Working with ASSA ABLOY building information modeling (BIM) consultants helped Zarhy Architects and STUDIO PEZ maintain the flow of up-to-date information for a complex, constantly evolving project and left them free to focus on creativity and delivery. Collaboration was key to successful design and building specification for the Broadcom R&D Center at Tel Aviv University. The ASSA ABLOY BIM consultancy team has experience on projects of every size — from a single door to 15,000 &mdas...
Mobile access is changing the way we interact with buildings and how we manage their security. The smartphone becomes a mobile key just as easily as it transforms into a payment card or a map. The device which users already carry enables them to unlock buildings or rooms, across one or multiple sites, securely and at a lower cost to the business than alternative credentials. According to one recent access control market report, users view the benefits as a powerful triad of convenience, cost, a...
SAFR from RealNetworks, Inc. announced a new version of SAFR, the world’s foremost facial recognition solution for live video, offering accurate, fast, unbiased face recognition and additional computer vision features. SAFR version 3.4 introduces new passive liveness detection and anti-spoofing features, for both masked and unmasked faces, to enhance security for face biometric authentication solutions. The new version also includes SMS watchlist alarms. Passive Liveness Detection SAFR&...
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is s...
Trusted CLIQ wireless locking from ASSA ABLOY Opening Solutions now works seamlessly within the Security Center from Genetec. This new integration helps Security Center users to broaden their access control capability, administer locking more efficiently, and better protect all kinds of premises from increasingly sophisticated and diverse threats. “Genetec is recognized as a global industry leader in IP-based security solutions,” says Thomas Åkerberg, Business Unit Director fo...
Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to con...
iPhone users have a new way to keep their data and information safe from hackers with XSealed, an app that creates a maximum-security room to securely house private data and activity. XSealed iOS app The newly launched XSealed iOS app is available now in the AppStore and allows users to manage passwords, browse privately, and store their private pictures, files, and other information in an encrypted room, which hackers cannot decipher, even if the phone is compromised by an intruder. According to Pew Research, 64% of Americans have experienced a major data breach of some sort and when it comes to smartphones, devices can be compromised by phishing attempts, public Wi-Fi, poor password management, malware, and other common hacking attempts. Enhancing personal data security When a user downloads the XSealed app and sets up a private room, they can securely browse the internet The XSealed app ensures that user data is protected, even if a phone is accessed physically by someone who obtains the password or by online hacking. When a user downloads the XSealed app and sets up a private room, they can securely and privately browse the internet, without their activity being accessible to outsiders. They are able to access a secure password manager and they can safely store their most private pictures and videos, as well as their banking information, contacts, and anything else that they want to keep private. Secure cloud backup and restoration With XSealed, users get maximum security through configurable locks, encryption, lockout attempts protection to stop hackers, lock and key protection to keep keys private, account recovery for lost or forgotten keys, and quick wipe to erase the vault contents. Additionally, XSealed provides a secure cloud backup and restoration feature to recover lost data. Another feature available with XSealed is a secure password manager, which enables the user to load their favorite sites, long passwords and usernames, and assign an icon of choice for each. Once the password item is created, a user only needs to click the assigned icon and they are automatically logged on to the corresponding site, allowing for quick access to frequently visited websites. “With XSealed, iPhone users now have the most secure way to keep private information private, whether from a snooping intruder or an online attempt to access the phone by hackers,” said the XSealed development team. Configurable locks With the XSealed app, lockout attempts have security features to protect against hackers Configurable locks for the app work by giving the user a choice of up to 3 lock options for their private room, including biometric, pattern, and password unlock. With the XSealed app, lockout attempts have security features to protect against hackers trying to access the phone, yet the app still enables account recovery for genuine lockouts, if in the case keys are forgotten. Lock and key protection Lock and key protection with XSealed works by creating unique keys after setup is completed. Unlike passwords, keys are not saved anywhere on the device. This increases security in the event of a hack as keys are matched to the locks by hashing, an algorithmic method that creates the keys at the time of each successful unlock. Once inside the XSealed vault, users can access a main control panel with sections that organize their private activity or storage. Everything in the vault is encrypted and secure unless exported outside of the app. Free and paid subscription options Anyone interested in trying the XSealed app can do so for free by downloading the app in the AppStore. The free version includes limited entries, while the paid monthly subscription option for XSealed allows unlimited entries to be made in the private room.
March Networks, a global video surveillance and video-based business intelligence pioneer, is pleased to introduce its X-Series Hybrid Recorders, a new high-performance platform that’s optimized to support Artificial Intelligence (AI) applications with NVIDIA system-on-chip (SoC) technology. The X-Series is March Networks’ most powerful recording platform to date, delivering a 400% increase in throughput over its previous generation recorders. It is a true hybrid platform supporting a mix of analog, HD analog, and IP channels, but with all the power and storage capacity needed for demanding all-IP installations. Available in 16, 24, 32, 48, and 64-channel configurations, the embedded, Linux-based appliances also feature a dedicated AI engine and SoC technology from American GPU and AI computing pioneering NVIDIA. AI-powered applications NVIDIA’s rich ecosystem of partners will enable March Networks to accelerate the development of AI-powered applications and analytics for the X-Series as the company moves toward a fully AI-capable product line. In addition to the X-Series, March Networks also offers a line of AI-enabled IP cameras in its ME6 Series. The X-Series platform comes preconfigured with March Networks’ next-generation video management software, which supports future add-on applications like face recognition, as well as object detection, classification, and search, scheduled for release later. “We chose NVIDIA because of its proven leadership in AI and its extensive network of analytic partners, which will enable us to continually add new capability to the X-Series,” said Peter Strom, March Networks President & CEO. NVIDIA chipset With our customized cyber secure OS we are raising the bar on delivering the lowest total cost of ownership" “This platform builds upon March Networks’ reputation for delivering the most secure and long-lasting enterprise NVRs in the industry. “ “With our customized cyber secure Operating System (OS), proven ability to deliver NVRs with less than a 1% failure rate, and thousands of systems still operating after more than 10 years in service, we are once again raising the bar on delivering the lowest total cost of ownership solution available.” “The X-Series provides a clear migration path to IP video for businesses that still have significant analog deployments, including those in the financial and retail sectors, and the use of the NVIDIA chipset combined with its hybrid capability make it truly unique in the market.” X-Series features In keeping with March Networks’ commitment to security, ease of use, and reliability, the X-Series feature: A customized and embedded Linux OS that removes unnecessary services and applications and locks all non-essential network ports, reducing the likelihood of attack; the customized OS also has a reduced volume of code that helps optimize overall system performance and minimize The highest level of protection for customer data with complete end-to-end encryption (from camera to recorder to enterprise management system to client software) with cameras supporting RTP/RTSP over HTTPs. A new configuration tool that allows users to set up the recorders in just a few easy steps. A convenient embedded Wi-Fi dongle that will allow for an instant connection to the March Networks GURU Smartphone App so technicians can check the recorder’s warranty status, get in-field diagnostics, and do on-site wireless provisioning. Added redundancy with March Networks Shadow Archiving, an innovative feature that allows for seamless access to redundant video recorded on March Networks IP cameras, even after a network outage or power failure. The X-Series integrates seamlessly with March Networks’ Searchlight data analytics software, Command Enterprise Software, and cloud-based Insight Monitoring and Resolution Service for proactive video network monitoring and issue resolution. The platform is fully compliant with the John S. McCain National Defense Authorization Act (NDAA), Section 889.
Businesses are always looking for cost-efficient solutions to upgrade their security level. AXIS Entry Manager’s customers can now extend access control efficiently and affordably with Aperio battery-powered locks from ASSA ABLOY. Online integration of the AXIS A1001 Network Door Controller with Aperio cylinders, escutcheons, and locks give facility managers real-time control over more doors. Administrators continue to manage every locking point from one AXIS Entry Manager interface, thereby saving time and removing the need to complete extra training. AXIS A1001 Network Door Controller AXIS A1001 Network Door Controller operates on a flexible platform, built to adapt as a site’s security needs change AXIS A1001 Network Door Controller operates on a flexible platform, built to adapt as a site’s security needs change. With this integration, battery-powered Aperio locks are controlled from the same web interface as wired door devices. Because the integration is online, it enables real-time control plus door and user audits on demand. “This integration is the first we have ever done with our access controllers,” explains Ernst Westerhoff, Business Development Manager for Access Control in Europe at Axis Communications, adding “At the end of the day, it costs less for the end-user.” Aperio RS-485 Hub Once installed, an Aperio RS-485 Hub coordinates up to 8 Aperio devices within a 15- to 25-meter range, communicating with the central system via the AXIS A1001. One AXIS A1001 can manage one wired door and one Aperio hub, for a total of 9 doors maximum per controller. AES 128-bit encryption secures all communication between locks and security systems. Aperio locks are wireless, so they require no expensive cabling to install. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates any need for power cabling to controllers. Aperio is cost-efficient during the use phase, too. Wireless Aperio locks Because they run on standard batteries, Aperio locks are much more energy-efficient than equivalent wired door locks. Unlike wired locking, Aperio devices are not connected to mains electricity and use no power when inactive. According to recent ASSA ABLOY benchmarking analysis, choosing wireless over wired locking could bring a large reduction in access control energy use, more than 70% or thousands of euros over a typical installation’s life-cycle. Greater flexibility to expand system coverage Aperio offers Axis end users much greater flexibility to affordably expand or modify their system coverage" “Aperio offers Axis end users much greater flexibility to affordably expand or modify their system coverage. If needs change at a facility, for example, managers want to filter access through more doors, it’s quick and easy for an installer to fit Aperio locks and integrate them online with the AXIS Entry Manager control panel.”, says Lars Angelin, Aperio Business Development Manager at AAOS. The integration allows users to open all wired doors and Aperio wireless controlled doors with the same credential, via almost any standard RFID technology including iCLASS, MIFARE, HID Prox/EM410, and Seos. “We offer to our customers the benefit of easy set-up for wireless access control. They just mount a wireless lock or wireless cylinder to a door and they have full access control,” adds Westerhoff. Streamlining access management The new integration has already been deployed at H-Farm, a business education and innovation hub in Italy. They sought a solution to streamline access management at a geographically dispersed portfolio of buildings. H-Farm experiences rapid user turnover, both because new businesses join regularly and because they organize up to 300 events every year. New locks had to extend the existing Axis system without adding admin workload. Aperio handles, security locks and escutcheons To meet their needs, H-Farm selected Aperio handles, security locks and escutcheons, each easy to retrofit To meet their needs, H-Farm selected Aperio handles, security locks, and escutcheons, each easy to retrofit, so as to ensure that day-to-day work at their offices would not be disrupted. So far, 40 Aperio H100 wireless door handles, plus the Aperio wireless locks and wireless escutcheons, have been installed across multiple H-Farm locations in northern Italy. Most of H-Farm’s interior doors are secured with the award-winning Aperio H100 wireless handle, a former Intersec Access Control Product of the Year. The H100 wireless handle packs the flexibility and affordability of wireless access control into a slim door handle. Wireless access control hardware A standard battery slots inside and powers the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without compromising security. “Aperio wireless access control hardware is solid, nice looking and perfectly fits our environment, solving our access problem,” stated Alberto Aldrigo at H-Farm. H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. With the help of seamless integration from Aperio and Axis, the latest transformation upgrades their own access and security management.
Schlage, a provider of home security and access solutions, reveals its refreshed brand promise and renewed identity, to be leveraged in residential markets. Building on the brand's century-long legacy of innovation and relentless consumer focus, Schlage is affirming its promise to create purposeful experiences that deliver simplicity and peace of mind - one home at a time. The new branding builds upon the equity of Schlage's identity, emphasizing its proven principles of quality and design while modernizing its visual brand elements. Over its long history, Schlage has continuously insisted on a fearless approach to innovation, grounded in research and intentionality. Changing needs of consumer This brand evolution reinforces Schlage's pioneering mentality while also adapting to better represent the changing needs of consumer and partners worldwide. "After a century in the business, what we know is that trust is earned," said David Ilardi, general manager of Allegion Home, the residential division of Allegion, makers of Schlage Locks. "At a time when consumers are placing a greater emphasis on their homes and the sense of security they bring, we take pride in the trust consumers place in Schlage to help them protect what matters most and improve the spaces where they live. As we look forward, we will continue our relentless focus on innovation, quality, and craftsmanship to lead the Schlage brand through the next 100 years." Innovative home security Schlage was recently recognized in an independent study by Lifestory Research In addition to unveiling a new tagline, ‘Trust Your Home to Schlage,’ alongside a refreshed visual identity, Schlage's announcement reinforces the brand's long-standing commitment to transforming the industry, as evidenced through its products, partners, and software solutions. Trusted in over 40 million homes, Schlage was recently recognized in an independent study by Lifestory Research as America's Most Trusted® lock brand of 2021, for its extensive range of innovative home security and access solutions that were designed to improve consumers' lives through modern simplicity and intuitive experiences. Commercial door hardware Schlage's range of deadbolts, knobs, levers, and smart locks, such as the critically-acclaimed Schlage Encode™ Smart WiFi Deadbolt, Schlage Sense® Smart Deadbolt, Schlage Connect® Smart Deadbolt, and more, are a testament to the brand's upstanding reputation over the past 100 years as a pioneer in residential and commercial door hardware and home security. Schlage will continue to be guided by the core principles of trust and reliability to create purposeful experiences for every home. Virtual participants of the 2021 International Builders' Show (IBS) can also schedule an appointment to speak with a brand spokesperson while attending the virtual exhibit.
Security specialist, Mul-T-Lock has recently had its high security NE and NG padlock ranges tested by Sold Secure, with impressive results. Mul-T-Lock's wide range of mechanical and electromechanical padlocks is built strong to meet the needs of almost any requirement and application, with many utilizing patent-protected technology. NE and NG range of padlocks Leading the series are the NE and NG range of padlocks, which are capable of functioning with high reliability in all conditions, providing excellent resistance against physical attacks and maximum resistance against weather and other environmental conditions and impacts, such as corrosion. The NE and NG range of padlocks is not only CEN Rated from 3 up to 6, but also Sold Secure Bronze, Silver, and Gold certified by the Master Locksmith Association. Cost-effective, yet highly secure, these padlocks also meet EN 12320 standards. SS303 padlock test Sold Secure has introduced a new SS303 padlock test, ranking from Bronze to Diamond rather than just to Gold Now, Sold Secure has introduced a new SS303 padlock test, ranking from Bronze to Diamond rather than just to Gold. Both Mul-T-Lock’s NE14 OS and CS padlocks have recently been tested to the Diamond standard, meaning that they are now at the highest level possible in terms of security. In addition, Mul-T-Lock’s NE12 SB, NE14 OS, and NE14 CS padlocks all met the Gold standard in Sold Secure’s SS101 Motorcycle test, which allows the padlocks to be used alongside chains to create maximum security for motorcycles. Padlocks with eCLIQ technology Mul-T-Lock high security NE and NG padlocks are ideal for use in a wide range of applications, from shipping containers, perimeter fencing, and gates to commercial vehicles, security cabinets, and lockers. The NG10 padlock is also available, incorporating Mul-T-Lock’s advanced eCLIQ technology, providing users with access control and audit trail capabilities for even the most remote locations. With many body options and shackle variants, Mul-T-Lock padlocks are available on a wide range of key platforms, offering patented key security and can be keyed-alike or form part of a master key suite for optimal access control.
Alarm Lock Systems, a division of NAPCO Security Technologies, Inc., is pleased to introduce Peter Lowenstein as the new Alarm Lock Vice President of Sales. Peter comes to Alarm Lock with a proven track record of driving sales and growing revenue in all facets of locking, including distribution and other top manufacturers in security and access control. Access control system Peter will be responsible for energizing and driving sales in the Alarm Lock Division, overseeing the Alarm Lock sales team of Regional Sales Managers, and Independent Reps, reporting to Stephen Spinelli, SVP of Sales for all NAPCO divisions. Stephen Spinelli said, “We are excited to have Peter join us, and welcome him onboard. I look forward to working with him, and the Team, as we continue to expand and build upon the success of Alarm Lock’s strong brands, like market-leading Trilogy® and Networx® Standalone- and Wireless Access Locks, plus, debuting new lines, including new Air Access®, coming soon—the industry’s 1st cellular-based access control system, which uses both these lock lines to generate new RMR for locksmiths and security pros.” Based in Arizona, Peter’s accomplished career includes 20-years in sales management with 18-years in the security industry and a B.S. from Arizona State University.
The extraordinary global adoption of fingerprint based solutions, from mobile devices to credentials, will continue to expand and touch new markets in 2016. The trend to move away from passwords and PINs is really building momentum in logical and physical access. Widespread Use Of Biometric Security The security industry in 2015 continued to improve, along with the overall economy. Regulatory agencies are taking the lead as two-factor authentication is becoming a more mainstream concept. From banks to power plants to corporate facilities, the push for stronger security measures for critical infrastructures will become increasingly codified. Organizations that continue to utilize yesterday’s card technology are opening themselves to security breaches by simply doing what they have been doing the past 20 years. Holding a single-factor badge to a door or network log-in terminal is outdated, unsecure and exposes organizations to tremendous liability. Two-factor authentication using biometrics versus a Password or PIN is the new standard. At Zwipe, we experienced a banner year in 2015 as we continue to develop and bring to market a variety of leading edge biometric smart card-based solutions. We have made enormous strides in technical advancements, resulting in the establishment of major relationships setting new sales records. Demand continues to grow week by week for Zwipe’s platform to address customer’s security issues and goals. Companies who continue to use old card-based technologies open themselves up to data breaches, which we have seen in abundance in 2015 The fact that we integrate with existing physical security systems is causing our phones to ring constantly. Expanding our manufacturing capabilities to keep up with demand for Zwipe Access has been the primary challenge in 2015, and we are now in a solid position to support global growth expectations. Alternative Methods For Protection 2016 will see an acceleration in the broad adoption of fingerprint solutions for corporate security applications. The market is maturing and producing reliable, effective and secure solutions that specifically address the issues that caused concern in previous years such as dirty fingers or spoofing attempts. With the massive amount of data breaches taking place almost daily, companies will need to look at alternative methods to protect employees’ personal information, especially biometric data. Not even the Defense Department is immune to hacking, as was reported in September when 5.6 million fingerprint records were stolen. Zwipe’s platform directly addresses such liability issues by taking a different approach to biometric data protection and allowing the individual to take ownership of such vital information. See the full coverage of 2015/2016 Review and Forecast articles here
Biometrics is most useful as an additional level of authentication — determining that you are who you say you are Over the years, the growth of biometric security technology has faced challenges of cost and pushback from users. Prices have been higher than more traditional technologies. In addition, users did not advocate storage of their personal biometric data by employers or the government. “I believe this is changing,” says Rueben Orr, CPP, vice president and co-owner of Denver-based Security Install Solutions and vice chairman of the ASIS International Physical Security Council. “People are using fingerprint technology to log into their computers and phone. They understand that this is a good way to protect the personal information stored in those devices.” “We’re also seeing new technologies. Some that we’ve seen include wearable technologies with some form of biometrics to identify who you are and using a phone to access a controlled door,” continues Orr. Traditional Biometric Technology Traditional biometric choices include fingerprint, hand print, iris recognition, retina recognition and voice recognition. The most frequently used biometric technology remains the fingerprint, observes Orr. Fingerprint readers are more affordable today, as are the software applications used to manage fingerprint systems. Retina recognition, which requires shining a light to the back of the eye, is still considered too invasive. Iris recognition, which looks at the pattern of the iris, is gaining popularity. “New biometric technologies are gaining traction, too,” says Orr. “Today, we are measuring heart rates, which are unique to individuals.” Security Levels Of Authentication Biometrics is most useful as an additional level of authentication — determining that you are who you say you are. “We authenticate a person’s identity on three levels,” Orr says. “The first level is based on what you have — an access control card. Next there is what you know — a personal identification number or PIN. The third level is who you are, which is where biometrics come into play.” “Three factor authentication including biometrics is used to control access to high security doors like a server room or data center.” Orr also cautions that two- and three-factor authentication can cause logjams if used improperly. “One government building in Washington, D.C., is the headquarters for a federal agency with 10,000 employees,” he says. “Most work at remote workplaces, but about 5,000 employees come into the building through turnstiles every day.” Biometrics is most useful as an additional level of authentication — determining that you are who you say you are “If it takes three seconds to authenticate each of those employees, it will take a long time to get people into the building every morning.” “Such busy buildings are creating exclusionary zones within the building where extra levels of authentication are used. Exclusionary zones include data centers, computer rooms, laboratories and other rooms that house sensitive materials and data. All federal agencies have these kinds of requirements today.” Credit Card Biometric Systems Another developing area for biometric security technology is commerce, continues Orr. In light of the widespread news about identity theft and the online theft of customer information from retailers, Orr believes that credit card companies will eventually require biometric authentication to use a credit card. According to the Identity Theft Resource Center (ITRC), U.S. data breaches reached a record high of 783 in 2014, a 27.5 percent increase over 2013. To stem the tide of fraud, credit card companies are already developing biometric solutions. MasterCard and Zwipe, a technology developer based in Norway, are working on two credit card biometric systems, one for fingerprints and another for heartbeats. Affordability And Convenience “I think that the financial industry will develop a biometric-based combination of digital certificates and wearable devices that will help to manage commerce securely,” says Orr. “As those solutions come to market, they will make it affordable to adapt them for use in physical security in ways that eliminate inconveniences.” “For instance, you might be wearing a bracelet that communicates with a reader and authenticates you as you reach for a door knob — eliminating the need to get a card out of your wallet, present it to a reader and then return it to your wallet.”
The Physical Security Interoperability Alliance (PSIA) was founded in 2008 with a goal of creating ‘plug-and-play interoperability’ among physical security devices, systems and services. Since then, the organization’s mission has both expanded to include logical security and focused more narrowly on identity, a critical aspect of security today. In recent years, PSIA has concentrated on its PLAI (Physical Logical Access Interoperability) specification, which provides a means to enable disparate physical access control systems (PACS) to communicate to each other and share employee identity data. This is especially important for companies who have made acquisitions and inherited different incompatible PACS systems. “PLAI can unify a security environment through one trusted source, even if there are multiple PACS systems,” says David Bunzel, Executive Director of the Physical Security Interoperability Alliance (PSIA). Bridge between disparate PACS The PLAI specification provides a bridge between disparate PACS, allowing a single trusted source for identity management. Leading PACS vendors including JCI (Software House), Lenel, and Kastle Systems and biometric vendors including Eyelock, Idemia, and Princeton Identity, have each implemented PLAI adapters, supporting this specification. AMAG will have their adapter in the coming months, and Honeywell and Siemens have it on their road maps. At ISC West last April, PSIA was able to demonstrate five of these vendors sharing records and the ability to add and terminate an employee and have it updated across each PACS and biometric system. PSIA was able to demonstrate five of these vendors sharing records at ISC West last April The Physical Security Interoperability Alliance (PSIA) has evolved from supporting physical security to also integrating logical security. Access to facilities and secure areas of buildings is increasingly dependent on software and hardware systems which can validate a person’s identity. “The PSIA has chosen to focus on interoperability between identity management systems and access control devices,” says Bunzel. “We have successfully demonstrated the technology, and it is now being specified by consultants, integrators and enterprise customers in actual security systems. We expect to see some large companies announcing PLAI implementations in the next quarter.” Open standards processes PSIA relies on an open standards process, with collaboration among leaders in the various parts of the security industry. Specifications are architected, discussed, drafted, and reviewed by members of the organization in technical committees. The process is dynamic, with periodic updates added, which will improve and enhance the specifications as appropriate. The PSIA has focused on identity management for enterprise customers, says Bunzel. “We have active members who make devices that support access hardware (for example, locks and biometric systems) who by design complement PACS vendors and HR management systems.” PLAI also enables a variety of services for enterprise customers that may rely on a security credential" “We continue to add more PACS and biometrics vendors to the PLAI ecosystem, expanding the value of the specification in the market,” says Bunzel. “PLAI also enables a variety of services for enterprise customers that may rely on a security credential, including printing services, parking, and facility management. In the near future, the PSIA expects to extend PLAI into elevators. There are other identity management capabilities, and the PSIA will evaluate opportunities as the market demands them,” says Bunzel. In addition to PLAI, PSIA has several ‘legacy’ specs, but they are not actively working on further iterations. PSIA could always consider new development on legacy specs if the market demanded it. Some legacy specs address video, and security cameras often work with access control systems. However, PSIA currently is leaving video to ONVIF. The near-term direction and plan for the PSIA is to focus on PLAI and its commercialization.
Suprema, a global company in biometrics and access control solutions, announced that it supplied BioSign 4.0, its under-display fingerprint recognition algorithm to the Samsung Galaxy S21 smartphones with support from Qualcomm Technologies, Inc. BioSign, Suprema’s smartphone fingerprint recognition technology, has gained global recognition since its installation on Samsung Galaxy J5 models in 2017. Since then, Suprema has been supplying BioSign solutions to other Samsung smartphone models including Samsung Galaxy S10, Galaxy Note10, Galaxy 20, and Galaxy Note 20 series. Fingerprint recognition speed BioSign 4.0, installed in the Galaxy S21, has been receiving great reviews for its fingerprint recognition speed. BioSign 4.0 delivered enhanced speed and accuracy compared to its predecessor, BioSign 3.0, significantly upgrading user convenience with 50 percent faster and more than twice as accurate recognition performance. BioSign 4.0 employs deep-learning mechanisms to optimize fingerprint analysis to efficiently recognize rich fingerprint information obtained from the larger sensing area of the second-generation Qualcomm® 3D Sonic Sensor Gen 2 installed in the Galaxy S21 series. Qualcomm 3D Sonic Sensor Gen 2 Qualcomm Technologies unveiled the high-performance ultrasonic sensor, the Qualcomm 3D Sonic Sensor Gen 2 that was supplied to Samsung Galaxy S21 series, in January at CES 2021. With a 77%-larger fingerprint sensing area than the previous generation, the Qualcomm 3D Sonic Sensor Gen 2, was able to significantly improve fingerprint recognition performance. The ultrasonic sensor has ultra-thin form factors and is optically isolated from the display panel allowing for sleek smartphone designs. Performance and user convenience “Suprema's fingerprint recognition technology has been continuously selected for the Samsung Galaxy S series, proving to the world the technological superiority of our solution,” said Brian Song, the president of Suprema Inc. “With the excellent reviews BioSign 4.0 has been receiving for its overpowering performance and user convenience, we expect to be able to grow sales and market share. Suprema will continue to advance our fingerprint and face recognition technologies using AI and deep learning, leading the biometrics market into the future,” Song remarked.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernize two buildings, university managers sought a retrofit-ready access control solution to upgrade security. University administrators selected Aperio® locks to secure doors in the new buildings. With Aperio, facilities staff deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily workload with mechanical locking — vanishes. The Luminy campus is now equipped with 372 Aperio Electronic Cylinders & 42 Aperio Electronic Handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly, and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas — especially those with computers. Individual access smart-cards “Since we installed Aperio, we have not had a break-in,” says Cédric Lopez, Maintenance Manager at Luminy. An easy extension for room management and scheduling. In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Access permissions and campus traffic Aperio devices are integrated online for a live overview of the campus that helps respond proactively to incidents Luminy’s security team has complete control over access permissions and campus traffic — in real-time. Because their new Aperio devices are integrated online, staff see a “live” overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. Integration with the scheduling system Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cédric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real-time. Aperio beyond safety & security Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how one can upgrade and streamline security at ones campus.
Busy offices need convenient interior security for any private spaces. Not everyone should be reading the important memo on the CEO’s desk. But nobody wants to be left looking after the keys. At one co-working space in Barcelona, Code Handle® Door locks solve the problem. Augusta 29 supplies flexible office rentals to small companies and those without a permanent HQ, as well as services including mail handling, virtual assistants, and meeting room bookings. Part of their remit is to control access everywhere in a secure and efficient way, separating private from “public” areas around the workspace. Managers sought a keyless system; a secure, wire-free digital alternative to keys and access smartcards that would help them stand out in Spain’s booming co-working sector. Any solution for private offices and meeting rooms should enable them to achieve this as simply as possible without having to hand out and track many mechanical keys, as they had done in the past. No more lost keys Code Handle® Door locks enable Augusta 29 to offer their tenants simple, keyless locking. Clients gain convenient access to their rented offices via individual 4- to 6-digit PINs. With Code Handle’s optional auto-locking feature enabled, their offices are securely locked as soon as the door closes. There is no need for Augusta 29 staff— or anyone else— to manage physical keys, or for any wires or access control system. Administrators issue up to 9 different user PINs per lock, which they can cancel or change anytime. Keys are no longer lost or unreturned. Everything is digital. Easy to configure and program The main advantage for us is that users can go to the office with no keys, as it provides enough security" The project ran in two phases. After a successful 2015 installation of 13 Code Handle locks, managers rolled out a further 27 in 2020. Meeting rooms are fitted with Code Handle locks, making them more private. “The main advantage for us is that users can go to the office with no keys, as it provides enough security for our needs,” says Augusta 29’s CEO, Miguel Ángel Villota Mocho. Installation was straightforward. Retrofitting a Code Handle to almost any interior door requires two screws: the existing cylinder remains, with just a change of handle. “Code Handle locks are easy to configure and program,” he adds. Unlike push-button locks, Code Handle looks good, too: brushed steel and chrome styling offers a product design that “fits perfectly with the types of doors we have and the overall design of the business center,” says Villota Mocho. With Code Handle Door, Augusta 29 retains the premium feel to its office interior.
ISONAS Inc., an IP access control and hardware solution provider and part of the Allegion family of brands announced that the ISONAS™ Pure IP™ access control solution has been deployed at Our Lady of Perpetual Help Parish in Grove City, Ohio. The parish is comprised of seven buildings, which include the church, preschool, elementary school, rectory, storage garage, athletic building, and modular classrooms. The parish grew from around a dozen visitors daily to more than 80 people visiting the church every weekday morning and more than 500 people visiting over three separate services each weekend recently. Controlling Access The elementary school has grown to host more than 300 students and 50 staff members and volunteers, with the preschool adding another 40 students and staff members to the campus tally. With 28 exterior doors encompassing the fully renovated church, school, and preschool, the parish needed a substantial security upgrade. The new system needed to not just limit access, but also control it. A main challenge at the parish was being able to control access at all seven buildings and provide an environment with improved personal security for their staff, students, and patrons. The security system the parish had in place consisted of a few standalone keypads and electric locks on a couple of doors with no centralized management or communication. Upgrading Security With an influx of people accessing the parish and its facilities, both the facilities director and the maintenance/technology specialist at the parish were ready to find the right access control solution. The new system needed to not just limit access, but also control it. After careful consideration and research, the parish selected the ISONAS™ Pure IP access control solution for their security upgrade. ISONAS introduced the parish to its local certified independent security integrators, Systems 28. “Working with ISONAS on this project was a tremendous experience from start to finish, and we were thrilled to be brought on board to handle this security upgrade,” said Scott Hoover, sales estimator at Systems 28. “As a certified independent ISONAS systems integrator, we were proud to install this unique solution at our local parish and help make our community safer.” ISONAS RC-04 reader controller The parish also liked the fact that an on-site server was not required with the ISONAS solution The project consisted of installing 24 ISONAS RC-04 reader controllers, with 21 deployed on exterior doors and three on interior doors in a month’s timeframe. The parish chose the ISONAS solution for a myriad of reasons, with one main factor being the ability to use power over the ethernet for the card readers and electric locks. The parish also liked the fact that an on-site server was not required with the ISONAS solution, as having a cloud-based server was critical to managing access remotely for multiple buildings. ISONAS Pure Access software “We are extremely happy that the parish selected ISONAS as the right solution for their security upgrade and look forward to providing capabilities to easily expand the system in the future,” said Jonathan Mooney, ISONAS sales leader. The ISONAS system is extremely user-friendly and much more convenient Along with the ISONAS hardware, the ISONAS Pure Access software was deployed for its remote access capabilities. Pure Access™, ISONAS’s software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. Remote access functionality “The ISONAS system is extremely user-friendly and much more convenient than the previous ‘stand-alone’ system we had in place prior to this upgrade,” said Kevin Radwanski, facilities director at Our Lady of Perpetual Help Parish. “We especially like the remote access functionality, as it has been great for us to be able to lock and unlock doors remotely during regular times and emergency situations like the global pandemic.”
Size can be a major factor for any security project. The bigger the scale, the greater the challenge. With hundreds of doors and a 3km perimeter, the Flanders Expo is larger than most buildings. They sought a modern replacement for mechanical locking — which was ‘time-consuming and not practical for users,’ according to Bart Serraes, Operations Supervisor for the Easyfairs Group. Choosing electronic security made sense: it saves security staff wasting time traveling physically around a big site. Wireless door devices were also important because laying a projected 10km of cabling would be expensive and impractical. Electronic locking technology Locking technology would need to serve both interior and exterior doors; Flanders Expo has many of both. Insurance requirements demanded electronic locking technology which could also activate deadbolts. Key-operated CLIQ® electromechanical locking ticked all the boxes: “CLIQ intelligent key technology provides the familiar security of traditional locking alongside the powerful features of electronic access control,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. CLIQ has a unique combination of high-end mechanical and electronic protection. A range of key-operated electromechanical cylinders and padlocks maximize physical attack resistance. CLIQ technology layers encrypted, user-friendly electronic security on top — adding control and convenience without adding wires: all CLIQ devices are wireless. Power to operate lock microelectronics comes from a standard battery inside every CLIQ key, with a lifetime of up to 10 years. More flexible system The electronics inside every lock are activated when a battery-powered CLIQ key is inserted And because it is key-based, CLIQ offers a simple step up from mechanical security. “As a company, we needed a more flexible system. That's how we chose CLIQ,” adds Bart Serraes. Programmable CLIQ electromechanical locks now secure over 200 interior doors at the exhibition hall, as well as 100-plus openings around the building’s perimeter. Because CLIQ’s programmable keys can operate the deadbolt — not just the latch-bolt — door security meets standards set by Easyfairs’ insurers. The electronics inside every lock are activated when a battery-powered CLIQ key is inserted, meaning no door wiring was needed. With their mechanical system, “The chance of losing keys was high, the process to get new keys not user-friendly,” says Bart Serraes. Web manager software Now they can program keys to allow access for different types of user, using the intuitive CLIQ Web Manager software. They flexibly grant or deny access to both internal users and external partners and suppliers — and revoke rights in any lost key without needing to change the locks. CLIQ is a “Flexible system for determining access rights,” says Bart Serraes. Flanders Expo became the first Easyfairs site to install CLIQ access control. A second venue has already followed. Partnering with a pioneer, with a long history of innovation and service provision, gives Easyfairs a system that is reliably supported and can evolve over time. Perimeter and interior security now have the flexibility they need: CLIQ locks can be installed and integrated into their access control system anytime.
Sovereign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-the-art biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a globally recognized company in any high security facility services, anywhere in the world. Enhanced security No high street bank or any safe deposit center can match Sovereign’s credentials and the extraordinary security levels that they have achieved. People across the country have been targeted for their valuables, not only on the streets, but also in their homes. Challenges were to offer a complete peace of mind by delivering the highest-level of security and access permission through various levels of security check (e.g. Card and Biometric Palm Vein Reader). Matrix Access Control solution Matrix Access Control solution is designed to address security concerns in a professional and systematic method Matrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH Series, and ARC DC100P. Matrix Access Control solution helps in enhancing security, along with barriers and door controllers. Matrix Access Control solution is designed to address security concerns in a professional and systematic method, without compromising on hospitality and productivity. It allows enrolling visitor’s Fingerprint/Palm Vein Reader/RFID Card, in order to provide the visitor with access to restricted areas, as per the below criteria: 2-Person rule: This is enforced by requiring the presence of at least two authorized persons Route based access: This allows user to access the authorized route only Anti-pass back: This restricts to enter a secured area second time without first leaving it Result: Peace of mind Seamless experience Increase productivity of staff Quick actions on exceptions Multi-layer authentication Boost customer satisfaction Matrix products offered include: COSEC VEGA CAX integrated with turnstile COSEC PVR DOOR CONTROLLER COSEC PANEL LITE COSEC PATH Series COSEC ARC DC100P
Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?