance Retirement Limited long enough to understand their requirements and high expectations to deliver luxury as standard. And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living.” “Here, we had to consider each aspect of its specification in considerable detail, to ensure an impeccable finish. Comelit Group is globally renowned as a stylish door entry manufacturer and high specification solution. Its ability to integrate with selected gate and access control systems ensured we can create a seamless security experience.” At the Fleur-de-Lis development, warden and nurse call systems, operated through a specialist PA system presents residents with complete peace of mind that necessary services can be called in case of emergency. Independent Retirement Lifestyle Gareth Goodall, Comelit Business Development Manager concluded: “Renaissance Retirements’ exceptional Fleur-de-Lis development, in its provision of age-exclusive apartment living close to all the local amenities, is the ultimate choice for those desiring a peaceful and independent retirement lifestyle.” “To ensure success, security right from the perimeter through to apartment door entry, incorporating all community facilities, must be carefully balanced between ease of use for downsizers, integrated technology and with no compromise to quality or style. It’s something Comelit worked closely with Orestone to create a bespoke door entry solution.”
As increasing digital engagement powers forward in the hospitality industry, SALTO Systems has joined forces with the KeezApp technology platform to offer hotels an unrivalled guest experience. Property Management Systems The KeezApp platform provides a range of solutions for any property that hosts guests and is able to integrate with most PMS (Property Management Systems) on the market. Guests can check in from anywhere, receiving a virtual key straight to their smart phone and getting an alert when their room is ready for occupation. The front desk is then alerted when the guest has used the mobile key to enter their room even for doors equipped with offline electronic locks. The virtual app provides for access to all permitted areas of the hotel during their stay and when the time comes to check out, guests can again use KeezApp removing the need to queue at reception. KeezApp – SALTO Software Integration KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE Additional tools include live chat with the front desk. This provides a better, more efficient way for guests to talk and interact with the front desk whether they are in the hotel or out and about. Guests can also choose different departments to contact such as reception, concierge, housekeeping or room service depending on their needs. KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE. SALTO Hospitality add-ons include functionalities such as mobile keys (BLE), group check-in; real-time re-rooming and real-time extended stay. These plus other key hotel features make it easy to control all the offline and online rooms and back-of-house doors from different front desk guest workstations. SALTO Electronic Locks Both companies are driven by the opportunity for hotels to provide a superior guest experience to their clients, whether by offering mobile functionalities or superior management standards like quick check-in and check-out, online billing, live chat with reception, housekeeping and concierge or auto Wi-Fi connection for guests. SALTO welcomes new partnerships with industry leaders like KeezApp that will result in improved hospitality management and the guest experience. SALTO also continuously adds integrations with other technology providers so that those in the hospitality industry have a choice when it comes to which platform, they use to control SALTO’s robust line of electronic locks and supporting products.
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?