Allegion US, a globally renowned provider of security products and solutions, has announced that it has received federal government approval for its Schlage Multi-Technology (MT-485) Readers, when paired with the LenelS2 OnGuard version 7.6 access control system. Schlage MT Readers Schlage’s MT Readers simplify access control solutions by recognizing magnetic stripe, proximity, Schlage smart card and NFC-enabled smart devices with a firmware update, ensuring a seamless transition to high...
Continental Access, a division of NAPCO Security Technologies is pleased to introduce their all-new E-Access readers for Continental’s E-Access embedded access control line. E-Access readers feature ultra-fast transaction times, under a second, Wiegand & OSDP support, easy automated credential issuance and no-touch Bluetooth mobile credentials. Several models are available for standard and mullion applications, and also with digital keypad. Cloud-Based system E-Access is Continental...
The Continental Access division of NAPCO Security Technologies is pleased to introduce its new logo, branding and dealer program. The new, modern look encapsulates the wide variety of solutions that Continental Access offers, including enterprise, mobile, cellular, cloud, wireless locks and embedded solutions, plus the debut of an all-new program for dealers/integrators. Offering dynamic integrators Stephen Spinelli, SVP, Sales of NAPCO said, “Today’s Continental Access offers muc...
Suprema, a pioneer in access control, biometrics and time & attendance solutions, announces that its compact outdoor RFID reader, XPass D2 has been verified by SIA as OSDP compliant. OSDP, or Open Supervised Device Protocol, is an open-source protocol devised to improve interoperability among access control products from different manufacturers. OSDP enables bi-directional communication between readers and controllers, an improvement from one-way data transmission of Wiegand interface. Inn...
The Physical Security Interoperability Alliance (PSIA) has announced its Secure Credential Interoperability (SCI) initiative and a working group to advance its development. “The physical access control industry has demonstrated a need for a universally compatible secure credential and we believe that we have found a simple, yet elegant solution to address this with SCI,” said Mohammad Soleimani, CTO of Kastle Systems and Chairman of the SCI Work Group. SCI Work Group M...
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which securi...
Iris ID, the pioneer in iris recognition technology for over 20 years, announced Rockford, Illinois,-based Information Controls Inc. has integrated its TimeTerminal time clock app to work with the IrisTime iT100, Iris ID's customizable and contactless time and attendance platform. TimeTerminal's cloud-based software creates a wide variety of employee functions and features for the iT100, including customizable attestation questions, daily wage advancements, department transfers, and timecard review. Legally mandated breaks TimeTerminal synchronizes data in real-time to host systems in the cloud. Using the TimeTerminal app enables employers to comply with labor laws and regulations and can also help enforce mandated meal period durations. Employees clock in and out using the iT100. Using its dual biometric iris and face recognition reader, the iT100 provides fast, accurate, and convenient authentication of employees standing up to two feet away – an important consideration during the COVID-19 pandemic. The iT100 and the TimeTerminal app also enable employers to protect their workforce through the attestation process. Workers can be required to answer health-related questions before beginning a shift. User-defined questions also may require employees to acknowledge taking legally mandated breaks and affirm that no injuries occurred during the last completed shift. Employees also may use iT100 readers with TimeTerminal to check benefit balances, such as accrued vacation, sick, and PTO time. Identity authentication solutions The iT100 then confirms their identities thus keeping the authentication process touchless Mike Kuss, executive vice president, Information Controls Inc., said TimeTerminal can also work on smartphones, enabling users to answer questions and receive information on their own smartphones prior to starting their work shift. The iT100 then confirms their identities thus keeping the authentication process truly touchless. “With a leading manufacturer of widely used contact hand geometry readers leaving the market, the timing is perfect for TimeTerminal to move to an iris-based time and attendance system,” said Kuss. “We're excited about working with Iris ID, the leader in iris-based identity authentication solutions. We view adapting our TimeTerminal software for a contactless iris-based system as a wise business decision." Independent software vendors "The IrisTime iT100 is designed as a time clock for the modern workforce," said Mohammed Murad, vice president, global sales and development, Iris ID. "By continually expanding the time-keeping app ecosystem for IrisTime iT100, such as TimeTerminal, we're revolutionizing the time and attendance function to provide affordable contactless solutions for the basic or precise requirements of virtually any organization." The IrisTime iT100's open Android-based platform accommodates hundreds of current time and attendance apps while also enabling independent software vendors (ISVs) to create custom software solutions meeting any organization's specific time-keeping needs. The iT100 ships with a standard app fully capable of meeting the needs of many organizations.
Suprema, a pioneer in access control, biometrics, and time & attendance solutions, shared partner testimonials about its security controller CoreStation that helps facilitate building multi-credential access control systems. Suprema CoreStation is a biometric-enabled security controller that provides great system design flexibility with credential options ranging from PIN, RF card reader, mobile access to fingerprint and face recognition. Meyer, a partner in Turkey, was able to construct a face recognition access control system for its customer using Suprema CoreStation and Suprema face recognition terminals. Fingerprint recognition system “CoreStation offers unrivaled matching speed. The customer preferred to connect the face recognition terminals to CoreStation instead of directly to the server for stronger security. This meant that all user data was saved in CoreStation and data had to be transferred to CoreStation for every matching operation. Despite this configuration, users do not notice any delay in authentication thanks to CoreStation’s powerful performance,” said Orcun Bayindir, CEO of Meyer. IQ trading, a partner in Ukraine, enabled a fingerprint recognition access control system for a banking customer. Andrii Glukhov, technical support lead at IQ trading, cited CoreStation’s scalability, enterprise level memory and interlock zone support as advantages. Increasing security level CoreStation is a unique, powerful controller that can store up to 500,000 users" “Using Suprema CoreStation, we connected 26 two-sided doors with high performance fingerprint authentication. CoreStation is a unique, powerful controller that can store up to 500,000 users, 1,000,000 fingerprint templates and 5,000,000 logs, providing uninterrupted service regardless of network issues. We were also able to create sequential passages with interlock zones, increasing overall security level and eliminating the possibility of a person entering the second door without closing the first one,” said Glukhov. Absolon, a partner in Europe, provided mobile access solution to Crestyl, a real estate developer in Czech, using CoreStation. The site had over 100 doors with 1,500 employees and required a secure yet flexible controller that could be easily integrated with third-party systems. Mobile credential compatibility Crestyl was operating a third-party system C4 software and was looking for a way to add mobile credential without a major system overhaul. CoreStation, together with Suprema BioStar 2 and Suprema XPass D2 readers, was a great answer because of CoreStation and BioStar 2’s integration flexibility. C4 was integrated with BioStar 2 via BioStar 2 API and XPass D2 were selected for mobile credential compatibility. “CoreStation’s appeal lies in the gamut of credential options it supports. Partners and customers can enable PIN, RF card, mobile access as well as biometric credentials like face and fingerprint with Suprema’s intelligent controller,” said Hanchul Kim, CEO of Suprema Inc.
Allegion, the globally renowned provider of security products and solutions, including Schlage readers and locks, together with CBORD, a renowned higher education technology solutions provider, announced that they have expanded their offerings and now provide on-campus mobile credential solutions on Android phones. Students, faculty and staff on participating campuses can now use their Android phones to conveniently, safely and securely access campus buildings and make purchases through Google Pay, while the universities benefit from operational efficiencies. Contactless mobile IDs for campuses Allegion and CBORD first launched contactless mobile IDs for campuses in August 2019, for Apple devices. The University of Tennessee, Knoxville, University of Vermont and University of San Francisco were among the first schools to leverage the solution. The solution was well received and will be extended to Android phones on more campuses throughout this year, so as to reach an even larger population. “COVID-19 accelerated the adoption of and demand for contactless solutions, across the campus population. With many campuses looking to reopen for in-person classes this fall, having a contact-free solution became paramount to ensure a safe reopening,” said Jeff Koziol, Business Development Manager of Campus Software Partners at Allegion. Enhancing campus safety Schlage readers and locks also support the Transact NFC Android and the Apple iOS NFC mobile credentials Jeff Koziol adds, “Campus security directors can now offer students and faculty assurance that they can come back to campus safely, with contactless access in place to reduce touch points and trace outbreaks, while adding convenience.” Once the CBORD credential is provisioned, users simply present their device to NFC-enabled readers to pay for food, vending or laundry, or access exterior and interior doors at campus buildings and residence halls. Schlage readers and locks also support the Transact NFC Android and the Apple iOS NFC mobile credentials. Leveraging MIFARE 2GO cloud service CBORD and Transact’s mobile credentials for Google Pay leverage NXP Semiconductor’s secure MIFARE 2GO cloud service, which enables use of the credentials on all compatible Android NFC-enabled phones. “Campus credentials in the mobile wallet continue to reinvent and enhance the student experience,” said Larry Delaney, Vice President of Strategic Alliances at CBORD, adding “The ability to issue student IDs and access privileges prior to students returning to campus is yet another example of modern convenience and improved efficiency that mobile credentials provide.” Additional benefits for further convenience and interoperability include: They are wallet-based. The credentials make the transition seamless, as the campus population already tends to utilize digital wallets. The credentials allow for self-service, which helps the campus population avoid lines to traditional university card offices, which is critical as traffic is an area of concern during this COVID-19 pandemic They are protected by two-factor authentication. The solution allows students to request two-factor authentication by leveraging the pin pad or biometrics already present on their phone. The credentials can be remotely deactivated by the student or university, for added security. This extended offering is the next wave in Allegion’s pursuit to work with other globally renowned solution providers in the industry for digital credential rollout in universities.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces a new version (v 5.10) of its flagship unified security platform, Security Center. Among many new enhancements, this major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. Enterprise video surveillance The new version of Security Center brings enterprise video surveillance customers new options to facilitate their migration to the cloud as well as support flexible hybrid-cloud architectures. Taking a step further towards unified, enterprise Video-Surveillance-as-a-Service (VSaaS), the new version of Security center Omnicast™—the video management system of Security Center—enables the seamless use of tiered cloud and on-premises storage to manage short- and long-term video archives according to customer needs. The new version of Security center Omnicast™ enables the seamless use of tiered cloud It gives configuration flexibility and reporting capability and supports various scenarios for real-time or on-demand access to video footage stored in the cloud. Depending on its recency and criticality, video can either be stored in high-performance storage for fast access or long-term storage to support flexible cost options, as well as data compliancy. Ingested video blocks To ensure maximum security, ingested video blocks are encrypted on-premises and then moved to the cloud using encrypted communications channels. “Last year accelerated the digital transformation of organizations big and small, inside and outside of the security industry,” said Francis Lachance, Director of Video & Appliances product group at Genetec, Inc. “Omnicast Cloud Storage is not just terabytes in the cloud. It’s a complete collection of media services that deliver the flexibility and sophistication enterprise customers need to successfully move to a hybrid-cloud video surveillance architecture.” Cloud-Based deployment Sipelia™ Communications Management, the module of Security center that enables SIP-based communications between operators and intercom devices, has also been enhanced to offer support for cloud-based deployment. Security Center 5.10 introduces a new, no-code solution to connect external data sources Security Center 5.10 introduces a new, no-code solution to connect external data sources to enhance an operator’s situational awareness. The new Record Fusion Service feature offers a simple, fast path to integrate third-party data streams from private or partner record publishers, such as traffic, utilities, or weather feeds to name only a few. Users can define tailored record types and consume data from a variety of sources including KML, JSON, and CSV documents, or set up a REST application listening point to which these external services can push records. Providing contextual information The Genetec Record Fusion Service can be used across the entire unified platform to enhance awareness and response, provide contextual information on dynamic maps, be visualized in operational dashboards, investigative reports, or in the unified monitoring interface. The service supports a broad range of applications, from displaying user-defined and filtered information on a map with custom graphical elements, to combining various records from a wide variety of sources to create custom aggregate records that are useful to specific operators or roles. The Record Fusion Service increases agility, enables highly specific and relevant data to be quickly and easily added to the platform, and makes security operators more efficient in accessing timely, contextual information. Security Center 5.10 further taps mobile devices to reinvent the way organizations accomplish routine tasks on-the-go. Standard operating procedures A new specialized portal is also available to help customers manage mustering during evacuations Genetec Mobile, a unified app that enables users to access cameras, doors, and automatic license plate recognition (ALPR) units from their smartphones, now supports Genetec Mission Control™ incidents and standard operating procedures. This allows users to trigger or view active incidents on maps or in list format, and record incidents in the field to notify colleagues in the operation center. A new specialized portal is also available to help customers manage mustering during evacuations. The Evacuation Assistant app connects to Security center Synergis™—the access control system in the Security center—so that when an evacuation is triggered, the system automatically starts to monitor the safety status of all personnel and visitors. When people arrive at the safety area or muster point, they can badge their credentials at a fixed or mobile reader, notify the muster captain that they’re safe, or inform them that someone might be at risk. If someone is shown not to have been evacuated, the system will automatically trigger a response so that security personnel can take immediate action.
Global security manufacturer, Gallagher, is excited to release their latest certified high security solution to market. The Gallagher UK CPNI CAPSS high security system features compliances to the Cyber Assurance for Physical Security Systems (CAPSS) standard, and the Center for the Protection of National Infrastructure (CPNI) Readers and Tokens standards. This latest approval demonstrates Gallagher’s significant investment in delivering high security solutions for governments in the five eyes alliance. Cyber security requirements Passing the CAPSS evaluation provides UK critical national infrastructure sites confidence that Gallagher’s software and hardware meets the toughest cyber security requirements. The CPNI readers and tokens standards ensure physical access control readers and credentials are robust against both cyber and physical attacks. “With cyber threats growing in sophistication, cyber protection has never been more vital,” says Richard Huison, Regional Manager UK and Europe, for Gallagher. “Cyber security is an integral part of Gallagher’s physical security solutions. We’re pleased with the result from our CAPSS evaluation – it demonstrates our commitment to providing security solutions which offer the highest level of protection.” CPNI protects national security in the United Kingdom by helping reduce vulnerability to terrorism and other threats in national infrastructure. Gallagher’s range of compliant solutions can be found under the CPNI catalog of security equipment. Gallagher’s UK CPNI CAPSS High Security System is now available.
Following the outbreak of COVID-19 and the pandemic everyone is living through, the uptake in touchless access control which was previously gaining in popularity has been accelerated driving digital transformation across many industries and technologies. Among these is the rapid growth of mobile and cloud-based systems that make access control a simple and secure solution for businesses to manage keys, users, and doors across multiple locations, simply and conveniently. SALTO Systems, which has been delivering state-of-the-art wire-free and keyless electronic access control solutions since 2001, is acknowledged as a pioneer in the manufacture of these electronic access control solutions. Access control products But with that convenience can come risk and security vulnerabilities for the unwary which is why it’s important to consider that as access control products – both hardware and software - become increasingly attached to networks and other smart systems via the Internet of Things (IoT) cybersecurity needs to be front and center if it is not to provide a pathway for cyber criminals and hackers. Smart devices commonly use wireless transmission of information often referred to as OTA to deliver software Smart devices commonly use wireless transmission of information often referred to as over-the-air (OTA) to deliver software, firmware, or configuration updates. This can include the use and configuration of security devices for use on networks using NFC, BLE, and RFID. To avoid security breaches and unauthorized attempts to access or unlock data, manufacturers should encrypt and authenticate OTA data and updates and deliver them to end-users via a secure protocol. Secure opening procedure When it comes to mobile technology and the use of ‘virtual’ keys sent to smartphones, one way to do this is to use AES 128 bit encryption which helps prevent skimming, eavesdropping, and replay attacks and a secure opening procedure with the key received securely encrypted using SSL. Another is to ensure products are certified to BSI Enhanced Level IoT Kitemark™ standard which demonstrates that a connected product has a higher level of security controls in place than the market standard for its type and is generally suitable for higher value or risk applications. Assessment to this level involves BSI’s most in-depth and exacting testing and analysis. SALTO has always applied the highest security standards to both its hardware and software products which is why its access control solution was among the first from any major security manufacturer to hold both ‘Secured by Design ‘accreditation and IoT Enhanced Kitemark™ status. Eliminating security flaws Its XS4 electronic escutcheon family, as well as its associated gateways, controllers and wall readers, are all Enhanced Level IoT Kitemark™ approved under the scheme as is the NEO electronic cylinder family and its tough new NEOxx electronic padlock product. Some manufacturers do not invest enough in eliminating potential security flaws from their systems" SALTO Systems Limited MD, Ramesh Gurdev says: “New security challenges will confront us as technologies accelerate and it’s important to stay ahead of the curve. Some manufacturers do not invest enough in eliminating potential security flaws from their systems, and this can be common in many entry level access products imported from Asia and elsewhere. At SALTO we’re driven by continuous improvement and committed to developing the most technologically advanced and flexible electronic locking solutions for any kind of door and user need.” Access control technology “Now we are synonymous with innovative solutions that set new standards in security, manageability, flexibility, and design that bring real-world benefits and this continues to set us apart. More recently, SALTO’s technological expertise has brought us to a leading position in both cloud-based access control technology and mobile access solutions.” “We’re proud that our NEO cylinder family now holds both ‘Secured by Design’ accreditation and Enhanced Level IoT Kitemark™ status as both are increasingly important in the specification of access control systems. Such awards mean we exceed the market standard for a number of security products across our access range which provides SALTO customers with the confidence that they are using some of the most technologically advanced and secure products available on the market today.”
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
Fingerprint identification had once been the most widespread biometric technology around the world. However, many argue that this technology has quite a lot of shortcomings. For instance, even expensive fingerprint reading scanners have a hard time identifying dirty or wet fingers, plus, some people's fingerprints are unreadable. Furthermore, being vulnerable to the temperature and precipitation, such scanners consequently cannot be used outdoors. Plus, fingerprint reading scanners do not meet today’s demand for contactless biometric technology. According to a new comprehensive report 'Global Contactless Biometrics Technology Market 2020-2026', "the Global Contactless Biometrics Technology Market size is expected to reach $18.6 billion by 2026, rising at a market growth of 19.1% CAGR during the forecast period. The development and acceptance of contactless biometric technologies have been driven by demand for faster and easier authentication processes and boosted by demand generated by the COVID-19 pandemic." Thus, it is contactless biometric recognition technologies that meet the latest requirements. Too expensive? Until quite recently, face recognition technology was too expensive and poorly scalable. Nevertheless, a lot of factors have changed in recent years. To start with, facial biometric technologies have become more accessible for a large audience. Being affordable, reliable, and easy to use, facial recognition systems provide a high level of security. Furthermore, the facial recognition system allows you to instantly notify about facial identification cases.The market of biometric technology is continuously growing It is also important to emphasize that the system itself automatically updates biometric data. Photos in biometric profiles can be updated directly from the video stream. The data is stored in long-term storage and does not take up much memory. The reasons mentioned above provide all business fields with a competitive advantage. Since the market of biometric technology is continuously growing, contactless identification will be highly demanded in the long run. Impact of COVID-19 Plus, the contactless facial recognition system is especially relevant today due to the COVID-19 pandemic. Now wearing a mask is required almost in all public places. That is why those systems aimed at people's safety monitoring had to promptly develop their solutions according to the new requirements. Developers of facial biometric solutions have encountered an issue of face detection in masks. It was essential to adapt the software to such changes, more specifically update the face recognition algorithm. It may be illustrated by the case of RecFaces company. RecFaces developers have updated the facial biometric algorithm to ensure the most accurate recognition of people in masks that cover almost 50% of a person's face. Nonetheless, if the company forbids entering its territory without a mask, the system sends notifications (push or SMS notifications) to control people coming through the checkpoint with and without masks. The algorithm update has boosted face recognition accuracy and speed. Global transformation As a matter of fact, facial recognition algorithm has evolved around the world. According to the tests conducted by the National Institute of Standards and Technology (NIST), the top face identification algorithm of 2020 has an error rate of 0.08% compared to 4.1% for the best algorithm in 2014. Such improvements will reduce risks linked to misidentification, and expand the advantages that can come from proper use in the long run.Al and deep learning are key elements of the latest-generation algorithms According to the National Institute of Standards and Technology report recognition errors were caused mainly by image quality variations like pose, illumination and expression. In 2018 the software was at least 20 times more accurate than it was in 2014 and in 2019 finding “close to perfect” performance by high-performing algorithms. Such improvement has resulted from the integration or replacement of previous approaches with those based on deep convolutional neural networks, operating even with poor quality images. Artificial Intelligence (Al) and, more specifically, deep learning are key elements of the latest-generation algorithms. Facial recognition is reaching that of automated fingerprint comparison, which has been considered as the gold standard for identification for a long time. Therefore, there is no doubt that innovation drives the development of solutions, and biometric technologies also move with the times. The shift from fingerprints to facial recognition is a vivid example of such evolution!
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Merrion Vaults, an Ireland-based provider of safe deposit boxes, has selected biometric identity verification technology from Iris ID. Merrion Vaults rents safe deposit boxes, like those found at banks, but with a significant difference, customer identities are authenticated through highly accurate iris readers, in order to enhance security. Private safe deposit boxes Merrion Vaults operates private safe deposit boxes in Glasgow and Edinburgh, in Scotland, Nottingham, Liverpool and Newcastle, in England and Dublin, in Ireland. Seamus Fahy, Director, Merrion Vaults, said the iris readers are replacing fingerprint recognition systems for authenticating customer identity. Fahy believes the choice of contactless iris readers was well timed, with the ongoing COVID-19 pandemic. Seamus Fahy stated, “The initial customer reaction to the Iris ID readers has been excellent. The customers love it.” Fingerprint readers It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch" He adds, “It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch. The entire process takes a few seconds to complete. Using the fingerprint reader, customers would forget which finger they registered with or would press too hard or too lightly on the reader. If they couldn’t get access, we’d have to check their names and passwords, and then re-register them. It was a hassle.” According to Fahy, the Iris ID readers are part of a tight security plan that includes video surveillance, access control, turnstiles, intrusion alarms and panic buttons, as well as seismic and water sensors. Employees monitor cameras at each facility and in a system-wide control room in Dublin, Ireland. Iris recognition system Mohammed Murad, Vice President of Iris ID feels the iris recognition system allows rapid and highly accurate authentication of Merrion Vaults customers, due to each person’s unique iris patterns. Mohammed Murad said, “The accuracy, speed and convenience of the Iris ID system are critical for a business that identifies its customers using biometrics. Our system also provides another critical layer of security, ensuring only Merrion customers gain access to the vault. No two people, including identical twins, have the same iris patterns.” Iris iCAM7S system readers The Iris iCAM7S system readers provide a mirror interface with color-alignment indicators guiding customers through the authentication process while capturing iris images at distances of up to 15 inches. Fahy adds that many banks in the United Kingdom are discontinuing safe deposit box service, creating an opportunity for private vendors to fill the gap. Merrion Vaults plans to open new facilities in Belfast, Northern Ireland, Reading and Bristol, England and Barcelona, Spain in 2021. Longer-term plans include locations in cities across the U.S. Merrion Vaults partners with Aditech, which uses dial-in capabilities to remotely configure and set up the system and test it with Merrion Vault’s IT department.
Suprema, a global company in biometrics and access control solutions, announced that it supplied BioSign 4.0, its under-display fingerprint recognition algorithm to the Samsung Galaxy S21 smartphones with support from Qualcomm Technologies, Inc. BioSign, Suprema’s smartphone fingerprint recognition technology, has gained global recognition since its installation on Samsung Galaxy J5 models in 2017. Since then, Suprema has been supplying BioSign solutions to other Samsung smartphone models including Samsung Galaxy S10, Galaxy Note10, Galaxy 20, and Galaxy Note 20 series. Fingerprint recognition speed BioSign 4.0, installed in the Galaxy S21, has been receiving great reviews for its fingerprint recognition speed. BioSign 4.0 delivered enhanced speed and accuracy compared to its predecessor, BioSign 3.0, significantly upgrading user convenience with 50 percent faster and more than twice as accurate recognition performance. BioSign 4.0 employs deep-learning mechanisms to optimize fingerprint analysis to efficiently recognize rich fingerprint information obtained from the larger sensing area of the second-generation Qualcomm® 3D Sonic Sensor Gen 2 installed in the Galaxy S21 series. Qualcomm 3D Sonic Sensor Gen 2 Qualcomm Technologies unveiled the high-performance ultrasonic sensor, the Qualcomm 3D Sonic Sensor Gen 2 that was supplied to Samsung Galaxy S21 series, in January at CES 2021. With a 77%-larger fingerprint sensing area than the previous generation, the Qualcomm 3D Sonic Sensor Gen 2, was able to significantly improve fingerprint recognition performance. The ultrasonic sensor has ultra-thin form factors and is optically isolated from the display panel allowing for sleek smartphone designs. Performance and user convenience “Suprema's fingerprint recognition technology has been continuously selected for the Samsung Galaxy S series, proving to the world the technological superiority of our solution,” said Brian Song, the president of Suprema Inc. “With the excellent reviews BioSign 4.0 has been receiving for its overpowering performance and user convenience, we expect to be able to grow sales and market share. Suprema will continue to advance our fingerprint and face recognition technologies using AI and deep learning, leading the biometrics market into the future,” Song remarked.
Sovereign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-the-art biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a globally recognized company in any high security facility services, anywhere in the world. Enhanced security No high street bank or any safe deposit center can match Sovereign’s credentials and the extraordinary security levels that they have achieved. People across the country have been targeted for their valuables, not only on the streets, but also in their homes. Challenges were to offer a complete peace of mind by delivering the highest-level of security and access permission through various levels of security check (e.g. Card and Biometric Palm Vein Reader). Matrix Access Control solution Matrix Access Control solution is designed to address security concerns in a professional and systematic method Matrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH Series, and ARC DC100P. Matrix Access Control solution helps in enhancing security, along with barriers and door controllers. Matrix Access Control solution is designed to address security concerns in a professional and systematic method, without compromising on hospitality and productivity. It allows enrolling visitor’s Fingerprint/Palm Vein Reader/RFID Card, in order to provide the visitor with access to restricted areas, as per the below criteria: 2-Person rule: This is enforced by requiring the presence of at least two authorized persons Route based access: This allows user to access the authorized route only Anti-pass back: This restricts to enter a secured area second time without first leaving it Result: Peace of mind Seamless experience Increase productivity of staff Quick actions on exceptions Multi-layer authentication Boost customer satisfaction Matrix products offered include: COSEC VEGA CAX integrated with turnstile COSEC PVR DOOR CONTROLLER COSEC PANEL LITE COSEC PATH Series COSEC ARC DC100P
The Tatua Co-operative Dairy Company manufactures markets and sells specialized dairy ingredients and food products, 90% of which are exported around the world. Tatua’s security system was recently upgraded to ensure world-class access control and boundary security that enhanced Tatua’s globally recognized food safety and quality program. This upgrade has provided additional assurances for customers who purchase the company’s food and ingredient products. Layered security solution At its manufacturing site at Tatuanui, near Morrinsville in New Zealand’s dairying region, Tatua invested in a layered security solution, protecting the site from the outside in. The Gallagher monitored pulse fence acts to deter and defend against would-be intruders. Inside the facility, a range of access control products are used to ensure people entering the facility are who they should be, and have current Health & Safety site induction competencies. This allows them authorization to work on-site and, if required, in specific production areas. Tatua operates 24/7 and has 370 employees, over 1300 inducted contractors, and numerous trucks and milk tankers accessing the site daily. It is crucial the access control system can perform several functions to ensure the site is safe and secure. Integrated security The Gallagher system can integrate with multiple security products from CCTV to biometric readers Integration was a key factor when choosing a Gallagher system. Projects Engineer, Grant Webb, said, “We have multiple areas which need specific security requirements. As the Gallagher system can integrate with multiple security products ranging from CCTV to biometric readers, it ensures the right people have the right access to specific areas on site.” Fingerprint recognition Morpho fingerprint readers provide primary access onto the site and into buildings. As there are so many people on-site, and because contractors can change on a regular basis, fingerprint readers eliminate the need for access cards, which saves both time and money. It also reduces the need for anyone entering production areas to carry an access card, which is a potential source of product contamination. License plate recognition Milestone License Plate Recognition (LPR) is used at the three entrance gates to the tanker bay. Details of the tankers delivering milk and chemicals to the site are loaded into the CCTV system interface. This links to the Gallagher Command Center, so when a tanker arrives at a gate, the LPR system identifies the pre-registered license plate. This feeds back to Command Center and grants access to approved vehicles. “There are over 60 tankers registered, that previously had key fobs that would go missing with no record of who held the fob,” says Webb. “LPR makes the delivery of milk and chemicals more efficient and has eliminated the need for swipe card readers and mounting posts that would traditionally be required to gain entry to this area.” Command center The milk testing system in the tanker bay has been integrated into Command Center. The hoses in the bay are always locked. When a tanker arrives, the driver first completes an inhibitory substance test on a load of milk. If the milk test is clear, the Gallagher system releases the locks on the milk inlet hoses via integration with the site’s supervisory control and data acquisition (SCADA) system, programmable logic controller (PLC), and milk testing system. If the test is positive, an external alarm is raised within the SCADA system, and the hoses remain locked so milk can’t be delivered. This mitigates milk contamination and improves product safety. PLC system integration The integration with the PLC system has allowed the Command Center lockdown feature to be enabled within the tanker bay Further integration with the site PLC system has allowed the Command Center lockdown feature to be enabled within the tanker bay. So, when clean-in-place (CIP) cleaning is active, the area is automatically placed into lockdown. This excludes trucks and personnel from entering the area when dangerous chemicals and hot water are being used. Window button integration Forklift entry into warehouses is access controlled via Nedap Window Button integration with Command Center. The Nedap system provides a long-range vehicle identification tag for secure vehicle access to major airlocks into manufacturing plants, where forklifts deliver raw goods and ingredients. This system ensures that only authorized forklift drivers can open the airlock. The doors on either side of the airlocks are controlled via interlock door rules created in Command Center. The interlock rules only allow one door to be open at a time, thereby maintaining the integrity of the hygiene zone of the manufacturing plant. Both of these systems help mitigate product safety risks on site. Simplifying security processes Department employees also find the personal data fields important for recording health and safety qualifications, such as working at heights. When a contractor arrives, staff can check the contractor has the right qualifications to work in the area they are entering. Contractor management When the site induction competency is due to expire, the contractor receives an SMS notification. Their supervisor will also receive an email. Another feature of the Gallagher system that Tatua uses is the reporting function. This is used as part of the company’s ongoing contractor management. The use of a QR code for preregistered visits and visitor passes makes the sign in and sign out process very quick and simple A separate report is sent to each company with an inducted employee, to advise contractor managers/ supervisors on the induction status of their employees, which are emailed out on a monthly basis. This ensures the contracting companies have people with authorized access to the site and allows them to schedule their own re-inductions when required. Reporting is also used to check activity at the monitored pulse fence. Visitor management A visitor management kiosk is located at the main reception for all visitor registrations. It requires all visitors to read and accept Tatua’s terms and conditions of entry, including Health and Safety rules before a visitor pass is issued. Once signed in, the Tatua host receives an automatic SMS and email notification of their visitor’s arrival. “The use of a QR code for preregistered visits and visitor passes makes the sign in and sign out process very quick and simple,” says Webb. Multiple levels of security Webb concludes, “Our security solution from Gallagher offers so much more than access control. Integration is key to ensuring we add multiple levels of security in areas such as delivery and dispatch, milk collection, and more. This ensures the site runs smoothly, minimizing health and safety risks to employees and contractors, and maintaining quality and product safety standards.”
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorized and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorized to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorized fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilize the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorized entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
Boutique office company, Office Space in Town, has selected Opem Security to install SALTO Systems to provide access control for its newest serviced office development in London, Blackfriars. The company offers businesses and individuals flexible workspace solutions, providing serviced offices, co-working space, meeting rooms and virtual offices in London, Cardiff, Northampton, and Edinburgh. designed meeting rooms Affectionately named the ‘Happiness’ building, this vibrant and quirky, new serviced office development is located in Tudor Street in the heart of London’s prestigious Midtown district. The building has undergone an extensive £8.5 million refurbishment that has transformed it into affordable uniquely themed, high-spec luxury offices intended to help boost productivity and wellness in a professional, HQ quality standard office – created for those who appreciate style with a twist. The building now incorporates over 475 workstations split over five floors The building now incorporates over 475 workstations split over five floors, each with its own individual color treatment. The building also boasts nine individually designed meeting rooms – each based upon the theme of ‘what makes you happy’ ranging from a quirky hot air balloon designed room, through to an aquatic haven, deep down ‘under the sea’. Controlled air conditioning It is also the first building in the UK to feature Clear View Dynamic Glass - intelligent, electrochromic windows that automatically tint to maximize natural light and reduce heat and glare. The building also boasts the most-up to date technology, enabling it to achieve a Wired Score rating of Platinum, high standard soundproofing and individually controlled air conditioning, to support clients’ growth and business needs. Sara Chegwidden, Chief Operating Officer (COO) for Opem Security says “Right from the start of this project, the client wanted to incorporate the latest technology into the development. This meant that security for the building also had to be top notch, and that the access control system chosen had to be a technologically modern locking solution that would satisfy the needs of both the business and its users.” Integrated electronic locking SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution “It had to be wire free with no cabling requited for network points etc alongside the requirement to be able to grant access rights instantly and revoke them in real-time if and when required. An audit-trail overview of who accessed which door at which time together with easy installation completed the requirements. So, after a site survey and listening to how the customer wanted to operate and manage the building we recommended SALTO as the best product to fit the brief.” SALTO’s SPACE Smart access control technology platform is a fully integrated electronic locking and software solution that bring seamless access to every door in any building in an efficient, safe and secure accessible way. Building operating requirements It’s tailored to the customer’s needs and building operating requirements and designed to give users ultimate freedom of choice regarding system layout, type and number of access points as well as level of security. It enables users to incorporate the functionalities they need now, and upgrade accordingly as and when their needs grow. Security risks related to lost keys are completely eliminated and system operators can manage every door and user access plan from powerful web-based management software. Both staff and customers can open doors with convenient and flexible credentials; smart key card or by smart phone if required. There are no costs from lock replacement caused by lost keys, which saves valuable time and resources across the organization. Operating smart cards Controlling access plays an important role in the security of any building The new security system is now installed, with a total of 88 doors across a mix of communal doors, offices, meeting rooms and exit doors secured by XS4 original narrow body smart handle sets and SALTO wall readers. Controlling access plays an important role in the security of any building and SALTO’s Innovative, wire-free technology allows stand-alone electronic locks to read, receive and write information via their operating smart cards. And, if the client chooses, they can also incorporate the use of JustIN Mobile technology making it easy and secure to incorporate smart phones as a part of their access control solution. Access control solution Office Space in Town’s Developments Director, Simon Eastlake, comments, “From initial investigation through to building wide deployment, Opem Security have provided an excellent service. SALTO now provides us with a robust future proof access control solution that allows for the integration for third party systems as well as wireless doors and mobile tech as we wish.” Jason Pelham, Founder and Chief Executive Officer (CEO) for Opem Security concludes “The combination of the SALTO SPACE platform together with competent engineers and clarity of direction from such a professional client ensured this project was a pleasure to work on. The installation was straightforward and this ensured we delivered the project on time and fully met Office Space in Town’s security expectations.”
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
Monitoring Traffic Flow: Everywhere, All The TimeDownload
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload