The new DoorBird IP video intercom provides an option for adding access control via an ekey fingerprint scanner. The D2101FV EKEY door station is equipped with a cutout for installing the ekey home FS UP I fingerprint reader. Visitors and homeowners can use all the functions of the smart intercom immediately after installation including opening doors via app or RFID key fob. Once the ekey module has been mounted, access can also be granted by fingerprint. The DoorBird app controls, RFID reader a...
To meet the evolving design needs of the diverse and growing market for biometric access control solutions, the globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced the expansion its fingerprint authentication touch sensor portfolio for physical and logical access devices and applications. FPC1025 sensor access module To enable maximum flexibility in product design, the new FPC1025 sensor version from Fingerprints has a smaller footprint than the other models...
Organizations globally are facing an urgent need to rapidly onboard hundreds of key employees, such as medical staff, nursing staff and other staff members, on a daily basis across multiple facilities and sites. HID Global, a worldwide renowned provider of trusted identity and identity management solutions, has introduced an emergency badging solution to help manage the secure issuance and administration of staff badges and access control credentials for employees as they navigate the current g...
IDEX Biometrics ASA, a provider of advanced fingerprint identification and authentication solutions, is pleased to announce that IDEX’s fingerprint sensor and Tongxin Microelectronics’ Co., Ltd. (TMC) secure element have been included in a biometric payment card certified by China UnionPay. This is the first biometric payment card to be certified by China UnionPay. TMC is a secure element supplier in China focused on the smart card industry and is partnering with IDEX to accelerate...
Hank Washington, a company specializing in high-quality household products, announced a new keyless keypad door lock system. The BACKR electronic access control solution is ideal for customers interested in a high-security door lock for both indoor and outdoor applications. The recent announcement aims to provide a reliable security solution for residents and business owners throughout the US. The new BACKR keyless door lock features an easy-to-use touchscreen offering four unlock alternatives:...
Redrock Biometrics and HYPR announce a partnership for Redrock Biometrics to provide palm authentication with their PalmID solution. HYPR is a renowned provider of passwordless authentication for enterprises. Backed by Comcast, Mastercard, and Samsung, the HYPR cloud platform is designed to eliminate passwords and shared secrets across the enterprise. With HYPR, businesses have deployed secure passwordless authentication for millions of users. The addition of Redrock Biometrics' PalmID to the H...
Suprema Inc., a globally-renowned provider of security and biometrics solutions, has announced 'Suprema Mobile Access', a new mobile contactless solution and complete platform for managing, issuing and tracking access credentials using smartphones. As access control systems have evolved beyond physical access cards, access control solutions using mobile phones as a credential were introduced. Suprema Mobile Access Suprema Mobile Access employs a smartphone application with NFC (Near Field Communication) and BLE (Bluetooth Low Energy) to communicate with card readers, allowing access to doors and other secured assets. Suprema Mobile Access simplifies the management of access cards as the entire process goes online, without face-to-face interaction, allowing users to remotely manage credentials, issuing and revoking them in real-time. AirFob Portal Using a link in the email, users can then install Suprema's mobile app 'AirFob Pass' on their Android or iOS phone Using Suprema's 'AirFob Portal', the mobile access management portal, one can issue mobile access cards to users via email. Using a link in the email, users can then install Suprema's mobile app 'AirFob Pass' on their Android or iOS phone. Once the app has been installed, the mobile access card is ready to be used. Like a physical card, users can tap smartphones on a mobile enabled card reader to access doors and other controlled items. For a seamless user experience, the app supports background mode, which eliminates the requirement to wake up the phone in order to get access. Data encryption and protection To ensure the security of user data on the platform, Suprema Mobile Access is designed from the ground up with enhanced security features including data encryption throughout the process of issuing and using credentials. The backend server for Suprema Mobile Access is managed separately and the server encryption keys are protected with special proprietary methods. The solution has been certified by an independent audit to be compliant with the ISO 27001 standard for Information Security Management, signifying Suprema's continuing commitment to the protection of private information as the highest priority. Support for NFC and BLE Suprema Mobile Access supports both NFC and BLE, guaranteeing compatibility with most iOS and Android smartphones. The solution overcomes the limitation of a slow authentication speed common in other BLE based solutions by utilizing a unique method of analyzing the GAP and GATT layers of BLE. Users can simply present their phones to mobile enabled card readers without requiring any additional gestures By making use of these data, users can simply present their phones to mobile enabled card readers without requiring any additional gestures such as turning or waving the smartphones. With this enhanced technology, the authentication of Suprema Mobile Access takes less than 0.5 seconds, which is comparable to the speed of reading RFID cards. Contactless security solution Introducing the new platform, Young S. Moon, CEO of Suprema Inc., noted, "As maintaining a high level of reliability, convenience, and personal hygiene has become crucial in recent times, Suprema Mobile Access will be the best choice for the next generation contactless security solutions.” He adds, “The innovation in the reading speed and the user experience of Suprema Mobile Access will accelerate the transition from plastic cards to mobile phones as the most common credential of physical access control."
Biometrics company, Fingerprint Cards AB (Fingerprints™) announces a collaboration with the global on-line distributor, Digi-Key Electronics. This cooperation will strengthen Fingerprints’ position and help the company scale into new markets and application areas within IoT and access globally. “This is a step for us to be able to scale with FPC BM-Lite and to reach new verticals that require additional sales channels to drive business. Digi-Key will help us reach out and find new potential markets and application areas,” concludes Michel Roig, SVP Business Line Payments & Access at Fingerprints. Capacitive fingerprint sensor technology “We are excited about the new partnership with Fingerprint Cards,” said David Stein, VP, Global Supplier Management at Digi-Key. “Biometric Authentication is growing as it continues to be implemented into new applications and devices. Digi-Key now offers customers an easy path to develop secure devices with integrated capacitive fingerprint sensor technology.” Fingerprints’ BM-Lite Module and Development Kit are currently in-stock and available for immediate shipment from Digi-Key.
Suprema, globally renowned provider of security and biometrics, has announced that 2020 marks the company’s 20th anniversary. Suprema was founded in 2000 and the company has built a worldwide sales network in over 140 countries and number of users with Suprema technologies surpassed one billion. Access control systems major Suprema’s extensive range of portfolio includes access control systems, time & attendance solutions, mobile access solutions and fingerprint live scanners. The company has no.1 market share in biometric access control in EMEA region and named to the world’s top 50 security manufacturer. Based on innovative products and technology, Suprema has recorded a phenomenal mean annual growth rate (CAGR) of 20%. At present, the company has more than 40% of its employees engaged in research and development and invest more than 16% of its sales in R&D each year. Emblem commemorating 20 years released Suprema announces a new emblem in commemoration of its 20th anniversary in 2020 To mark its 20 years of innovation, Suprema announces a new emblem in commemoration of its 20th anniversary in 2020. The anniversary emblem mainly consists of two colors. ‘Infinite Burgundy’ which is the brand color of Suprema symbolizes the infinite possibility with Suprema’s unique solutions and technical skills. With this brand color, ‘Superior Purple’ has been added to represent the uniqueness and excellence of the company that retains trust from its 20 years of history and technology initiatives. "We would like to give special thanks to all our partners and employees who have made this possible," said the Founder and Chairman of Suprema, James Lee, adding. "Everyone at Suprema is ready to lead our next 20 years.” Ever-expanding global presence Suprema has grown into a corporate group with subsidiaries and affiliates in security and biometrics with the world’s best and exclusive technologies. Since Suprema HQ, a holdings company, earned a place on KOSDAQ in 2008, Suprema Inc. was listed again in 2016. Last year, Suprema ID which is an affiliate of Suprema was also listed successfully, and Suprema now plans to broaden its position in the world and gain a foothold in the global market.
For customers who service banks, Digital Monitoring Products, Inc. (DMP) offers an affordable way to bring ATM vestibule access control to their facilities. Digital Monitoring Products’ new 734B Bin Code Access Control Module installs just like any of the company’s access control modules. And like all DMP access control solutions, it's designed with customized functionality and added flexibility. 734B Bin Code Access Module 734B allows banks to restrict access into their ATM vestibules and lobbies only to their customers with valid bank cards In combination with a magstripe reader, the 734B allows banks to restrict access into their ATM vestibules and lobbies only to their customers with valid bank cards. With the 734B, banks don’t have to program user codes for every single customer of the bank. A single Bank Identification Number (BIN) can be programmed into the panel and used as the basis for access control. To control access, the module processes the bank card’s BIN that can be up to eight digits long. Customized Functionality One of the best things about adding BIN code support is that there is no need to grant users any new credentials. The 734 allows them to use the same bank cards for access that they’re accustomed to using at the ATM itself. Furthermore, the 734B is compatible with any swipe-based magstripe reader, which supports the ABA Track 2 data from the bank card. “The 734 provides the interface between the reader and the panel,” explains DMP’s Corporate Trainer Adam Barton. “So, you’re free to use any ABA Track 2 magstripe reader that’s readily available.” Added Flexibility With the 734B, your customer can take advantage of schedules and remote locking With the 734B, your customer can take advantage of schedules and remote locking. This gives them the flexibility to schedule an ATM vestibule to be locked during banking hours and unlocked for their patrons’ convenience when banks are closed. Other powerful access control features include the ability to run reports, make users inactive and use Entré or Virtual Keypad Access to easily change BIN codes. These features are available whether the BIN codes are programmed as user codes and either processed at the panel or processed locally from the access control module. For added flexibility, the 734B can also be programmed as a standalone door control module without requiring a panel. Enhanced data security For a bank’s customers, the 734B offers security that’s also convenient. And for the banks, the 734B allows them to review events. They can see how many of their competitor’s customers might be attempting to use that ATM, which helps guide them in their marketing decisions.
Identiv, Inc. has announced the launch of MobilisID, its latest solution for frictionless access. The MobilisID solution brings ease and simplicity to physical access and management without compromising security. Using the latest in Bluetooth and capacitive technologies, MobilisID allows users the freedom to access a controlled environment without the need to present a credential. MobilisID solution Identiv’s MobilisID solution combines security, simplicity, and convenience into an easy-to-install, cloud-managed physical access control system (PACS). By harnessing users’ current smartphones and tablets to transition from conventional physical cards to secure mobile credentials using powerful, multi-tech Bluetooth MobilisID Readers, the smart mobile solution creates a secure and effortless way to approach physical access, keeping users on-the-go. Issuing and managing credentials has never been easier with MobilisID Manager. The MobilisID cloud-based portal works on any web-browser and gives administrators and operators the ability to issue, update, and remove user credentials on-the-fly, making the once cumbersome process of creating physical credentials simple, quick, and efficient. MobilisID Manager Managing users and credentials with MobilisID Manager is also cost-effective by cutting out the hardware necessary to produce cards and eliminating costs to deploy, ship, and track physical cards. The MobilisID app securely transmits a personalised credential using the latest Bluetooth technology “Now, more than ever, we’re seeing the overwhelming need from our customers and partners to make physical access more convenient, more secure, less expensive, and simply smarter,” said Mark Allen, Identiv GM Physical Access. “Carrying conventional physical cards is just not the right solution for some people. But everyone carries a mobile device. With MobilisID, we’re harnessing the power of multi-tech Bluetooth readers combined with a highly secure, cloud-based management system that saves users time and money.” MobilisID app The MobilisID app, available on the Apple App Store and Google Play Store, converts almost any iOS or Android smartphone or tablet into a direct replacement for a traditional, physical credential. The MobilisID app securely transmits a personalized credential using the latest Bluetooth technology to MobilisID readers allowing the user to freely move throughout a building or facility without the need to present the mobile device. For those sites that require support for legacy, proximity-based credentials, including cards, tags, or fobs, the MobilisID Reader supports 26 – 37 bit 125 kHz low frequency (LF) credentials, making the transition from physical to electronic-based access control seamless.
Ping Identity, the Intelligent Identity solution for the enterprise, announces two new solution packages for enabling centralized authentication services, which span the entire enterprise. The new solutions include single sign-on (SSO), multi-factor authentication (MFA), user directory, and complementary Ping Professional Services that enable extraordinary customer and workforce digital experiences. These new solutions, Customer360 and Workforce360, are designed to address the full range of enterprise needs including hybrid IT integration, advanced configuration, and are now available with simple pricing and are deployable with flexible cloud options. Customer identity management solution Ping’s Customer360 also includes MFA capabilities that can be tailored to diverse security requirements Ping’s new solution for customer identity, Customer360, ensures seamless customer experiences during registration, login, multi-factor authentication, and self-service profile management to help you attract and retain customers. A modern customer identity management solution provides a seamless front door to today’s digital businesses, improving conversion rates and retention across digital customer journeys. Ping’s Customer360 provides consistent login experiences and secure passwordless authentication options for an organization’s digital properties, helping increase user engagement and increase sales. Ping’s Customer360 also includes MFA capabilities that can be tailored to diverse security requirements and customer preferences. These capabilities range from widely adopted SMS or email options for MFA, to the ability to verify customer identities and transaction approvals with fingerprints or face scans from a mobile app. Centralized authentication solution Ping’s new solution for workforce identity, Workforce360, provides secure, consistent authentication experiences to employees no matter where work gets done. It includes a centralized authentication solution with MFA and directory that creates a modern identity foundation to make large enterprises more productive, secure, and agile. Ping’s Workforce360 provides an identity solution that is capable of extending across diverse hybrid IT environments with speed, scale, and security. It provides fast, out-of-the-box integrations and the ability to easily extend across SaaS, legacy applications, cloud applications and more for seamless login experiences, helping increase security and employee productivity. Cloud-Ready software Both Customer360 and Workforce360 leverage the latest cloud technologies Both Customer360 and Workforce360 leverage the latest cloud technologies including cloud-ready software, Identity-as-a-Service capabilities, and complementary Ping Professional Services for a comprehensive solution package. Both solutions stand apart in the market with their breadth of integration, extensibility, and configuration options valued by enterprises, as well as the flexibility to: Deploy in almost any cloud environment Authenticate users for practically any application, any directory, and any situation Package with complementary Ping Professional Services to accelerate time-to-value Simplify pricing with no add-on costs for expected features User productivity challenges “With the ability to deploy quickly in any cloud—whether it be public, private, or a hybrid environment—our new solutions will help global enterprises efficiently tackle and simplify some of their most complex security and user productivity challenges, while enabling line of business initiatives and supporting corporate IT teams with advanced use cases,” said Loren Russon, vice president of product management, Ping Identity. “With a focus on the workforce and customer identity experiences, companies will be able to swiftly implement these market leading capabilities throughout their organizations to accelerate digital transformation objectives.”
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
Comelit has continued its work with multi award-winning London property developer, Howarth Homes to present new homeowners at office-to-residential conversion, Lovell House with smart access control and door entry. Lovell House, located off Uxbridge High Street in Middlesex is a stunning collection of 45 executive suites, one and two bedroom apartments set over six floors, each finished to a high specification. Smart access control and door entry system Each apartment has been individually planned to ensure a light and airy interior with excellent accommodation flow. Within the initial design process, Comelit was invited back to work with Howarth Homes to accommodate a request for smart security right from the point of entry to individual apartment access. Linzie Howland, Sales Director of Howarth Homes stated, “Howarth Homes is adept at creating affordable option developments interiors that demand more than just cursory attention. Every detail in each of our developments has been carefully and thoughtfully considered to ensure that our new home promises easy, hassle-free living”. SimpleKey access control solution Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets Linzie adds, “Lovell House is testament to this commitment, and commands superior specification right from access control through to door entry. We have gone above and beyond the expected to ensure homeowners can take advantage of purchasing offers and live in a development where we present smart security and visitor management without compromising aesthetics.” Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets in every apartment, allowing visual door entry operating through its 2-Wire SimpleBus solution. The powerful combination presents homeowners with the capability to answer access requests and manage home access. Comelit access control readers installed Each of the five floors has an access control reader installed alongside each lift facility, totaling 19 units around the site. The development itself is finished with a bespoke stainless steel panel with bezel design. All systems have been designed and installed to comply to Secured by Design standards. Tom Kidston of Excellence Electrical said, “Howarth Homes prides itself on its pledge for connected living for a connected world, so it’s essential access control and door entry is planned into the specification and design”. Residential security systems Tom added, “This is especially important at office to residential conversion works such as Lovell House, where systems need to be considered with the change of purpose to the building. Early planning ensures a coordinated approach to installation, with minimal cabling requirements to remain compliant, stylish and secure.” Daniel (Dan) Wood, Southern Sales Manager at Comelit UK said “Uxbridge is increasingly growing in demand for first time buyers and rental property, experiencing excellent capital growth. Howarth Homes has a number of developments in the area and we have been thrilled to work closely with them to deliver total solutions for access control and door entry”. Dan adds, “At Lovell House, the specification brief was to create futureproof, smart security and visual visitor management, delivered seamlessly with our SimpleBus and SimpleKey systems.”
Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation. The airport contains three runways, two of which are used by commercial aircraft. The airport offers ground transportation, free parking, a Subway restaurant, and many other services such as hangar space and flight training to name a few. Previously, Valdosta Regional Airport operated a legacy Matrix access control system. The proprietary system, including the readers, panels and software, was outdated, making it difficult and expensive to obtain replacement parts. Building automation systems Looking for an open solution, Valdosta Regional Airport turned to Allcom Global Services for their expertise and upgraded to AMAG Technology’s Symmetry SR Retrofit Access Control system with HID readers. “Symmetry integrates into various video, intrusion and building automation systems,” said Kevin Cioffi, vice president, Allcom Global Services. Valdosta has more freedom to research competitive pricing and alternative options" “By choosing an open system, Valdosta has more freedom to research competitive pricing and alternative options. We are thrilled they have chosen Allcom. We gutted all the circuit boards and changed them to the Symmetry panels,” said Tim Register, operations manager/airport security coordinator, Valdosta Regional Airport. “We kept the antennas and how the data was transmitted. All the mounts stayed the same; we just swapped in Symmetry and it worked.” Integrating different technologies Symmetry controls access to the perimeter of the airport including the vehicle access gates and all outside doors facing the Security Identification Display Area (SIDA). The SIDA includes all areas that have access to the commercial apron and tarmac. The SIDA also requires a reader with a PIN-plus-card swipe to open, which make up 75% of the airport’s readers. The remaining Airport Operations Areas (AOA) require only a proximity card swipe to open, which are mostly internal doors and the main entrance. Thirty-two new HID proximity card readers were installed in total. To get the open system the airport required, Valdosta Regional Airport replaced older panels with Symmetry SR panels. As the Symmetry system changes or expands, integrating different technologies or adding more readers will be easy and less expensive. More economical approach The simple job of creating a badge for a user was cumbersome and time consuming with their old system The security operators found Symmetry much easier to learn and use, saving money and hours in training time. The simple job of creating a badge for a user was cumbersome and time consuming with their old system. With Symmetry, badges are created on demand, onsite, with no hassle or extra charge. “Symmetry provided us a more economical approach to facilitate the same thing we used to do with a more expensive, proprietary system,” said Register. “It is much easier to create a badge with Symmetry.” Life flight helicopter Airport authority employees, TSA, airline employees, fixed based operators, life flight helicopter and fixed wing aircraft are all protected by Symmetry. In addition to the perimeter, Symmetry controls access to all work areas within the airport and to the hangars located inside the perimeter fence. “An incident happened one Sunday morning where a car hit a pole and brought the power down,” said Tim Register. “If we were operating the Matrix system, it would have been down for hours. Our Symmetry system was only down minutes.”
HID Global, globally renowned company in trusted identity solutions, has announced that the traffic branch of the Singapore Police Force has deployed an electronic Know Your Customer (eKYC) system that uses HID Lumidigmâ V-series Fingerprint Sensors to verify the identities of driver’s license applicants. Lumidigmâ V-series Sensors The HID Lumidigm sensor’s patented multispectral imaging technology has helped improve identity-verification speed and efficiency as compared to their previous paper-based process, and its proven liveness-detection capabilities significantly diminish the risk of fraudsters compromising the eKYC system. The new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants Deployed by HID partner Secur Solutions Group at Singapore’s three driving schools, the new eKYC system improves security by using fingerprints to verify the “true identity” of driver’s license applicants. The speed and reliability of the Lumidigm sensors has enabled the entire enrollment process to be performed at kiosks in seconds, from fingerprint capture through matching against the actual identity documents (NRIC/Work Permit). Fingerprint sensors The Singapore Police Force is now enrolling 500 to 700 individuals a day at the kiosks since deployment and has cut almost 1,500 man-hours of labor per month since eliminating its staffed counters and manual workflow. “The HID Lumidigm sensors have outperformed all alternatives with respect to speed, accuracy and consistency of image acquisition regardless of finger or environmental conditions,” said Tseng Wun Hsiung, CEO of Secur Solutions Group. “New opportunities are being considered for service enhancement and parts of the eKYC system are being evaluated for integration.” Integrated with multispectral imaging technology HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the ISO standard HID Global’s patented multispectral fingerprint imaging technology captures unique characteristics from the finger’s surface and subsurface, which is particularly important for the Singapore Police Force’s eKYC system because it serves a large population spanning many ages, ethnicities and skin types. The Tseng Wun Hsiung technology works reliably with normal, wet, dirty, dry or damaged fingers, and in sunlight or wet or cold conditions. Field-updatable liveness detection is employed to distinguish between the captured biometric data from a real living person versus a plastic, fake or other artificial fingerprint copies. HID’s V-Series Lumidigm sensors were the first fingerprint products certified to the International Standards Organization (ISO) standard focused on anti-spoofing and liveness detection. Fingerprint recognition “HID Global is delighted that our Lumidigm V-series sensors are delivering unparalleled accuracy in fingerprint data capture for the Singapore Traffic Police’s new eKYC system,” said Sujan Parthasaradhi, Director, APAC, Extended Access Technologies Business Area, HID Global. “We have no doubt our solutions will continue to give the Singapore Traffic Police the confidence of standards-validated spoof protection at their driving schools while helping them sustain the highest levels of efficiency and customer service.”
Navata Road Transport, a road logistics service provider, established in the year 1982, by founder Late Parvataneni Subhas Chandra Bose, now occupies a place of pride among the leading Road Transport Organizations in South India. Navata is spread across a network of 672 branches across India. Warehouses and distribution centers are an integral part of a hub and spoke operations at Navata. HR people at the Navata Road Transport had to manage and do manual work for time-attendance and overtime data. With manual work, data are prone to error. With error-prone data, it was difficult for them to proceed for salary payment. Not only this, but centralized monitoring of time-attendance data of employees of 20 locations across Andhra Pradesh was a difficult task for them. Time-Attendance systems As they already had their inhouse application, communication/integration of the time-attendance devices with that inhouse application was the biggest question for them. To communicate with the Linux Server and devices, they required a third party application interface which was not feasible. Established in 1991, Matrix is a provider of Security and Telecom solutions for modern businesses and enterprises. Matrix Door Controller comes with built-in API for system integration As an innovative, technology driven and customer focused organization, the company is committed to keeping pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance systems as well as Telecom solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints. Built-In API for system integration These solutions are feature-rich, reliable and conform to international standards. Having global footprints in Asia, Europe, North America, South America, and Africa through an extensive network of more than 2,500 channel partners, Matrix ensures that the products serve the needs of its customers faster and longer. Matrix has gained trust and admiration of customers representing the entire spectrum of industries. Matrix has won many international awards for its innovative products. With extensive analysis of the existing system and Navata’s requirements, Matrix came up with the solution to provide Door Controllers. Matrix Door Controller comes with built-in API for system integration. It directly pushes all the entry and exit records to the company’s Linux server. In addition to that, the customer can command and control the devices now through the inhouse Attendance Management and Payroll Application which was not possible earlier. Additional dedicated server Elimination of the errors has been possible in the data of Time-Attendance and overtime So, there is no requirement of any additional dedicated server for the interface with Matrix’s Door Controllers. Ultimately, these Door Controllers have overcome the challenge of communication with the company’s Linux server. By overcoming the challenges of the entire system, the customer enhanced the productivity of the employees and can effectively use the resources. After acquiring the solution from Matrix Comsec, Navata got the efficiency in Time-Attendance management. Elimination of the errors has been possible in the data of Time-Attendance and overtime. Now, employees get an accurate and timely salary at Navata Road Transport after the atomization of Time-Attendance record and calculation. This increased the productivity of the employees because of the accurate data. This also made the HR work smooth and hassle free. Through live monitoring, centralized control of all the 20 sites has been taken. Reduces installation and maintenance cost Product Offered: COSEC DOOR FOT A Door Controller with higher storage capacity and touch sense keypad. It identifies the user in less than one second. With multiple connectivity options like 3G/4G/LTE it gives flexibilities with the customer’s existing system and therefore, reduces installation and maintenance cost.
STANLEY Security, one of the UK’s pioneer security providers, installs a biometric access control system at beverage company Finlays’ Pontefract site to protect its server rooms. A company with over 265 years heritage, Finlays owns and operates tea estates, extraction facilities for tea, coffee and plant extracts, packing facilities and R&D laboratories across four continents. Finlays already had a PAC access control system in place for exterior doors, and number code locks were fitted to the doors of their server rooms but, reviewing security, Finlays wanted to improve the level of security for the latter. Deciding a biometric system The key requirement was to ensure access to the server rooms be controlled by Finlays IT department only" The key requirement was to ensure access to the server rooms be controlled by Finlays IT department only. IT staff work standard office hours so should access be required to the server rooms outside of this, the code for the locks would have to be shared with others or a member of the IT team would have to return to site. Finlays had ruled out a card/tag based access control system due to the inherent issues with lost, stolen or borrowed cards, and had decided a biometric system would be the right solution for them. A number of security companies were approached, including STANLEY Security, which were awarded the contract. “It’s a name we knew and we have a lot of STANLEY product on site,” states Stephen Firth, Finlay’s Group Senior IT Support Engineer. Biometric fingerprint readers “We also have a PAC system which shares the same software that the STANLEY biometric system runs on, so it meant we could easily add to the existing system and view both using the same software, although they are run as stand alone systems for added security.” STANLEY Security installed ievo® biometric fingerprint readers to four server room doors at Finlays STANLEY Security installed ievo® biometric fingerprint readers to four server room doors at Finlays. The system features advanced image reading sensors that take a detailed scan of a finger from the surface and subsurface levels of the skin, to capture a highly accurate digital image whilst protecting against fake and spoof fingerprints. Specific data from the image is converted into a digital template used for fingerprint identification. Biometric access control system Providing a user presents a finger that matches a stored user template, then access will be granted. ievo captures clear, clean images, even when surface features are absent or hard to distinguish due to age, dirt, finger pressure and skin or environmental conditions. Finlays are pleased with the new biometric access control system as it provides the company with the security required but also convenience, as Stephen comments: “Now, IT has full control of who enters the server rooms and there is an audit trail. We don’t have to worry about who has keys to the IT office and who knows the code for the server rooms door locks. What’s more, IT can open any door on the system remotely should it be required, rather than having to return to site. With one of the racks on our server belonging to someone else, that’s an important consideration should they need to gain access out of office hours.”
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload