Intersec 2020 in Dubai (United Arab Emirates) from 19th to 21st January 2020 is an internationally renowned trade fair for security, safety and fire protection, where participants will be presenting their latest technology innovations. Intersec Dubai 2020 With 1,200 exhibitors and more than 31,000 visitors from 135 countries, Intersec 2020 will consist of three days of expansive B2B interactions and discussions on new technological developments and expertise in the global security industr...
Videx, globally renowned manufacturer and supplier of access control and door entry systems, has strengthened its presence in the international access market by launching a new web server access control system, WS4. WS4 web server access control The WS4 web server access control system can manage up to 20 entrances locally or remotely from anywhere via a mobile phone, tablet or PC using a web browser to connect to the system. Additionally an app is available for both iOS and Android. Th...
Iris ID, a provider of iris recognition technology, announced the integration of its handheld iCAM M300 multimode platform for biometric enrollment and verification with the FBI-certified Sherlock fingerprint scanner from Spartanburg, S.C.-based Integrated Biometrics (“IB”). The fingerprint reader snaps on to the iCAM M300 to create one lightweight portable unit for field use. Sherlock is certified by the FBI as a FAP 45 fingerprint scanner having met the bureau’s stringent im...
Genetec Inc., a technology provider of unified solutions for enhanced security, operations and intelligence, announces its first ever attendance at BETT, the global meeting place for education buyers that attracts over 34,000 attendees. It will be exhibiting at the London ExCel on Stand NM65 from 22-25 January 2020. At the show Genetec will be exhibiting its technologies on an interactive stand that ensures visitors can get a true feel for the solutions and their capabilities. Representatives f...
The newly updated Openow app now includes Update on Card functionalities, offering additional and powerful features to security managers. Openow mobile app Openow is the convenient mobile solution for ASSA ABLOY’s SMARTair wireless locking systems. Users store their validated digital keys securely in the Openow app. To open a SMARTair lock, they simply tap their phone against its inbuilt RFID reader. An encrypted Bluetooth connection connects the phone and locking device to quickly valid...
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are th...
Access Control is always a very critical aspect of an organization's overall security strategy. Regardless of its size, it is inevitable for any organization to have a flexible and comprehensive access control solution. To connect separate areas in the single location requires a standalone access control. For small and medium organization, Matrix has designed a standalone Access Control solution for small organizations, while keeping security and simplicity in mind. This innovative solution works on industry standard IP protocol allowing organizations to expand easily even with a single door. This eliminates the need of installing any application software. Centralized Monitoring and control Key Features: Automatic Fingerprint/Palm Distribution Access Control on: User, Zone and Time First-in User Rule 2-Person Rule Man-Trap Guard Tour Occupancy Control Blocked Users Route based Access Door Auto Relock Dead-Man Zone Anti-Pass Back Do Not Disturb (DND) Zone Smart Card based Identification Who's In Time Stamping Integration with Other Hardware Notifications on Exception Centralized Monitoring and Control Informative Reports
Suprema ID., global provider of biometrics and ID solutions, has announced that the company would showcase a wide range of global partner's solutions integrating its World's slimmest FAP20/FAP30 fingerprint authentication scanners at TRUSTECH 2019 in Cannes, France on 26-28 November 2019. Live Finger Detection (LFD) The partner's solutions include Sleek Android Tablet/POS, Rugged Windows 10 Capturing Terminal, and Programmable Fingerprint Keyboard. All products have adopted Suprema ID's latest technologies such as World's slimmest form factor, Multi Dynamic Range (MDR) technology, and IP65-rated dust and water-resistant structure ensuring robust operation all over the time in harsh environments. Suprema ID's patented Live Finger Detection (LFD) technology applies a machine learning method based AI In addition, Suprema ID's patented Live Finger Detection (LFD) technology applying a machine learning method based AI(Artificial Intelligence) has been fully implemented in all partner's solutions to ensure the utmost security in a real field operation. fingerprint authentication scanners "It is our great pleasure to display our partner's solutions for mutual benefit that will enable our potential customers to experience the state-of-art biometrics performance that is uncompromising in security and convenience as market demand is getting intricate," said Bogun Park, CEO at Suprema ID. "The Suprema ID has completed the full lineup of Fingerprint Authentication with BioMini Slim 2/BioMini Slim 3 that are fully compliant with the industry's requirements, planning to add more versatile solutions for further customer satisfaction," Park added. TRUSTECH 2019 At the TRUSTECH 2019 show, Suprema ID will present a full demonstration of its BioMini Slim 3 ultra-slim FAP30 authentication scanners as well as RealScan-G10 FBI-certified fingerprint enrollment scanners.
Suprema ID., globally renowned provider of biometrics and identity solutions, has announced that its best-selling RealScan Series, including RealScan-G10 and RealScan-D are now compatible with secunet biomiddle. secunet biomiddle platform The secunet biomiddle is an intermediate platform for biometric systems and eIDs The secunet biomiddle is an intermediate platform for biometric systems and eIDs, enabling the modular use of biometric system components and card readers in various biometric or eID applications. Both functions are provided via one interface. Biometric hardware- and software-components are embedded and used by the secunet biomiddle via an integrated BioAPI 2.1 framework, according to ISO/IEC 19784-1. The secunet biomiddle communicates with client applications via a SOAP interface, which makes the middleware independent of system platforms and programming languages. Therefore, the secunet biomiddle is easily and quickly integrated into existing infrastructures and already the linchpin in many regulatory and border control projects. Fingerprint Live Scanners “It is our great pleasure having achieved integration of our proven Fingerprint Live Scanners into the secunet biomiddle, a reliable platform for many opportunities that are currently ongoing. With its award-winning live fingerprint detection based on deep-learning and versatile performances offering Multi-OS (operating system) for various environments, it is expected that we could join various global projects simultaneously such as the Biometrics based EU Entry-Exit System (EES) for Stronger and Smarter Borders for the European Union using secunet biomiddle that is recognized internationally as the reference implementation and preferred architecture for the use of biometrics in connection with official ID documents,” said Bogun Park, CEO at Suprema ID. Suprema ID is a globally renowned provider of biometrics and ID solutions. By combining the world’s renowned biometric algorithm with superior engineering, Suprema ID continually designs and develops high-tech identity products and solutions. Suprema ID’s extensive range of portfolio includes fingerprint enrollment scanners, fingerprint authentication scanners, fingerprint embedded modules and ePassport readers.
At the ISC East 2019 event at Jacob Javits Center in New York City, Morse Watchmans (ISC East booth #847) is showcasing its KeyWatcher Touch key management solutions that protect important keys and physical assets, resulting in reduced downtime, fewer losses, and improved accountability. Also featured is their latest addition, KeyWatcher Fleet which is proven to optimize fleet utilization and longevity through key control. “Morse Watchmans has multiple decades of experience in delivering proven key management systems with extensive audit capabilities,” said Joe Granitto, COO, Morse Watchmans. “KeyWatcher Touch and KeyWatcher Fleet make it easier than ever to protect valuable investments and to streamline key management.” KeyWatcher Touch key management system Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. KeyWatcher Touch also offers the convenience of scheduled PDF reports that are emailed to authorized recipients. Email delivery of customized or standard reports can be scheduled for any frequency or specific time, or they can be accessed using the Morse Watchmans smartphone app. KeyWatcher Fleet management solution System administrators have access to view or run reports as needed. The system also enables security management to notify a user via email when a key becomes overdue. Built on proven KeyWatcher Touch hardware, KeyWatcher Fleet is the only key control system with software designed specifically for fleet management. A dashboard displays vehicle use, bookings, status, and more. Administrators can generate quick and customizable reports to gain actionable insight on fleet utilization and operations. Morse Watchmans Smarts Morse Watchmans Smarts lets administrators create policies to enable automatic vehicle allocation. Vehicles can be assigned by lowest mileage, most fuel, priority and more. Drivers can be notified automatically via email or text if a specific vehicle is not available, and unique pin codes or optional card or fingerprint readers provide strong key/vehicle management.
Honeywell is expanding its OmniAssure access control reader product line with the launch of the OmniAssure Touch access control solution. OmniAssure Touch provides advanced security against credential cloning and reader tampering, increases operator productivity when deploying cellphone credentials, and is interoperable with a range of credential technologies and panel communication protocols. The passive intent access control readers help people get into an area faster – just with the touch of a finger – no swiping of a card or a phone is necessary. “Our customers want the latest in security and protection against growing credential and identity attacks,” said Frédéric Haegeman, business leader for Honeywell Commercial Security, Europe and Novar GmbH. Access control solution “With OmniAssure Touch, users benefit from advanced security and an adaptable platform that strengthens access control in their building. Our goal is to develop a comprehensive access control solution suite so that every user can identify a solution that works best for their business.” OmniAssure Touch provides: Ultra-secure protection: protects against credential cloning and replay attacks with technology that is fully compliant with OSDP Secure Channel Protocol (SCP) and the latest DESFire EV2 encryption standards; readers wipe encryption and certificate data when device tampering has been detected with all form factors available with a capacitive touch keypad for two-factor authentication Exceptional adaptability: features hassle-free, user-friendly cellphone credential capabilities that eliminate the need to present a phone to the reader; easy migration from legacy prox to smart and cellphone technologies; as well as configure reader settings in the field via cellphone app Integrated security suites A comprehensive solution: saves time by deploying cellphone credentials directly through Honeywell’s WIN-PAK, WINMAG and Pro-Watch integrated security suites, revokes cellphone credentials in real-time, and transforms the way people interact with your building using the Honeywell Vector Occupant App Easy to configure: leverages the Honeywell Utility app which allows installers to configure the readers in the field or wherever they use the app making installation and configuration easier and faster Reliable read/write cards OmniAssure Touch is ideally suited for enterprise and critical infrastructure environments across a wide variety of industries including defense, education, pharma, utilities and financial. The Honeywell suite of OmniAssure readers incorporate smart card technology to manage access control, logical (PC) access, storage of biometric templates, parking, ePurse and many other applications requiring reliable read/write cards.
Today’s market wants access management systems that are easy to set up and use. They must be easily scalable and able to integrate with other security solutions like video and intrusion systems. And access management systems need to be highly resilient and always available. With the introduction of the Access Management System 2.0, Bosch has addressed all these needs. Access Management System 2.0 The entire customer journey is designed to be as effortless and as simple as possible. Specifying the system is easy: the software is offered in three pre-configured software bundles for different sized organizations: Lite (max. 144 doors and 200,000 cards) Plus (max. 512 doors and 200,000 cards) Professional (max. 10,000 doors and 200,000 cards) Easy configuration The graphical user interface (GUI) is simple and easy to understand Configuration is easy - Existing floor maps can be imported into the system and icons are dragged and dropped on the map to represent controllers, doors and building objects. Onboarding of users is straightforward: for example, enrolment and assignment of access profiles are all implemented in one dialog manager. Operation is also easy - The graphical user interface (GUI) is simple and easy to understand. The dark color-scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. In addition, the colors of the Access Management System 2.0 GUI are aligned with the colors of the Bosch Video Management Systems (BVMS) GUI, so operators enjoy the benefits of an integrated solution, which is easier to operate than two distinct systems. Future-proof and highly scalable system Users can start small and add extra capacity whenever necessary. The Access Management System 2.0 can be expanded to 10,000 doors and 200,000 cardholders. No hardware needs replacing when expanding; users just require software upgrades and possibly additional controllers, readers and cards. Henceforth, increasing system size is not only easy but also pretty cost-efficient. And since it is regularly updated with the latest data security enhancements, it is a future-proof investment that is ideal for office and government buildings, retail environments, educational institutes and more. Master Access Controller (MAC) For maximized resilience and high availability, the Access Management System 2.0 includes the Master Access Controller (MAC) as an additional layer of resilience between the server and the access controllers. If the server fails in the Access Management System 2.0, the MAC takes over and ensures that the controllers still communicate with each other and share necessary information from the card readers. Thus, even functionalities, which include various controllers such as anti-passback and guard tour, can still be performed. Anti-passback functionality The anti-passback functionality prevents a card holder passing back their card to another person The anti-passback functionality prevents a card holder passing back their card to another person and thereby enabling their unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route. Access management systems are required to be seamless with high-tech functionality. They can seamlessly integrate with other video and intrusion systems. And these access management systems need to be highly resilient and online at all times. The Access Management System 2.0 is Bosch Building Technologies’ answer to all these requirements. High level of safety with threat level management Up to 15 configurable threat levels such as lockdown, controlled lockdown or evacuation mean that safety measures can be initiated quickly in critical situations such as fire or terrorist attack. The threat level state is activated by one of three triggers: operator workstation, emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, all doors blocked, or a mix of some open and some blocked. Individual doors can also have their own security profile and allow only certain cardholders access. High data security and privacy protection To protect against cybercrime and loss of personal data, the database as well as the communication between server and access controllers is encrypted at all stages, e.g. through support of the secure Open Supervised Device Protocol (OSDP) v2 protocol. Access Management System 2.0 also has trusted digital certificates for mutual authentication between server and client to prevent tampering by unauthorized clients and uses secure design principles such as “secure-by-default” and “principle of least privilege”. Seamless integration with third-party video systems Access Management System 2.0 is a flexible access management system for medium- to large-sized organizations The Access Management System 2.0 is a flexible access management system for medium- to large-sized organizations. It is easy to set up, operate and expand. Access Management System 2.0 can grow with the needs of the customer and can be integrated with video systems such as the BVMS (version 9.0 and higher) and third party systems such as Milestone’s XProtect. It will as of the second quarter 2020 be able to integrate with the B-/G- Series intrusion system from Bosch and other third party systems. With this integration capability, the Access Management System will serve as the solid platform to mix and match various security systems, depending on the customer’s individual needs. Enhancing safety of security guards Overall, the Bosch Access Management System 2.0 makes access management simple, scalable and always available. Any deviation of sequence or timing causes an alarm in the Access Management System 2.0. Colleagues or first responders can be notified at once improving the safety of security guards. In the extremely rare event that the Access Management System 2.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the Access Management Controllers. Thanks to this offline capability, it is furthermore possible to save millions of events even during down times.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
The European Union has spelled out specific requirements and safeguards for handling and protecting personal data. In the General Data Protection Regulation (GDPR), the EU makes clear exactly what is expected of those who control and process data. (The United Kingdom has committed to follow the regulation despite the Brexit vote.) Everyone is facing a deadline on May 25 2018 to comply with the GDPR. What are the exact implications for the physical security market? What do customers need to do to ensure they are compliant? These are urgent questions, given that the clock is already ticking. The GDPR’s implications are especially timely considering the physical security industry’s current emphasis on the value and importance of data. The growing value of data was a big topic at the recent IFSEC show in London. The industry is looking for new ways to leverage data for benefits in a company beyond the security department. New Cybersecurity Responsibilities One example is access control data: Who is granted access to which door and more generally, how do employees move throughout an enterprise? This is information that can be useful to managers, whether to analyze facility usage trends or promote more efficient operations. Access control data is especially valuable when combined with other data in an organization, such as human resource (HR) and accounting records. It provides more data points that a company can use in overall metrics to guide business operations. But as the GDPR emphasizes, the value of data and the ability to leverage data come with new responsibilities, specifically a need to protect privacy. This includes a need for additional cybersecurity of networked systems, another current “hot topic” in the market and historically a weak, or at least under-addressed, point for the industry. The GDPR applies to “personal data,” but its detailed definition includes digital information such as IP addresses and a range of personal identifiers. Sensitive personal data, such as biometric data used to uniquely identify an individual, is in a “special category.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage. GDPR Impact On Physical Security Other areas that might impact the physical security industry include requirements to provide information about any transfers of data to other countries outside the EU and the retention period of data and criteria used to determine the retention period. There is also a “right to erasure” that provides an individual a right to have personal data erased if it is “no longer necessary in relation to the purpose for which it was originally collected/processed.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage In the accountability section of the regulation, companies are required to implement “appropriate technical and organizational measures” to ensure and demonstrate compliance. In the category of “data protection by design”, there is a general obligation to “implement technical and organizational measures to show that [a company] has considered and integrated data protection into processing activities.” It is even more reinforcement to the need for more cybersecurity. Data Protection By Design The GDPR endorses the use of approved codes of conduct and certification mechanisms to demonstrate compliance, including codes created by trade associations or representative bodies. There may be an opportunity for organizations in the physical security market to step in and create such guidelines and to clarify best practices as they relate to our market’s technologies. In the category of “data protection by design,” physical security system manufacturers should include data protection and security from the first floor as they are designing new products. Based on several recent conversations, I can say with confidence that these concerns are definitely on the minds of many in our industry. But concerns aren’t necessarily answers, and time is short to fully comply with GDPR by the deadline. And the issue isn’t limited to Europe; multi-national companies that do business in Europe, or even cloud systems that store data there, are also impacted. And even beyond GDPR, data protection is an urgent concern around the world. It’s time to step up.
STANLEY Security, one of the UK’s pioneer security providers, installs a biometric access control system at beverage company Finlays’ Pontefract site to protect its server rooms. A company with over 265 years heritage, Finlays owns and operates tea estates, extraction facilities for tea, coffee and plant extracts, packing facilities and R&D laboratories across four continents. Finlays already had a PAC access control system in place for exterior doors, and number code locks were fitted to the doors of their server rooms but, reviewing security, Finlays wanted to improve the level of security for the latter. Deciding a biometric system The key requirement was to ensure access to the server rooms be controlled by Finlays IT department only" The key requirement was to ensure access to the server rooms be controlled by Finlays IT department only. IT staff work standard office hours so should access be required to the server rooms outside of this, the code for the locks would have to be shared with others or a member of the IT team would have to return to site. Finlays had ruled out a card/tag based access control system due to the inherent issues with lost, stolen or borrowed cards, and had decided a biometric system would be the right solution for them. A number of security companies were approached, including STANLEY Security, which were awarded the contract. “It’s a name we knew and we have a lot of STANLEY product on site,” states Stephen Firth, Finlay’s Group Senior IT Support Engineer. Biometric fingerprint readers “We also have a PAC system which shares the same software that the STANLEY biometric system runs on, so it meant we could easily add to the existing system and view both using the same software, although they are run as stand alone systems for added security.” STANLEY Security installed ievo® biometric fingerprint readers to four server room doors at Finlays STANLEY Security installed ievo® biometric fingerprint readers to four server room doors at Finlays. The system features advanced image reading sensors that take a detailed scan of a finger from the surface and subsurface levels of the skin, to capture a highly accurate digital image whilst protecting against fake and spoof fingerprints. Specific data from the image is converted into a digital template used for fingerprint identification. Biometric access control system Providing a user presents a finger that matches a stored user template, then access will be granted. ievo captures clear, clean images, even when surface features are absent or hard to distinguish due to age, dirt, finger pressure and skin or environmental conditions. Finlays are pleased with the new biometric access control system as it provides the company with the security required but also convenience, as Stephen comments: “Now, IT has full control of who enters the server rooms and there is an audit trail. We don’t have to worry about who has keys to the IT office and who knows the code for the server rooms door locks. What’s more, IT can open any door on the system remotely should it be required, rather than having to return to site. With one of the racks on our server belonging to someone else, that’s an important consideration should they need to gain access out of office hours.”
HID Global, globally renowned provider of trusted identity solutions, has announced that the government of Argentina has selected its HID goID citizen identity technology to power the country’s digital version of its mandatory National Identity Document for its Mi Argentina app. The collaborative effort between HID, Argentina’s Ministry of Interior, Public Works and Housing through the National Registry of Persons (Renaper), and the Ministry of Modernization makes Argentina the first country in the world to offer a true national identity credential within a mobile app to its citizens. Currently, there are 47 million DNI cards in circulation and recent legislation has accorded full legal equivalence to the smartphone version of the card. Mi Argentina app The Mi Argentina app, which houses the National Identity Document, was developed by the Ministry of Modernization and allows citizens who download the app on their mobile devices to request appointments, receive health information and access credentials, such as their drivers’ license. Powered by HID goID technology, citizens can also access their National Identity Document on a mobile device on the app while offline. The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens" “The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens,” said José D’Amico, director of Renaper, adding “This innovative application is not only easy to get, but we also believe this could be the first step in digitiszng identity across the government in Argentina and potentially other countries in years to come.” Enhanced security of citizens’ mobile identity Citizens with the ‘Mi Argentina’ app can initiate their request for a mobile ID by visiting a Renaper office, where their identity is verified and authenticated. Once approved, they receive an email with a code to activate their National Identity Document. In the event a smartphone is lost or stolen, credentials can be immediately revoked, safeguarding the citizen from potential identity theft. The mobile ID is securely stored on the citizen’s smartphone, meaning it can still be accessed if the cell phone has no data plan or when connection to a network or Wi-Fi is not available. Storage on the phone brings additional security for the mobile ID ecosystem, as a channel back to the central database is never required. Superior identity solutions Renaper issues all citizens a National Identity Document at birth and requires two mandatory renewals: between the ages of 5 and 8, and at the age of 14. Adults are required to renew it every 15 years. Argentina’s implementation of our technology provides its citizens with innovative ID access" “HID Global is committed to providing identity solutions that meet the evolving standards of the 21st century,” said Jessica Westerouen van Meeteren, VP & Managing Director, Citizen Identity with HID Global. “The government of Argentina’s implementation of our technology provides its citizens with innovative ID access and the ease of a completely mobile experience from registration to issuance.” Enhancing Border Security The government of Argentina previously partnered with HID to upgrade the country’s ICAO electronic passport to a newer generation that was more cost efficient, improved security and enhanced data reading at border control checkpoints. The successful partnership was a key factor in the government’s decision to collaborate with HID Global and deploy the HID goID mobile identity solution. The HID goID technology mobile ID ecosystem powers a more secure and connected world based on field-proven identity technology. It enables the issuance, lifecycle management and verification of mobile identities, and is a customizable solution that delivers many more functions than physical identity documents.
Ciudad Ros Casares has become one of the most important business parks in Valencia, Spain. It is a unique commercial and residential construction, which responds to the new business and networking requirements. The intercommunication system chosen by the project managers is the MEET IP System from FERMAX, because of its high performance and integration features as well as the security offered by MEET. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader Residential management software The project has a total of 245 apartments in 2 buildings, with two outdoor panels per building plus a concierge service managed with MEET's residential management software. The chosen outdoor entry panel is the MILO Digital Touch Panel and the 245 apartments are equipped with the MIO 7'' Monitor. The project is equipped with high technological features and qualities of different types, large leisure and green areas, general and specialized services and an excellent geo-strategic location. This commercial condominium includes offices, stores, a business center, spaces built to organizing events and apartments for rent. The installation of Fermax MEET system started in January 2019. Learn more about MEET by Fermax in this video:
Often spread over large premises, housing expensive equipment and with a high number of visitors accessing the site every day, care homes face numerous threats. Care home safety and security is a big issue, and ensuring the safety of patients, staff, visitors and assets is a top priority but also a challenge, so by installing access control systems workers are able to easily manage areas around a building. Access control systems can also carry out functions such as time and attendance, staffing level management and parking management. “Access control systems are increasingly being used to enhance safety and security in residential care homes by restricting and monitoring the movement of staff, residents and visitors without impacting on the residents’ everyday lives,” say access control specialists, Nortech. “Installing an effective access control system not only provides a flexible form of security but also one that is bespoke to each individual site.” Importance of access control systems Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers Access control allows staff to manage, control, monitor and restrict the movement of people or vehicles in, out and around an individual site. Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers. Access control systems can be easily installed to ensure that only authorized persons can access specific areas. In more sophisticated facilities, systems can also be used to restrict access to areas that need to be kept separate for the safety of other patients, such as isolation rooms. Access control solutions in care homes Care homes are known to be targets for criminals because they hold valuable goods such as computers and IT equipment and sensitive patient data as well as the personal possessions of staff, visitors and patients. To combat this and deter thieves, a growing number of premises are now installing access control systems to offer instant, flexible protection. One system Nortech can offer is a hands-free access control solution which is both secure and user-friendly. This Nortech system uses Nedap’s uPASS access readers which offer both convenience and security. UHF ID badges and uPASS access readers Each member of staff is issued with a long-range (UHF) electronic ID badge that they carry on a lanyard or clip. The UHF ID badges are automatically read by the uPASS readers at a distance of up to 2m allowing staff access though doors without the need to physically present their ID card to the reader. Two advantages of this hands-free system are that it allows staff to push trolleys or wheelchairs or to carry equipment easily around a care home whilst also avoiding the spread of germs or viruses through constant contact with door handles. Integrating access control system with security solutions Access control systems can work on a small scale for just one door or used as part of a wider security system The ease of integrating access control with other security measures is another reason why the system is so appealing, as access control software enables hospitals and care homes to provide even tougher protection for their sites. The systems are often effectively linked to the likes of CCTV, property marking, perimeter protection or intruder alarms. Access control systems can also work on a small scale for just one door, as well as being used as part of a wider security system. They provide users with a great deal of flexibility according to individual requirements. Enhancing security of hospitals, residential care homes By using access control as a method of security, different authorization levels can be easily set, thereby preventing people from accessing areas they do not have clearance for. New photo ID cards can also be created instantly for new staff or if a replacement is required. Electronic access control systems are increasingly being used to enhance safety and security in hospitals and residential care homes. In these environments, staff often needs to gain access through doors while escorting patients in wheelchairs or beds or when carrying sterile equipment, etc. so hands-free access is the ideal solution. Card-based access control systems Managers, trained staff, ancillary staff, residents and visitors can all be assigned a pass card that will allow them access around the building appropriate to their status. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Universities push traditional access control to its limits. The more one asks of it, the tougher it gets. If one wants to monitor access all over campus. To know who comes and goes to computer rooms and classrooms. One would like to filter access to conference and seminar rooms according to the time — lecturers all day, cleaners and contractors after hours. Meanwhile, one wants students to be safe 24/7, without compromising the sense of freedom they enjoy on campus. Traditional electronic door security Our Aperio wireless locks integrate seamlessly with more than 100 different security systems" Mechanical lock-and-key security cannot do this. Managing keys weighs facilities staff down. Students lose them all the time, and they’re expensive and laborious to replace. The traditional solution — wired doors with card readers — is costly to fit and run. There is an alternative. “Battery-powered electronic locks with inbuilt RFID readers are a cost-effective way to upgrade existing access control and bring it to more doors,” says Lars Angelin, Business Development Manager for Wireless Locks at ASSA ABLOY Opening Solutions EMEA. “Our Aperio wireless locks integrate seamlessly with more than 100 different security systems. You don’t even need to change your smart-cards. They fit all kinds of doors.” “And because they are battery-powered and wire-free, they’re much more cost-effective to install and run than traditional electronic door security.” It sounds great in theory. But what about the real world? These 5 universities have experienced an impact already. University of Liverpool, England A BREEAM sustainability rating of ‘Excellent’ was reward for innovative architecture that combines aesthetics with environmental awareness. Vine Court’s sustainable features include rainwater harvesting, solar water heating and battery-powered Aperio wireless electronic locks. Unlike wired access control, Aperio wireless locks use little electricity. Catherine Anderson at the University of Liverpool called Vice Court ‘a new and exciting benchmark for the Student Accommodation Sector.’ Lund University Faculty of Law, Sweden Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door The Law Faculty wanted to replace their access system without asking 50,000 students and staff to return existing smart-cards for reprogramming. Aperio made the process almost invisible from a user perspective. They didn’t even need to revalidate at a reader. Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door. A Pacom Unison security platform handles everything seamlessly. Facilities staff spends less time on admin and more on security. Aberdeen University, Scotland At Aberdeen’s refurbished Student Village, Aperio online cylinders and certified security locks cover doors requiring different grades of security. Cost efficiencies came at installation stage — no cabling to the doors means no expensive electrical contractors — and will continue through the locks’ operational life. Unlike standard wired access control that requires ‘always-on’ mains electricity, Aperio wireless locks are powered by batteries. These typically need replacing every couple of years — and that’s it for maintenance. HafenCity University Hamburg, Germany Aperio electronic cylinders filter access to the media centre, library, cafeteria and offices A partnership between SIEMENS and ASSA ABLOY provides intelligent, transparent electronic access control at a new docklands hub for the university. Aperio electronic cylinders filter access to the media centre, library, cafeteria, seminar rooms, staff rooms, laboratories and offices. Locking with these wireless RFID devices enables the university to remain an open, welcoming space without sacrificing staff and student safety. University of Birmingham, England Two new accommodation blocks at the university’s Vale Village complex needed locks to integrate seamlessly with a pre-existing campus security system, including Gallagher Command Centre software. Aperio locks now secure almost 1,800 doors with a low-cost solution that eases the key management workload for facilities staff. Everything is controlled from the Gallagher interface. And because Aperio is scalable, they can add new doors and buildings whenever they choose.
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organizations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorized manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?