Door access control
Let’s face it, any security product fixed to a substrate in a public space is only as secure as its fixings, and key safes are no exception. The integrity of a key safe isn't solely reliant on its resistance to tampering and vandalism, although that's undeniably crucial; the quality and size of the fixings used to attach it to a wall are equally pivotal. Otherwise, it runs the risk of being easily removed from a wall in a matter of minutes, if not seconds, potentially causing a prope...
Nice, a global pioneer in Home and Building Management solutions, announced the launch of the Nice Linear 661 Garage Door Opener (GDO) and all-new Nice G.O. mobile app, introducing more integrated and smart remote management capabilities for end users, and pre-installed battery backup enabling simplified installation for dealers. The Nice Linear 661 Garage Door Opener marks the first in a series of smart, Nice branded garage openers that combine sleek industrial design at an incredible val...
Hanwha Vision is announcing that its Q series cameras will be fully compatible with Genetec™ Security Center SaaS, the company’s newly announced unified software-as-a-service solution. Genetec Security Center SaaS is a highly scalable, open, enterprise-grade physical security solution that is offered as a service and deployed in a hybrid-cloud architecture. It offers ease of deployment and enables organizations to choose the devices and cameras that work best for their business. Co...
Smart Spaces announces that it has partnered with the trusted identity provider, HID, to make access to Workspace’s The Light Bulb building in South West London fast, simple, and secure, by making door access credentials available in Google Wallet for all SME customers who lease offices and studios at the center. Any registered Android smartphone user can gain quick and seamless access to The Light Bulb by holding their device near any NFC-enabled HID Signo reader, with doors then o...
dormakaba announces a ground-breaking innovation in sustainable property management: a new fire-tested battery backup for uninterrupted power supply (ED UPS) to door automation (ED 100/250). This innovation marks a significant step for the Scandinavian markets Denmark, Finland, Norway, and Sweden which are the first countries to start with the launch in April and May 2024. Integrated battery backup The outstanding innovation is the integrated battery backup for a continuous power supply in...
A major access management business is gearing up for a trio of industry awards. The Key Safe Company, which supplies police preferred key safes and security products, has secured several industry awards nominations fresh from landing a coveted feature slot in The Sunday Times. A trio of industry awards Led by innovator - David Ogden, whose catalog of key safe inventions has revolutionized social care to name just one sector, Key Safe has been shortlisted for Entrepreneurial Business...
News
Gunnebo Entrance Control has appointed Rebeka Rivas as the new European Marketing Lead. In her role, Rebeka will spearhead strategic marketing initiatives across Europe, driving brand awareness and enhancing customer engagement. Born and raised in Spain, Rebeka is currently based in Germany where she previously worked in MarTech for a medical software organization. Before this, Rebeka was based in the UK where she was working in the security and access control solutions sector. Rebeka Rivas With a proven track record in marketing strategy and execution, Rebeka brings a wealth of experience to her new position. Her dynamic marketing approach, coupled with her deep understanding of customer behavior and market trends, will be instrumental in further strengthening Gunnebo Entrance Control's position in the European market. Marketing strategies Rebeka’s appointment as European Marketing Lead underscores Gunnebo Entrance Control's commitment Rebeka Rivas said, “I'm excited to join the global marketing team at Gunnebo Entrance Control. To be part of a team that is so enthusiastic and professional, I know this is a great role I will hugely enjoy. I am eager to join my team and deliver their exciting marketing strategies to put the brands at the forefront of the market." Rebeka’s appointment as European Marketing Lead underscores Gunnebo Entrance Control's commitment to attracting top talent and investing in marketing to drive regional success. Strategic leadership Tina Hughan, Global Marketing & Sustainability Director for Gunnebo Entrance Control stated, “I am extremely proud to welcome our latest addition to the Global Marketing Team." Tina Hughan adds, "Rebeka’s strategic leadership will be pivotal in effectively communicating the value proposition of Gunnebo Entrance Control's solutions and driving demand in the European market." Talent, wide-ranging skills, and enthusiasm Tina Hughan continues, "Her talent, wide-ranging skills, and enthusiasm will make her a real asset in our drive to cement Gunnebo Entrance Control as the first choice for delivering secure and safe freedom of movement." Rebeka joins Gunnebo Entrance Control as the global pioneer in innovative entrance control solutions at an exciting time as the company continues to innovate and expand its product offerings to meet the evolving needs of its customers.
Tamworth-based trade association, the Door & Hardware Federation (DHF), has announced that it will be exhibiting at the Security Event 2024. The organization will be situated on stand 5/L24 and available to discuss membership and provide information on its training, including the program of one-day theory-based awareness training courses offered in collaboration with BRE that cover fire door safety, inspection, installation, and the ongoing maintenance of fire doorsets. The Security Event With more than 350 exhibitors, the Security Event will return to the Birmingham NEC from 30th April to 2nd May, reuniting manufacturers, distributors, installers, integrators, consultants, and end users. The event showcases the world’s pioneering security brands. It is designed ‘by the industry, for the industry’ and delivers an opportunity to attend free workshops, and seminars that are CPD accredited, network, view case studies, and receive in-person product demonstrations from industry experts. Fire Event The Fire Event will also take place at the NEC at the same time, to support industry practitioners The Fire Event will also take place at the NEC at the same time, to support industry practitioners, professionals, and organizations in achieving and maintaining the very highest standards of fire safety management, showcasing the latest products, technology, and solutions in fire safety, and offering practical advice and live demonstrations. “As a supporting partner of the Security Event, DHF is continuing to demonstrate its ongoing commitment to strive for change and awareness industry-wide,” says DHF’s Commercial Director, Patricia Sowsbery-Stevens. Achieving compliance "Both the Security Event and the Fire Event are the perfect platforms from which to showcase our enduring support for these sectors." "We are delighted to be exhibiting at the Security Event once again and we look forward to welcoming visitors to our stand. The DHF team will be on hand to meet with new and existing members to discuss how we can support businesses in achieving compliance.”
SARGENT, an ASSA ABLOY Group brand, is showcasing its expansive portfolio of door controls, electronic access control, exit devices, and locks at ISC West in booth #8061. Showcased products include SARGENT’s PE80 Series exit device, which incorporates an extensive list of next-generation features including new visual status indicators and robust end cap designs. Also highlighted is SARGENT’s extensive offering of Electronic Access Control (EAC) devices for integrated systems or WIFI operation in wired and wireless configurations. Product portfolio “SARGENT door opening solutions provide the features and capabilities required for robust environments to help ensure unparalleled safety, security, versatility, and compliance,” said Adam Dowden, Director of Business Development for SARGENT. “The wide breadth of the SARGENT product portfolio provides users and installers with the specific hardware solutions they need for the myriad range of applications across their facility – all engineered with the strength, durability, and future-proofed features to stand the test of time.” Features of SARGENT PE80 Series The flush push bar and rail carrier reduce the risk of clothing, bags, or objects being snagged Showcased at ISC West, SARGENT PE80 Series exit devices incorporate next-generation features including visual indicators for trim status, passive dogging, and active dogging. The visual indicators add a new dimension and user experience to the exit device product category by providing instant visual verification of lock status from a distance. Additionally, the PE80 Series features a “minimized catch point” flush push bar and rail carrier to reduce the risk of clothing, bags, emergency equipment, or objects being snagged. The sleek design also facilitates easy cleaning and maintenance, helping to ensure reliable performance and long-term durability. SARGENT Electronic Access Control solutions Also featured, SARGENT Electronic Access Control solutions include an extensive selection of wired and wireless door control solutions for use in integrated systems or stand-alone operation. Intelligent WIFI models are available in a variety of heavy-duty and ADA-compliant lock configurations paired with various wireless readers, making it easy and convenient to expand existing access control systems. ISC West 2024 Additional featured products from SARGENT at ISC West include 10X Line Bored Locks engineered to secure and protect high traffic, high abuse spaces that exceed ANSI/BHMA ratings by as much as 20X; SN Series Locks and Pushpad/Keypad solutions with Open Supervised Device Protocol (OSDP) to continuously monitor end-to-end wiring, and PoE compatibility for cost-efficient installation. The Visual Status Indicators for the 8200 Series Mortise Lock feature the largest viewing window in the industry, a 180° visibility profile, reflective indicator materials, and an extensive offering of color and text/graphic combinations.
Corbin Russwin, an ASSA ABLOY Group brand, is displaying the company’s extensive portfolio of door opening solutions at ISC West in booth #8061. Featured products include Corbin Russwin PED5000/PED4000 Series exit devices incorporating a host of next-generation features like visual status indicators, alongside a comprehensive offering of premium lock and architectural door hardware products designed for environments that demand the perfect balance of safety, security and high aesthetics. Delivering advanced solutions “Corbin Russwin locks and architectural hardware deliver a distinct blend of industrial design and mechanical integrity that clearly differentiates our product portfolio in the market,” said Mia Merrel, Director Product Management, Commercial Mechanical Hardware, ASSA ABLOY Opening Solutions. “Products like our PED5000/PED4000 Series next-generation exit devices with visual indicators exemplify our continued dedication to deliver cutting-edge solutions for a new and retrofit applications in premium venues.” Designed to evolve safety and security Next-generation Corbin Russwin PED5000/PED4000 Series exit devices are engineered to meet the ever-evolving needs of today’s modern buildings. Amongst its many features, the new series offers status indicator options to provide peace of mind for occupant safety and security. The series all wiring for electromechanical functions is contained within the device’s carrier For added safety, the sleek design reduces catch points from clothing, straps and firehoses, while also contributing to extended life and reduced maintenance. Designed for ease of installation, all wiring for electromechanical functions is contained within the device’s carrier, eliminating the need for additional holes to be drilled in doors. PED5000/PED4000 Series exit devices’ rugged construction meets hurricane, windstorm and FEMA building codes, including the stringent Florida Building Code, Miami Dade Code and the International Building Code. ISC West 2024 Corbin Russwin products also being highlighted at ISC West include: CLX3300 Series Grade 1 Cylindrical Locks for high traffic spaces where aesthetics are important; the popular Visual Status Indicators for the ML2000 Series Mortise Lock, which features the largest viewing window in the industry, a 180° visibility profile, reflective indicator materials and a wide offering of color and text/graphic combinations. The industry’s most extensive range of Decorative Architectural Door Hardware that elevates any interior design without sacrificing style for functionality and dependability.
ASSA ABLOY ACCENTRA™ and DoorBird provide a comprehensive solution for property owners looking to enhance the security of their property while adding valuable convenience for their residents and staff. Secure and convenient With this new integration, the DoorBird IP video intercom can be managed seamlessly within the ACCENTRA Mult-family dashboard, eliminating the need to manage two separate systems. ACCENTRA allows a secure and convenient way for residents and staff to access all areas of the property, while DoorBird gives the residents the ability to grant access to their guests while at home or away.
Acre Security, a global pioneer providing state-of-the-art security systems, unveils acre access control in conjunction with the acre Smart Controller and the acre Reader. The combined ecosystem delivers extensive flexibility and offers the fastest and most user-friendly route to cloud adoption. Together, these solutions provide a simple and robust security solution to meet the evolving needs of any organization. Functionality, flexibility, freedom Built from the outset with cybersecurity in mind, acre access control offers intelligent functionality, flexibility, and the freedom to choose the best deployment option based on the business’ specific requirements. Organizations are no longer constrained to select between on-premises or cloud-based systems as acre access control can be deployed in either a native cloud or local on-premise environment, based upon the same code base and user interface, making the move from on-prem to cloud seamless. User-friendly interface "As the market landscape evolves, our goal is to enable customers to choose the platform that best aligns with their needs, a degree of flexibility they have long desired but have struggled to find," said Don Joos, CE of Acree Security. "Acre access control brings a user-friendly interface, connects with a wide array of networked systems, and supports a myriad of deployment strategies. With acre access control, we pave the way for a smooth transition to stronger, faster, more capable security operations.” Functional Integration Toolkit Scripts (FITS) Contractors are provided immediate access through one-time codes delivered directly to their mobiles Acre access control offers simplicity and efficiency with Functional Integration Toolkit Scripts (FITS), transforming the landscape of workflow efficiency. Visitors and new employees can easily navigate self-enrollment, sending text messages to start the process, while new hires can quickly submit selfies to obtain their mobile credentials. Contractors are provided immediate access through one-time codes delivered directly to their mobile devices. Employees can also reserve workspaces and arrange after-hours access, handling all approvals via TEAMS or text messages. 4-door smart controller Designed to meet dynamic market demands, the 4-door acre smart controller keeps people and property safe with intelligent, affordable, and unparalleled agility. It manages two doors with Wiegand or up to 4 doors with OSDP, supporting up to eight readers for comprehensive entry and exit management. Multi-technology access control readers Acre's solutions offer versatility and modern aesthetics, ensuring customers have the freedom Furthermore, acre introduces a lineup of multi-technology access control readers that enable mobile wallets to be fully compliant with OSDP standards, and support a wide range of technologies, including NFC, Bluetooth, Smart (13.56 MHz), and Proximity (125 kHz.). Acre's solutions offer versatility and modern aesthetics, ensuring customers have the freedom and flexibility to set their migration path to secure credentials and ecosystems. IoT and IT advancements “As the security industry moves away from its reliance on hardware, it aligns more closely with rapid advancements in IoT and IT,” said Darren Learmonth, CT of Acre Security. “This shift signifies a broader trend towards systems that integrate better, work more efficiently and adapt to the evolving security and enterprise risk landscape.” ISC West 2024 The acre security team invites visitors to experience the future of access control at ISC West 2024. Discover how the organization revolutionizes the industry with innovative, simplified, comprehensive solutions. For an in-person experience, visit us at the Acre Security booth #20059 at ISC West 2024 or schedule a meeting.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximize your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimize your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet Impacting Credentialing Trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office, and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licensing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of Adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables the transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilize Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organizations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centers, office and residential buildings, airports, hotels, resorts Physical locations include data centers, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID, or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables the use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimizing security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges. Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand. Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organizers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.” Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialized readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
Case studies
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travelers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognizing this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritize security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Tenant and homeowner expectations in the multi-residential sector are evolving fast. Digital access offers a solution that fits a contemporary ethos blending design, functionality, technology, and sustainability. STAY by Kronos is a fast-growing developer and service provider in Spain’s build-to-rent (BTR) property sector, where business is booming: Investment grew over 17% between 2021 and 2022 alone. Such high-profile success attracts more providers who compete for location, quality, and customer satisfaction in the services they offer. The rental market is tightly regulated, so operational time- and cost-efficiency are essential. New twin-building site They sought convenient, user-friendly, connected control for both homes and common areas STAY already operates properties in cities including Córdoba and Tarragona and so understands the opportunities offered by digital access. For a new twin-building site in Madrid, they sought convenient, user-friendly, connected control for both homes and common areas including a gym and co-working space. The solution needed to be convenient and secure for residents — and make it easy for facilities managers to work efficiently with service providers who often require temporary access to the site. Convenient, secure mobile digital access STAY by Kronos chose ASSA ABLOY’s SMARTair® wireless digital access solution. Building managers now quickly cancel any lost credentials and issue new ones — remotely if necessary — which reduces operating costs, maintains building security, and provides the flexibility they need every day. Main door entrances are unlocked via SMARTair Wall Readers. Residents can conveniently access and move through the building with a regular smart card, RFID keyring, or the SMARTair Openow app, which stores secure mobile keys on their personal smartphones. Secure, battery-powered i-max Wireless Escutcheons lock 121 apartments and shared amenities (gym, play area, and so on) across both buildings. No cabling or major door modifications were needed during installation. Temporary mobile access SMARTair saves time managing the many providers who offer services to tenants For residents, the convenience advantage over metal keys is a big plus: “They have the key virtually on their mobile phone, so we are sure they won't lose it and they find it very useful,” says Carlos Rodríguez-Bailón Fernández, Managing Director at STAY by Kronos. From a facilities perspective, SMARTair saves time managing the many providers who offer services to tenants. Programming temporary mobile access to common spaces like a dining boutique via TS1000 Web is fast and intuitive. Digital locking with a security deadbolt The SMARTair i-max has inbuilt features designed to enhance security and give residents extra peace of mind. It is easy for them to lock their front door by simply pushing its handle upwards activating the deadbolt projection with a secure 3-bolt lock. Similarly, the i-max anti-panic mechanism guarantees quick emergency exit, even when the door is bolt-secured. Thanks to these security benefits and feedback on resident satisfaction, SMARTair is now the standard solution for all STAY by Kronos projects — in Madrid, Tarragona and beyond. “With ASSA ABLOY there was always that trust in an established company, a longtime pioneer in the market with a quality track record,” said Carlos Rodríguez-Bailón Fernández, adding “They were also our technology ally.”
A prominent participant in the Central African mining industry, this company focuses on the exploration and extraction of copper and cobalt. Boasting a substantial cobalt reserve and expansive copper assets, it is presently undergoing a significant restructuring to establish itself as a prominent global player in mining. Through strategic collaborations with major entities in the sector, both domestically and internationally, the corporation aims to enhance its competitive standing. An impactful project currently under evaluation aims to achieve an annual copper output of 200,000 tons, underscoring its dedication to expansion and prominence in the worldwide mining landscape. Overview Faced with the necessity for an enhanced attendance management system across widely spread mines and a sizable workforce, the client approached Matrix for a solution. The particular challenge involved consolidating attendance management and facilitating rapid attendance marking for approximately 10,000 users across various mines and the central headquarters. Matrix was enlisted to tackle the challenge, with the client specifically desiring a high-speed face-based attendance system Matrix was enlisted to tackle this challenge, with the client specifically desiring a high-speed face-based attendance system as the primary credential for marking attendance. The collaboration was geared towards achieving a seamless and centralized attendance management process across different mine locations. Client challenges Matrix demonstrated a nimble response to the client's urgent requirements, strengthening their attendance management infrastructure. The challenges encompassed the consolidation of attendance management and are outlined below: Requirement for Centralized Employee Attendance Management: Operating across diverse mining locations, the client encountered difficulties in efficiently handling employee attendance. To address the challenges faced by the mining conglomerate, there was a clear need to implement a centralized solution to streamline and enhance attendance management effectively. Need for an Employee Portal: Another challenge faced by the client was the absence of an easy-to-use platform for attendance and leave management, visible to their employees. Swift Identification of Mine Workers and Employees: There was a critical demand for the rapid identification of employees and mine workers, emphasizing the urgent need to expedite attendance processes. Matrix's solution Matrix efficiently addressed these requirements by offering solutions that enhanced its client's attendance management systems. The company implemented its Instant Face-based Time Attendance Management Solution, delivering the following benefits: Centralized Attendance Management for Streamlined Employees: Matrix provided a comprehensive time attendance solution with centralized management capabilities. This allowed the client to have unified control over employee attendance from various mine locations, simplifying the overall management process. Employee Self-Service Portal for Quick Access to Leave and Attendance Management: In addition to the time-attendance solution, Matrix introduced its employee self-service portal, offering employees convenient ways to update leave information and facilitating smoother leave approval processes. Instant Face Recognition for Seamless Employee Identification: Matrix deployed COSEC ARGO FACE for rapid face recognition. With a recognition speed of less than 0.5 seconds, this device enabled the client to achieve high-speed face-based attendance. This accelerated the attendance marking process across all mine locations. The integration of Matrix's face-based Attendance Solution, along with an instant face recognition door controller, significantly enhanced the client's attendance operations, leading to heightened operational efficiency throughout the organization. Application scenario Results Instant Face-based Time Attendance Management Solution Employee Self-Service Portal facilitated seamless leave and attendance management for employees Matrix adeptly tackled the intricate challenges faced by this Central African mining entity, elevating attendance management and employee engagement. By implementing the Instant Face-based Time Attendance Management Solution, Matrix not only centralized attendance management across diverse mine locations but also introduced an Employee Self-Service Portal. This portal facilitated seamless leave and attendance management for employees, promoting transparency and efficiency. Operational efficiency The integration of COSEC ARGO FACE ensured rapid face recognition, reducing identification time to less than 0.5 seconds. The holistic solution significantly enhanced operational efficiency, providing the mining company with streamlined attendance processes, improved employee interaction, and heightened overall organizational effectiveness.
A well-known fashion label has effectively expanded its presence in various markets by establishing exclusive brand outlets, multi-brand outlets, large format stores, and engaging in e-commerce. With a widespread network comprising more than 200 exclusive brand outlets, 1300 multi-brand outlets, and 60 large format stores, the brand delivers modern clothing with a dedication to delivering top-notch quality at affordable prices. Under the guidance of its dynamic leadership, the brand has emerged as a preferred option for those with a keen sense of fashion, indicating a bright outlook for achieving global recognition in the fashion and lifestyle sector. Client Overview The client needed a solution to a very particular issue: the installation of a secure elevator access control system. Wanting limited access to specific floors exclusively for authorized personnel, the client enlisted Matrix's skills to deliver an Elevator Access Control Solution. This solution aimed to guarantee controlled and secure vertical movement within their building, contributing to heightened security measures and improved operational efficiency. Client challenges The client encountered a significant obstacle in controlling access to specific floors through elevator entry, outlined as follows: Elevator Access Control for Restricted Floors To bolster security measures, Matrix was engaged to deploy a reliable elevator access control system The client confronted difficulty in managing its 12-floor facility, which included three floors restricted to its employees. To bolster security measures, Matrix was engaged to deploy a reliable elevator access control system. The implemented solution guaranteed precise authorization, restricting entry to designated floors and fulfilling the client's requirement for increased security within their premises. Matrix solution Matrix effectively met these requirements by delivering solutions that enhanced the client's security systems. Matrix implemented an elevator access control system to achieve: Matrix installed elevator access control system to accomplish: Elevator Access Control for Exclusive Floors Matrix skillfully tackled the client's challenge involving a 12-floor structure, with three floors designated as restricted areas. Through a customized elevator access control system, Matrix successfully fulfilled the client's objective of providing selective access to VIP individuals for the specified three floors, ensuring improved security and control within the premises. Matrix's Elevator Access Control Solution not only resolved the client's challenges but also significantly enhanced access operations, leading to an overall increase in security throughout the organization. Efficiency results Matrix not only fulfilled the client's specific needs but also considerably improved the overall efficiency The application of Matrix's Elevator Access Control Solution produced impressive results for the client. The customized system effectively ensured secure and controlled vertical movement within the 12-floor facility, with a particular focus on the three restricted floors. Through the provision of selective access to VIP individuals, Matrix not only fulfilled the client's specific needs but also considerably improved the overall efficiency of security operations. This successful partnership led to the optimization of the security infrastructure, showcasing Matrix's dedication to providing effective solutions for its clients' distinctive challenges. Products Offered COSEC ARC IO800: Input-Output Controller COSEC PATH DCCM: Compact Card-Based Door Controller COSEC CENTRA PLT: Platform-based User License COSEC CENTRA ACM: Access Control User License
Protecting booths at trade shows is a challenge. After all, exhibitors want a constant stream of high traffic, especially from people they are meeting for the first time. It’s why they attend such large-scale fairs. Relying on exhibition-provided security is sadly not enough. Individual stands need their protection for areas where valuable equipment, product samples, or confidential commercial documents are kept. Innovative, modern solution Barcelona-based ExpoFactory specializes in the design and building of award-winning exhibition stands for the MICE, retail, and habitats/architecture sectors. They understand that booth security is integral to customers’ needs and that keeping booths safe is not easy. They hoped to identify an innovative, modern solution that would be more flexible and convenient than mechanical lock-and-key security. Factors to consider Firstly, easy installation, to ensure that fitting locks did not slow down their build process Two more factors were critical in their choice. Firstly, easy installation, to ensure that fitting locks did not slow down their build process. Secondly, and equally important: The ability to easily reset and reuse devices. ExpoFactory needs locks that can be trusted to last. Everyone has their PIN — no one carries keys To replace manual, mechanical keys and cylinders, they chose Code Handle Door, a digital PIN door lock housed within an elegant handle. So far, 60 devices have been equipped. With a Code Handle, all that’s needed to unlock is a secure 4- to 6-digit PIN. There’s no key to use, lose, or track, and no worries that it’s been copied. Code Handle “Code Handle has a stylish design, easy installation, and eliminates the need for physical keys,” says Adelfio Marino, Logistics Center Manager at ExpoFactory. Installation is fast: the Code Handle fits over a standard cylinder and is fixed in place by two screws. Batteries slot inside for a minimal footprint. There’s no wiring or software to worry about. When the event is finished, it’s simple to reset the device ready to incorporate in another trade show stand. Upgrades booth security With Code Handle, the team leader chooses up to 9 different PINs for authorized staff Code Handle instantly upgrades booth security. It makes sure only the right people have access, not just anyone who happens upon the key. With no keys to track, organizing stand security is easier, too. Everyone on the stand works faster because they don’t wait for a keyholder to appear. With Code Handle, the team leader chooses up to 9 different PINs for authorized staff (and cancels them anytime). Tailor-made digital solution It’s also a convenient digital solution tailor-made for busy trade shows: “Everything was easy and effective,” said Adelfio Marino, adding “And it makes our final product of higher quality. The customer prefers it.” With its unique combination of durability, stylish design, and ease of use, the Code Handle digital lock has already been deployed to separate public and private spaces in all kinds of settings from clinics and pharmacies to shops and home offices.
In 2023, Tenterden Town Council completed the successful installation of vandal-proof fencing at a recreation ground situated in St Michaels village, in the borough of Ashford, Kent. The new fencing and gates enhance security around the groundskeeping equipment storage building, to provide convenient access and ensure the grounds can be neatly kept for all users of this cherished community space Creating a sanctuary Situated in the idyllic village of St Michaels, a stone’s throw from Tenterden town, the recreation ground serves as a focal point for residents and visitors alike. With amenities including a children’s play area, a skate park, and lush green spaces, it is a popular destination for leisure and recreation. Need for robust security measures To safeguard the well-being of park users and protect against vandalism, Tenterden Town Council enlisted fencing and security specialists, Jacksons Fencing to install robust security measures. After witnessing the premium quality of Jacksons Fencing’s previous installation at the play area in 2013, the council opted for over 80 meters of EuroGuard® Regular fencing, complemented by two 4.9 meters-wide EuroGuard Flatform double leaf gates. Beyond the barriers EuroGuard Regular, with its large mesh apertures, ensures good visibility from both sides of the fence Supplied with a galvanized and architectural grade polyester powder-coated finish, the EuroGuard system stands as a stalwart defender against rust and corrosion, ensuring enduring resilience. Yet, its qualities extend beyond durability. EuroGuard Regular, with its large mesh apertures, ensures good visibility from both sides of the fence, crucial for surveillance needs, particularly in areas prone to vandalism. EuroGuard features Moreover, EuroGuard features unique mesh security clips, tightly securing panels to posts with tamper-proof fixings on the secure side of the fence, mitigating the risk of panel removal. This innovative design addresses issues that are commonly associated with mesh fencing, enhancing security and peace of mind for the community. Sustainable and sleek Echoing Tenterden Town Council's commitment to eco-conscious infrastructure, the EuroGuard fencing stands resplendent in its powder-coated black (RAL 9005) finish, marrying sustainability with sophistication. Not merely a barrier, but a beacon of security and style. Each product comes with the assurance of Jackson Fencing’s 25-year guarantee, symbolizing a commitment to quality and trust. Eco-friendly EuroGuard fencing system Commenting on the project, Peter Jackson, Managing Director, of Jacksons Fencing, said, "Security and sustainability are at the heart of our mission at Jacksons Fencing. We're proud to have partnered with Tenterden Town Council once again to enhance the safety and beauty of St. Michaels Recreation Ground." Peter Jackson adds, "Our EuroGuard fencing system not only provides robust protection against vandalism but also contributes to the eco-friendly ethos of the community. Together, we're reinforcing spaces where families can gather, play, and thrive."
Products
Round table discussion
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a credential or otherwise engaging, and with the system recognizing who you are and allowing you to pass. In true frictionless access, everything works seamlessly, with unauthorized people obviously barred. But how close are we to realizing frictionless access control? We asked this week’s Expert Panel Roundtable: Is frictionless access control a reality or an empty promise?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
White papers
Boost Efficiency And Streamline Security With Integrated Access Control
DownloadAI In Security Solution
DownloadManaging Security In The Age Of Boundaryless Working
DownloadThe Top 4 Reasons To Upgrade Physical Security With The Cloud
DownloadAccess Control: The Enterprise Buyer's Guide
DownloadEffectively Branding A Multifamily Property
DownloadIdentity And Access Management
DownloadSecuring Care Closer To Patients
DownloadAccess management in higher education
DownloadSchool Security Checklist
Download6 Good Reasons To Embrace Mobile Credentialing
DownloadThe Welcoming Workplace
DownloadCombining Access Control And Intercoms For Better Security
DownloadThe Wireless Access Control Report 2023
DownloadLeveling Up With Campus Safety
DownloadVideos
Door access control: Manufacturers & Suppliers
- Alpro Door access control
- Aiphone Door access control
- Software House Door access control
- Trimec Door access control
- Vanderbilt Door access control
- ASSA ABLOY - Aperio® Door access control
- HID Door access control
- Bosch Door access control
- Honeywell Security Door access control
- CyberLock Door access control
- Paxton Access Door access control
- TESA Door access control
- Adams Rite Door access control
- Magnetic Solutions Door access control
- CLIQ - ASSA ABLOY Door access control
- SALTO Door access control
- Codelocks Door access control
- CEM Door access control
- Deedlock Door access control
- Eff-Eff Door access control