Allied Universal®, a security and facility services company in North America, announces that their advanced artificial intelligence platform, HELIAUS®, is helping to keep facilities secure during the COVID-19 pandemic. HELIAUS® is an advanced artificial intelligence platform designed to improve safety and reduce risk by enhancing on-site guarding services. To support Allied Universal's customers' return to workplace initiatives, the company has enhanced the HELIAUS® technology p...
Sectigo has seen demand increase significantly for its cloud-based Certificate Manager solution as large enterprises seek better protection from service interruptions and vulnerabilities during the global pandemic. The company’s digital identity management platform is helping complex organizations apply enterprise-grade Public Key Infrastructure (PKI), automation, and no-touch authentication to quickly secure and maintain operations across dispersed organizations. “In recent months,...
With 73% of all domestic burglaries occurring through a door, it is now more important than ever that maximum-security locks are in place to offer protection from potential break-ins. Mul-T-Lock’s coveted Break Secure 3DS anti-snap cylinder has been specially designed to help locksmiths meet consumer demand for high security locks, and now it has excelled in recent tests – surpassing the British Standard Kitemark BS EN 1303:2015 test 10 times over. To achieve the highest Grade 6 in...
To meet the evolving design needs of the diverse and growing market for biometric access control solutions, the globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced the expansion its fingerprint authentication touch sensor portfolio for physical and logical access devices and applications. FPC1025 sensor access module To enable maximum flexibility in product design, the new FPC1025 sensor version from Fingerprints has a smaller footprint than the other models...
Fireblocks announces it has developed a new MPC (secure multi-party computation) algorithm that pushes digital asset transaction speeds up to 8X faster than what’s currently possible. Fireblocks’ new protocol, called ‘MPC-CMP,’ is based on and surpasses the speed of Gennaro and Goldfeder’s protocol, a current industry standard for MPC, and Lindell et al.’s protocol. Starting today, all digital asset custodians and MPC vendors can access Fireblocks’ MPC-...
Today, Allegion U.S., a provider of security products and solutions, revealed the results of a national survey that provides insight into millennials’ preferences for multifamily living and how they prioritize safety and security. The survey, ‘Home Safe Home: How Millennial Preferences Are Redefining Multifamily Living,’ highlights millennials’ habits, behaviors and tendencies when it comes to their living situation and expectations for the future, and evaluates their se...
Security industry professionals seeking the annual trend and product news updates they’ve always learned at trade shows now have a new option. From May 12 to May 14, 2020 fifteen industry renowned experts in the field of security will present their latest insights and solutions at a new online event called Virtual Security Showcase. Virtual Security Showcase The event is being presented free of charge. Attendees will benefit from the open flow of information on the latest solutions for professional security and business intelligence applications at this virtual event. Participating companies represent a range of disciplines, including access control, surveillance, analytics, edge devices, software solutions, key management, power management, and much more. Each presentation in the Virtual Security Showcase will be a 30-minute online session followed by a live Q&A session. Attendees can register for one, or all, of the sessions for no cost whatsoever.
Hank Washington, a company specializing in high-quality household products, announced a new keyless keypad door lock system. The BACKR electronic access control solution is ideal for customers interested in a high-security door lock for both indoor and outdoor applications. The recent announcement aims to provide a reliable security solution for residents and business owners throughout the US. The new BACKR keyless door lock features an easy-to-use touchscreen offering four unlock alternatives: security card, keypad access code, optical fingerprint or emergency key. The system uses US AT anti-copy security cards. This plastic card is the same size as a US driver's license and features advanced anti-copy technology that makes it virtually impossible to replicate without the owner's permission. High temperature fluctuations Owners can also enter a preset access code. To prevent unauthorized access, the system sounds the alarm and locks the keypad if the code is entered incorrectly five times in a row. The new digital security lock uses biometric sensors to allow fingerprint unlocking as well. In case of an emergency, users can also use an emergency key to access their properties. BACKR uses corrosion-resistant technology to ensure extended durability in all types of indoor and outdoor conditions To guarantee high standards of security and reliability, the keypad is wear-resistant, can withstand high temperature fluctuations, and is completely dust- and waterproof. BACKR uses corrosion-resistant technology to ensure extended durability in all types of indoor and outdoor conditions. A launch discount is currently available, as well as a spring offer applicable to all products. With the recent announcement, Hank Washington continues to expand its range of high-quality products for both commercial and residential applications. Cutting edge technology A spokesperson for the company said: "We work around the clock to find, create, manufacture, and ship you the most innovative products. This way you know you are guaranteed to have the coolest things money can buy without spending days researching on your own. Trust our team of experts to help you stay ahead of the curve and always be on the cutting edge of technology." Interested parties can find more information by visiting the company website.
Mobile device and app security pioneer Trustonic has extended its partnership with LG Electronics Mobile Communications Company, which will see Trustonic Secured Platform (TSP™) deployed on LG’s smartphones. This includes the introduction of Trusted User Interface (TUI) functionality that is vital to unlocking the next generation of strong app protection in mobile banking, mobile payments and mPOS, digital car key and mobile identity-based apps. TSP integrates Trustonic’s trusted identity and trusted execution environment (TEE) into each smartphone during manufacture, protecting them with certified, hardware-backed security throughout the device’s lifecycle. TSP has already been deployed in more than 2 billion smart devices worldwide and is being integrated through LG’s major System on Chip (SoC) platform partners to bring greater trust to more of its smartphones. LG Smartphones to arrive with protection pre-enabled Trustonic’s TEE also secures key management, digital rights management (DRM), biometrics and FIDO authentication. Trustonic’s Asset Lifecycle Protection Service (ALPS™) will be pre-enabled on LG’s smartphones to fulfil mobile operators’ device protection needs. This service is being adopted by mobile operators to protect devices throughout their lifecycle, enabling operators to offer innovative new financing packages to more customers, and curtail smartphone theft, fraud and trafficking across the supply chain. Trustonic Application Protection (TAP™) will help to enhance security levels of LG’s native apps like LG Pay and third party app developers will also benefit as they can use the SDK to build secure next-generation user experiences. TAP is the only app development platform that combines hardware-backed and software in-app protection, enabling any developer to build and deploy applications with advanced security. Value addition for mobile network operators It is delivering value to mobile network operators, consumers, app developers and the wider ecosystem" This is particularly key for payment, banking, mPOS and automotive apps. The platform also allows developers to deploy Trustonic’s TUI in their application user experiences, shielding sensitive input and display user interactions, like PIN entry, away from the potentially compromised main device operating system. Dion Price, CEO of Trustonic, says, “Trustonic and LG agree that open and collaborative app and device security can enrich the mobile user experience. This approach goes far beyond simply protecting mobile devices, apps and data. “It is delivering value to mobile network operators, consumers, app developers and the wider ecosystem. This kind of collaboration is the only way to drive trust, which is fundamental to delivering innovative and secure mobile services.” Trustonic and LG have worked together since 2013 to bring trust to devices and applications.
The technology partnership allows SALTO KS users to add an attendance feature to their cloud-based fully-wireless smart access control solution. SALTO Systems has developed an integration with time-tracking software developer FICHAJ.ES that will add a convenient feature, time and attendance, to the SALTO KS, Keys as a Service, cloud-based access control management system. Accurate time-Tracking solution “The FICHAJ.ES integration with SALTO KS lets the end-user use door access control as a check-in and check-out reader which helps to avoid expensive investments in time and attendance tablets, keypad devices, and even installing drivers on laptops for clock-in and clock-out event notification,” said Pablo Pérez de Ciriza Project Manager at Nubba Group. FICHAJ.ES is a trusted and accurate time-tracking solution that has robust features including an online time-clock application available for Android and iOS and the ability to show overtime and breaks in graphs and progress bars. It also contains an advanced system for managing work schedules and attendance, including maternity leaves and vacations. Cloud-Based access control management SALTO KS Service integrated technology partners offer advanced management SALTO KS provides flexible cloud-based access control management that requires no software installation nor the added expense of fully-wired electronic locking solutions. With cloud access control one willhave vastly better functionality and performance than is possible in a traditional mechanical locking system. Additionally, SALTO KS Service integrated technology partners offer advanced management and access control in an easy and secure way. With SALTO KS now one can manage access and time and attendance needs for one's business on-the-go. Open doors remotely, block access, view entry activity and receive activity messages on one's smartphone. All that is needed is an online device with an Internet connection. SALTO KS offers end-users better functionality and performance, reduces cost, and almost eliminates the need for maintenance. Providing valuable insights Enabling the SALTO KS and FICHAJ.ES integration delivers the following features: Track people entering and exiting through any door with SALTO electronic locks, showing detailed information on who passed through where and when. These events are logged and retrieved real-time through the FICHAJ.ES system, allowing for comprehensive monitoring. Report generation is also possible based on these events, allowing for custom reports based on a person, time & date or door activity, which provides valuable insights into the usage of the property. These reports allow for daily Time & Attendance monitoring, too, tracking attendance levels on a per-person basis or grouped by individual properties. This feature works by comparing the results from the event database and creating a timeline which shows when someone has clocked in and out, giving insight into attendance rates.
KPT-39 is a smart wireless remote keypad, offering users an easy-to-program solution to easily arm, disarm, and home arm their security system. For enhanced flexibility and convenience, KPT-39 series can integrate with RFID key fobs or NFC tags for secure quick access without entering pin codes manually. To provide additional peace of mind and safety, KPT-39 series features dual key function that can activate panic, fire, or medical emergency alarm at the touch of a button. KPT-39 keypad can be wall-mounted at any location that is the most convenient and the most accessible in users’ homes. KPT-39 is safeguarded by tamper protection. Power conservation function KPT-39 leverages Climax’s industry renowned RF technology to accelerate the speed of signal transmission and deliver reliable, extensive communication range. KPT-39 also features a power conservation function that consumes power only when in operation. Features Enables user to arm/disarm/home arm the security system by simply swiping RFID key fobs or NFC tags Integrates up to 100 RFID key fobs or NFC tags Dual key buttons to trigger panic, fire, or medical emergency alarms Stand-by mode for power saving function LED status indicators EN50131 Grade 2, Class II certified A 15-button backlit keypad for easy nighttime visibility Tamper protection against unauthorized removal Extensive RF communication range and faster signal transmission Regular supervision signals to check system integrity IP44 waterproof standard Specifications KPT-39-F1 Frequency - 868 MHz / 433 MHz Power Source - 3V, CR123 Lithium battery x 1 Battery Life - 6 years Key Fob Reader Protocol - ISO 15693 Waterproof Rating - IP44 Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 120 mm x 90 mm x 30 mm KPT-39N-F1 Frequency - 868 MHz / 433 MHz Power Source - 3V, CR123 Lithium battery x 1 Battery Life - 6 years NFC Tag Dimensions - 45 mm x 25 mm NFC Protocol - ISO 14443A Waterproof Rating - IP44 Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 120 mm x 90 mm x 30 mm Ordering Information KPT-39-F1 - Remote Keypad and RFID Key Fob KPT-39N-F1 - Remote Keypad and NFC Tag
PAC, a supplier of innovative access control solutions, has announced the comprehensive redesign of its portfolio in order to meet the rigorous demands of today’s residential, educational and commercial environments. This pioneering access control system streamlines PAC’s offering with products that combine the benefits of state-of-the-art hardware and software – delivering unrivalled levels of security, sustainability and ease of use. Networkable access controllers Key components of the new PAC portfolio are the PAC 512DC networkable access controllers, which replace the highly successful PAC 500 range. Future proof and certified to the latest industry standards, PAC 512 comprises two variants – the 512DC analog and 512DCi digital access controllers. PAC 512 offers a cost competitive solution that is easy to configure, install, maintain and use Scalable from 1-2000 doors these controllers are able to support up to 75,000 unique identification devices via Access Central – PAC’s enhanced management software. They feature two inputs and two outputs, as well as providing functionality including local anti-passback, event to action, mustering, lift call and alarm point control. By removing the need for ancillary equipment PAC 512 offers a cost competitive solution that is easy to configure, install, maintain and use. PS50 Energy Efficient Power Supply PAC is committed to developing products that enable end users to enhance their own sustainability based agendas and this is clearly demonstrated by its new PS50 Energy Efficient Power Supply. With 80 per cent efficiency at most loads, it uses far less power than PAC’s previously available power supply unit, at the same price point. The PS50 Energy Efficient Power Supply’s credentials have also been externally verified via certification to California Energy Commission (CEC) Level 6. This means that the highly energy efficiency facilitates operational savings. Access Central management software PAC’s Access Central management software replaces the company’s SecureNet solution. It can be adapted to suit every access control installation, whether a single site business or a global organization. Backwards compatible with SecureNet and available via digital download in SE and professional license editions. The SE license level delivers a level of functionality unrivalled in the market for a free distribution. It displays detailed, real time events information including alarms as they occur across a facility Access Central can be easily configured to operate on a standalone PC or across a corporate network. It displays detailed, real time events information including alarms as they occur across a facility, while also providing ease of management of any installed 512DC and 512DCi devices. Other features include Active Directory integration, which vastly reduces set-up and in-life management of keyholders when connected to an Active Directory feed. Integrated security system The PAC portfolio will be supported by a customer training program, a dedicated customer services and technical support facility, as well as a new five-year warranty for all hardware. Pete England, PAC’s global product manager, concluded, “For over 40 years PAC has pioneered developments in access control across the world and is renowned and respected for producing robust, reliable, cost effective and highly secure solutions. “This legacy continues with this new portfolio which offers unrivalled value, is feature rich, scalable, energy efficient and reduces the hardware required for an integrated security system. During our beta testing we had a unanimously positive response and I’m convinced that we have an industry game-changer in terms of next generation access control.”
Across the globe, healthcare providers and facilities from care homes to hospitals and private clinics are working around the clock to reduce the risk to their staff and reduce the spread within their facilities. There are increasing reports in the UK that the virus has devastating effects in care homes, with fears that the US will be next in tow. The impacts on healthcare staff have also been stark with absence levels growing. In some health bodies across the UK up to almost 20% of their staff are off sick. The consequences of COVID-19 are clear to see in the short term, but it may also drive the need for technology that will help mitigate against pandemics and the spread of disease in the long term. One of these technologies that offers some promise is long-range RFID. The value offered is more than just security and safety Why long-range RFID? The value offered is more than just security and safety. Implemented correctly, it not only helps minimize the dangers posed to staff and patients, but also helps improve the efficiency and workflow around the facility. Here are 5 reasons long-range access control is part of the solution: Reduce contact spread of viruses Most viruses spread through droplets inhaled from someone else’s cough or sneeze. But a common indirect way of infection is germs being passed on when people touch surfaces such as doors, pin pads and handles. This can lead to the dangerous spread within healthcare facilities as it only takes one infected person to spread the virus to those that touch the same surface. Hence, during the current times of peak capacity, the risk increases. The right long-range access control solution can help minimize the risk by reducing shared contact points. Integrating vehicle and people access Long-range RFID is gaining traction as a complete people and vehicle solution. As an ideal solution that automates vehicle access without the need for ticket stations, pin pads or manned gates, members of staff can now go from their doorstep to the room they are required in without having to touch surfaces in order to access the car park and building. All of this can be done from a card that is transferred from a special holder in your car to a land yard for centrally managed, hands-free access around the facility. Card readers providing hands-free access around the facility More efficient building workflow Time is a precious commodity for medical staff and any time that is wasted on trying to enter the building, search for a badge or entering a PIN should be limited. Once in the building, a long-range electronic ID badge allows automated access around the building without having to present a card to the reader. For more emergency situations, its also common to attach cards to push trolleys, wheelchairs and other heavy equipment to help protect staff and patient safety. Fight against theft It’s a sad circumstance that in times of crises, theft is an issue that healthcare facilities have to deal with. Amid global shortages, there have been numerous cases of masks, medical equipment and other supplies being stolen from hospitals. A modern access control solution using long range readers can help by keeping supplies locked in a dedicated room with access granted only for approved staff ID badges, whilst also restricting access in staff car parks to only approved staff members. Proactively manage the flow of staff members in your facility Access control software offers a unique insight of real-time data Access control software offers a unique insight of real-time data into key staff members and their movements within the building. This software can then compile the data collected into reports which can help reveal bottlenecks in the flow of staff members around the facility. In the case of an emergency, an access system with connections to readers and cameras, can lock/unlock certain doors, or revoke access to particular people in case their badge was stolen. Whilst we cannot accurately predict what the world will look like post COVID-19, long-range RFID technology could prove to be a powerful tool going forward. It offers solutions that go beyond just security, and helps healthcare facilities build a better future by improving workflow, manage medical equipment, protect patients, staff and visitors from infection and future pandemics.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimize the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customized access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorized entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorization to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customization ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing Key Cards And Fobs With App Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognizes which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable Access Control Systems For SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favor simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving Security Dealers And Integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalizing that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS To Measure Product Quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analyzing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realized in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labor costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportunities and untapped potential of wireless locks. Allegion panellists elaborated on some of the many advantages of wireless locks, including the following: Providing More System Flexibility It’s a time of change in corporate and institutional environments. Customers are trying to manage a smaller operating budget with more people and more multi-use applications. Building applications are changing more frequently. Wireless locks can be used to convert more mechanical applications to electronic, but they are not necessarily real-time and/or monitored applications.Customers are trying to manage a smaller operating budget with more people and more multi-use applications For example, a wireless lock could be installed on a seldom-used door, such as a storage closet, to avoid the need to manage keys. The flexibility of wireless locks also would allow that same door to be transitioned to communicate with a network via WiFi, or it could be used for real-time communication in a monitored system. “It’s much more flexible if one product can do about six different things,” says Brad Aikin, Allegion’s Channel Led Business Leader, Integrator Channel. New product approaches enable intelligence to be added after the fact to existing wireless locks, thus further increasing flexibility. Designing Systems That Are Scalable “We now have products that can start from very basic applications, and then build capabilities through systems and integrations all within one device,” says Mark Jenner, Allegion Market Development Director. Offering A Useful Complement To Wired Systems Once you understand how to deploy the wireless technology, the efficiencies of it from a labor perspective are pretty amazing” Wireless is not a “silver bullet” – not for every application, says Aikin. “I think it is an incremental opportunity,” he says, and more likely to drive conversion of existing mechanical locks than to transition wired electronic systems. “You’re just looking to get a more efficient credential, and to get rid of that master key system, or to dramatically shrink it down,” he adds. “Wireless is an example of how the integrator can do more, not just differently, but have more conversations and help their end users. They are not things the end-users are going to ask for inherently; these are latent needs. They are not going to bring it up.” Allegion panellists elaborated on some of the many advantages of wireless locks Less Labor Involved In Installations “Once you understand how to deploy the wireless technology, the efficiencies of it from a labor perspective are pretty amazing,” says Robert Gaulden, Allegion Project Based Business Leader, Electronic Access Control. “Integrators can deploy two additional jobs in a day because they are on and off jobs more quickly. There are huge benefits, depending on what environment you are in.” Labor is a significant cost for integrators – finding, retaining and training good employees. Any new efficiencies in terms of labor – such as the simplified installation of wireless locking systems – is a saving grace for integrators.Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment “We see a lot more adoption from our customer base once they become comfortable with how to use the wireless technology,” says Gaulden. New Opportunities For RMR There is a shift among integrators away from one-time installations and toward an recurring monthly revenue (RMR) model in which the integrator manages all aspects of the system over time for a monthly fee. Wireless systems can help to simplify that transition by lowering costs. Managing interior doors and locks can add value and incremental revenue, says Jenner. Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment. “We support that from the product perspective, but developers and software companies need to take advantage of it,” says Devin Love, Allegion Market Development Manager. “It’s an important feature for the end user, but we are still navigating through the world of wireless adoption.” “No one wakes up in the morning and thinks ‘I am going to buy a lock today,’” says Aikin. “We need to ensure we are having conversations about security needs, but also about how to deploy the technology to make it easier to manage and have more flexibility,” says Aikin.
Comelit has continued its work with multi award-winning London property developer, Howarth Homes to present new homeowners at office-to-residential conversion, Lovell House with smart access control and door entry. Lovell House, located off Uxbridge High Street in Middlesex is a stunning collection of 45 executive suites, one and two bedroom apartments set over six floors, each finished to a high specification. Smart access control and door entry system Each apartment has been individually planned to ensure a light and airy interior with excellent accommodation flow. Within the initial design process, Comelit was invited back to work with Howarth Homes to accommodate a request for smart security right from the point of entry to individual apartment access. Linzie Howland, Sales Director of Howarth Homes stated, “Howarth Homes is adept at creating affordable option developments interiors that demand more than just cursory attention. Every detail in each of our developments has been carefully and thoughtfully considered to ensure that our new home promises easy, hassle-free living”. SimpleKey access control solution Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets Linzie adds, “Lovell House is testament to this commitment, and commands superior specification right from access control through to door entry. We have gone above and beyond the expected to ensure homeowners can take advantage of purchasing offers and live in a development where we present smart security and visitor management without compromising aesthetics.” Lovell House has been fitted with Comelit’s SimpleKey access control solution, along with Mini video handsets in every apartment, allowing visual door entry operating through its 2-Wire SimpleBus solution. The powerful combination presents homeowners with the capability to answer access requests and manage home access. Comelit access control readers installed Each of the five floors has an access control reader installed alongside each lift facility, totaling 19 units around the site. The development itself is finished with a bespoke stainless steel panel with bezel design. All systems have been designed and installed to comply to Secured by Design standards. Tom Kidston of Excellence Electrical said, “Howarth Homes prides itself on its pledge for connected living for a connected world, so it’s essential access control and door entry is planned into the specification and design”. Residential security systems Tom added, “This is especially important at office to residential conversion works such as Lovell House, where systems need to be considered with the change of purpose to the building. Early planning ensures a coordinated approach to installation, with minimal cabling requirements to remain compliant, stylish and secure.” Daniel (Dan) Wood, Southern Sales Manager at Comelit UK said “Uxbridge is increasingly growing in demand for first time buyers and rental property, experiencing excellent capital growth. Howarth Homes has a number of developments in the area and we have been thrilled to work closely with them to deliver total solutions for access control and door entry”. Dan adds, “At Lovell House, the specification brief was to create futureproof, smart security and visual visitor management, delivered seamlessly with our SimpleBus and SimpleKey systems.”
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
Theft from stock rooms and shop floors is a persistent problem for retailers. With around €900 million lost annually to thieves in Belgium alone, upscale fashion boutique Patio sought an easy, low-cost deterrent. Code Handle locks fitted on key doors were the answer. A location on Leuven’s most exclusive shopping street did not insulate Patio from retail theft. Shoplifting is a growing problem in many European countries, and thefts had also proliferated at Patio. Thieves were using the store’s toilet to remove clothing tags. Some even went upstairs to Patio’s offices and stole valuable items. Access control system Code Handle proved an ideal solution for us to protect non-public spaces from the public" During a store renovation, manager Jeff Van den Bergh decided Patio’s offices and customer toilet needed proper security. Shoppers and visitors should not enjoy free, casual access to these sensitive rooms. However, he did not want staff wasting their time tracking physical keys when they could be helping customers. An expensive access control system was also ruled out. Door hardware had to look clean and contemporary, to meet the style-conscious standards of Patio’s interior. The store’s security contractor recommended Code Handle, which adds electronic PIN locking to doors without wires or an expensive access system. “Code Handle proved an ideal solution for us to protect non-public spaces from the public,” says Jeff Van den Bergh, Patio’s Store Manager. Door security Door security is operated by a discreet PIN-pad built into a brushed-chrome handle. Two standard batteries slot inside each Code Handle to power the digital security. These typically last for 30,000 lock/unlock cycles. "The design fits well within the store,” adds Mr Van den Bergh. Now, Patio customers still use the toilet — but not unsolicited. An employee unlocks the door for them without a key or pass. The door to Patio’s offices is closed to everyone, except staff who unlock it with a personal PIN. Code Handle comes with one Master PIN; the store manager issues up to 9 additional 4–6-digit PINs. When an employee leaves Patio, it’s simple to delete their PIN. For further information visit https://campaigns.assaabloyopeningsolutions.eu/codehandle
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorization. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to. To learn more about Code Handle, please visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle
The stakes are higher when it comes to hospital security. Patients expect and deserve privacy and safety. Yet a hospital building or complex must remain a welcoming and supportive space, around the clock. Mechanical lock and key technology may be too passive for this modern healthcare environment, but that does not mean users should abandon the familiarity of keys altogether, because not all keys are created equal. Programmable electronic key systems Programmable electronic key systems put sophisticated access control into the form of a traditional key Programmable electronic key systems put the advantages of sophisticated access control into the form of a traditional key. They reinvent the key for the 21st century, making it more flexible, more powerful and better equipped to handle the security demands of a busy place. Lost keys and departed employees are no longer a problem, because their key’s access rights can be canceled with a click. And at multiple secure points around the hospital, the familiarity of a key is welcome to a user group who are not experts — at least, not in access control technology. CLIQ locking system Keys can be as smart as any card-based credential. For example, CLIQ technology from ASSA ABLOY backs up the familiarity and ease of use of key-based locking with the flexible management and real-time security features of an intelligent electronic access system. A CLIQ locking system consists of battery-powered, programmable keys; cable-free padlocks and cylinders that are easy to retrofit to almost any standard opening; and management software that can be run locally or via a secure cloud. For users, CLIQ means carrying a single, programmable key pre-loaded to unlock all authorized openings — not just doors, but also gates, alarm boxes, cabinets and lifts. Say goodbye to huge key rings. Programmable key solution For hospital security managers, a programmable key solution enables users to create personalized access schedules — even for temporary contractors — and collect audit trails for doors or keyholders automatically. Staff travels into, out of and through the hospital based on set rules and programmed into their keys. Many hospitals find CLIQ invaluable in managing access to medicines and other controlled substances. Nursing staff using older mechanical key systems struggle to keep track of who has the right keys. Searching for that person to gain access to drugs wastes precious time. Unauthorized access to drug stores can, of course, bring serious financial and safety implications. Medicine management with key-based access control Lock electronics are powered by the battery inside every key, so the retrofit was cable-free At Queen Elizabeth Hospital, Birmingham, pharmacy managers sought a better solution adapted to nurse-accessed medicine stores. They chose a PROTEC2 CLIQ system which combines mechanical disc cylinders with battery powered, programmable CLIQ keys. Lock electronics are powered by the battery inside every key, so the retrofit was cable-free. CLIQ devices secure doors, cabinets and mobile drug trolleys within the same access system. Security and pharmacy managers can see who opened every lock whenever they want — making medicine audits and incident investigation much easier. “Programmable key solutions can really boost medicine safety in hospitals,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalized access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit. A similar system trialed at Scunthorpe Hospital found the total wasted time eliminated would equate to having an additional 24 nurses on duty across the Trust every day,” Stephan Schulz adds. Key-based access control solution Key-based access solutions are equally comfortable at scale. At University Hospital Frankfurt 1,100 eCLIQ cylinders secure doors in a new building. A fully electronic implementation of CLIQ technology, eCLIQ cylinders and keys are easy for staff to use and for hospital security managers to administer from web-based software. The CLIQ Web Manager makes it easy to program, reprogram and audit every CLIQ key, cylinder or padlock. Because the interface is accessible from anywhere with an internet connection users can manage a CLIQ system whenever and from wherever they choose. Its architecture supports multiple administrators or sites. CLIQ Web Manager The Web Manager also integrates easily with all kinds of business management software, helping users automate tedious operations and processes. They can also make the Web Manager one element within an existing access control system. The Web Manager can run in a self-hosted IT environment or completely free of local software installation with two different Software as a Service (SaaS) solutions, Shared SaaS or Dedicated SaaS with hosting just for users and maintenance schedules set by them. With either option, the security software is always up-to-date — a major benefit in healthcare, where confidentiality makes cyber-attack resistance critical.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?
Key management: Manufacturers & Suppliers
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload