Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combi...
Keyfactor, a provider of secure digital identity management solutions, announces the launch of Keyfactor Control 6. This newest release of the company’s flagship, end-to-end secure identity platform addresses scalability in connected device security. Keyfactor Control secures, authenticates and future-proofs IoT identity at every step of the device lifecycle, providing a scalable IoT security solution. “The threat landscape is changing – trends like IoMT are creating new secur...
IdenTrust, (part of HID Global), the provider of digital certificates, and Device Authority, a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT), announces a strategic alliance with a vision to provide trusted identity lifecycle management for enterprises on their digital transformation journey. Device certificates have traditionally been used to secure routers, firewalls, servers, and other devices capable of securely handling private keys and implementing...
Morse Watchmans, the global provider of key control and asset management systems, is introducing KeyWatcher Fleet this week at ISC West 2019 (booth #11109) in Las Vegas. “We are continually focused on developing key control solutions that go beyond securing keys to help users improve business operations,” said Fernando Pires, CEO, Morse Watchmans. “That was our charter when we engineered KeyWatcher Fleet. As fleet professionals know, when you control the keys, you control the...
At ISC West 2019 this week in Las Vegas, Morse Watchmans (booth #11109) is showcasing its AssetWatcher and KeyWatcher Touch key and asset management solutions that protect important keys and physical assets, resulting in reduced downtime, fewer losses, and improved accountability. On display alongside AssetWatcher and KeyWatcher is Morse Watchmans’ latest introduction, KeyWatcher Fleet – the first key management platform designed from the ground up with Fleet Managers in mind. &ldq...
At ISC West 2019, ASSA ABLOY will highlight its commitment to helping security professionals stay ahead of industry trends and innovation for their clients. ASSA ABLOY’s Booth (#8061) will feature cutting-edge solutions that help security professionals across industries navigate what’s next in access control. “At ASSA ABLOY, we’re focused on helping our customers prepare for the future so they can build a safer, smarter and more seamless business,” said Peter Boris...
Supra, a renowned global provider of mobile credentialing and entry management systems, has introduced the TRAC-Guard padlock for authorized, secure access to virtually any remote site. Ideal for installations in telecom or utility stations, storage units or other locking points, this Bluetooth-enabled padlock adds convenience and security in place of traditional mechanical or combination locks. TRAC-Guard Padlock The versatile TRAC-Guard padlock comes ready for use and fits seamlessly into Supra’s TRACcess Manager system to enable mobile access The versatile TRAC-Guard padlock comes ready for use and fits seamlessly into Supra’s TRACcess Manager system to enable mobile access, real-time communications and 24/7 cloud-based management. The padlock allows access to authorized users, giving operators visibility into remote site activity. “The TRAC-Guard padlock transforms remote operations, delivering online capabilities in remote and offline locations,” said Fayyad Sbaihat, president, Supra. “Having visibility to site activity with real-time control lets operations managers increase workforce efficiency, reduce travel, monitor vendor visits and more.” Authorized And Tracked Access Control The padlock enhances security via authorized and tracked access – unlike mechanical keys that can be lost or stolen or combination codes that can be shared. TRAC-Guard padlock operations are protected with layers of security such as individually authorized keys that routinely expire; required individual PIN codes; user permission for each locking point; and encrypted system communications. “This mobile padlock solution is based on proven mobile-credentialing technology,” said Sbaihat. “Supra key credentialing is deployed across an installed base of more than 3 million Bluetooth-enabled locking devices in multiple industries. This platform, combined with 20 years of mobile credentialing experience, delivers an industry-leading solution.” Cloud-Based TRACcess Manager Cloud-based, 24/7 TRACcess Manager administration provides a view to access activity from the portal Cloud-based, 24/7 TRACcess Manager administration provides a view to access activity from the portal, or email alerts or routine reports, to monitor job status, confirm vendor maintenance visits and check the electronic logbook. Setting up mobile keys is quick and easy with permissions delivered in real time to the TRACcess eKEY app. This eliminates the need for staff travel solely for opening gates or doors or providing access to assets such as heavy machinery. Bluetooth communications between the mobile key and the lock enable operations even in areas lacking cellular coverage. Based in the USA, Supra offers access control, key access, storage devices, ATM solution, and wireless security solutions for real estate, banks, property management, fire departments, automotive, and industrial sectors.
ASSA ABLOY Door Hardware & Access Control is proud to announce that it will be exhibiting at the first ever The Security Event 2019, showcasing its latest security and integrated access control technology solutions. Taking place at the NEC in Birmingham from 9-11 April 2019, the show is a major new exhibition for the commercial and residential security market and is set to welcome more than 6,000 visitors. ARX Security System ASSA ABLOY Door Hardware & Access Control will be available on stand SE172, alongside Abloy and HKC, highlighting how efficient and easy to install its innovative access control solutions are for security installers. Products that will be exhibited on the stand include eCLIQ, CLIQ Go, SMARTair and Aperio, as well as its extensive electromechanical offering and the ARX access control and alarm system. eCLIQ Electronic Key ManagementeCLIQ is a fully electronic key management system that delivers flexible and secure master key management to businesses, solving key control concerns eCLIQ is a fully electronic key management system that delivers flexible and secure master key management to businesses, solving key control concerns. The compact eCLIQ locking cylinder offers the highest levels of security. With the widest range of different cylinder types, the system is designed for every kind of use, from the company entrance gate to securing alarm systems, lifts, doors and cabinets. eCLIQ also helps solve the issue of lost keys, with users able to update access authorizations when required. It is easy to install too, with no drilling required, and offers a maintenance-free solution for up to 200,000 cycles. As such, eCLIQ is the only master key system a building will ever need. CLIQ Go Electronic Locking System CLIQ Go is a fully electronic locking system based on the highly successful and efficient CLIQ technology. The CLIQ Go app provides a high level of security and data protection and enables control over building security from a mobile device. The flexibility of key management is unrivalled when it comes to master keying for building security. CLIQ Go provides both security installers and business owners with the capability to manage access control on the go, achieved via a quick installation that requires no witting at the door. Operators can also easily revoke access rights via the CLIQ Go app, miniziming the risk of lost keys. SMARTair is a wireless online or offline fully scalable access control system that keeps users in touch with everything that’s happening in a building – who enters, where and when – ensuring complete control of site security. The new mobile app Openow will be presented at The Security Event too, which becomes a smartphone’s secure virtual credential. Aperio Integrated Access Control Solution Aperio enables mechanical locks to be wirelessly linked to an access control system in a convenient and cost-effective way Aperio enables mechanical locks to be wirelessly linked to an access control system in a convenient and cost-effective way. With products meeting BS EN 179 and BS EN 1125 standards, Aperio can help schools, universities and commercial environments cut energy costs, reduce time money spent on maintenance, and help deliver a flexible access control solution that can be easily adapted and updated when needed. Part of the Aperio range, the new H100 door handle will also be on display. Packing the power and flexibility of wireless access control into one slim, cleverly designed door handle, the Aperio H100 offers easy retrofitting to almost any interior door. It integrates with all the existing Aperio integrations seamlessly and can work within an online access control system or offline as a standalone device. ARX Access control And Alarm System ARX is a security platform with integrated alarm and access control capability, covering everything from fully monitored high security hard wired access control doors to wireless Aperio doors, in both on and offline configuration. The technology supports MIFARE DESFire EV2 and HID SEOS, providing the most secure credential formats available, while being a future-proof system too – BLE Pando Reader provides the ability to use a smartphone as a credential. Fully-Monitored Door Security ARX creates a fully-monitored door environment, including electromechanical locks utilising ASSA ABLOY Hi-O technology Designed to easily integrate into third party security systems, and other ASSA ABLOY systems such as CLIQ and Traka, ARX offers an advanced graded alarm system, allowing deployment of dynamic lockdown with mobile notification to the ARX Go app. ARX creates a fully-monitored door environment, including electromechanical locks utilising ASSA ABLOY Hi-O technology. David Hodgkiss, Director of Access Control for ASSA ABLOY Door Hardware & Access Control, said: “We are delighted to be exhibiting at the first ever Security Event 2019 at the NEC in Birmingham, which will launch a new platform for showcasing the latest technologies and solutions available to security installers. As security threats become more diverse and complex, our latest solutions ensure security installers can specify a product for a customer that will overcome these challenges and deliver exceptional performance. We have a product offering that is truly unmatched, with one in every ten lock and security installations worldwide using our solutions. And with free coffee available on stand SE172 for anyone that comes and speaks to us about our access control offers, we look forward to welcoming everyone to our stand at The Security Event 2019.”
Five years ago, Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division became involved with Building Homes for Heroes (BHH), a non-profit organization that builds homes from the ground up or modifies existing homes to meet the needs of war veterans with severe wounds and disabilities. Providing Key-Free Access Through this association, Kwikset committed to supplying a full complement of locks and door hardware to outfit the mortgage-free homes the organization produces. Kwikset kicked off its participation by supplying its smart locks that provide key-free access – specifically its SmartCode Electronic Deadbolts and Lever locks - and assorted hardware for a home in St. Petersburg, Florida. “It’s an honor to be part of a program that plays a role in helping wounded veterans begin to rebuild themselves,” said Keith Brandon, Divisional Vice President, Security Marketing for Kwikset. “These brave men and women serve our country every day and often pay a very high price for doing it. To be involved in an effort to help them return home and start a new chapter gives me a sense of pride about our company’s contribution.” Smart Locks And Door Hardware Since 2014, Kwikset has provided smart locks and door hardware for close to 100 homes across the country Since 2014, Kwikset has provided smart locks and door hardware for close to 100 homes across the country. The company’s line of SmartCode Electronic Deadbolts is particularly useful for these homes, given that these smart locks, when connected to any one of the popular home automation hubs, allow the user to control a number of systems within the house, such as lighting, heating/cooling, A/V systems, even shades. This functionality is often a necessity for veterans who have suffered severe injuries and whose mobility is limited. While there are a number of worthy organizations established to help house disabled veterans, Kwikset’s choice of BHH was swayed by the scope of its work and its ambitious goals. According to Chad Gottlieb, director of Construction Development for BHH, the organization is on pace to gift its 200th home by the end of 2019 and is aiming for 500 homes by 2025. That’s a remarkable pace, given the 14 homes the organization gifted in 2014, Kwikset’s inaugural year. Securing Veterans’ Homes “We have so many wonderful companies involved in our mission to give back to these veterans for what they have sacrificed for this nation,” said Gottlieb. “Obviously, there is no way to completely repay them for the service they’ve provided. But supporters like Kwikset, who has provided us with their outstanding lock products and door hardware for five years, play a big role in allowing us to at least provide these veterans with homes in which they can be comfortable, secure, and live their lives to the fullest.”
MedixSafe, a manufacturer in the access control cabinet market, is pleased to introduce the KARE XL. The 36”H x 14”W x 9”D Key Access Ready Enclosure has an increased key storage capacity of 192 – 224, depending on the configuration. It’s an ideal solution for dealers and integrators to specify for security directors and end users of all kinds to safeguard - and track access to - sensitive keys. KARE XL connects to an existing access control system and features an HID or Multi Class reader that will read iClass, RFID and Mifare cards. Limiting Access A key override is built right into the electronic lock. It has a Wiegand output, so KARE XL can be easily connected to any access control panel. This next generation KARE offering was created in response to increasing customer demand for a KARE cabinet It gives the user control over their keys by limiting access only to authorized users and also provides an audit trail of who has accessed keys and when. This next generation KARE offering was created in response to increasing customer demand for a KARE cabinet with an even greater capacity to store critical keys. Large Clear Windows The KARE XL comes with 224 colorful key tags with large clear windows for labels. Included are 224 Key Tag Holders which can hold multiple keys or sets of keys. Each key tag snaps open, so that names and/or numbers of keys can be inserted for easy identification. "MedixSafe is committed to delivering the very best in key control to safeguard critical contents, including keys, pharmaceuticals, guns and other sensitive items that require an access control solution," says Jim Turner, President, MedixSafe. "The KARE XL can be connected to an access control system, and users can use their own existing access control cards and software to control who has access to the cabinet."
ASSA ABLOY has signed an agreement to acquire KEYper Systems, a supplier of electronic and mechanical key management systems in the US, with a strong presence in the automotive segment. KEYper was established in 1993, and operates from its HQ in Harrisburg, NC. KEYper Systems will become a separate business unit of Traka, which is a pioneer in key and asset management, and an operating unit of ASSA ABLOY Global Solutions. Ric Stone, President of KEYper will report to Justin Sasse, Managing Director of Traka. Expanding Traka’s Product Range Globally This acquisition will allow us to leverage Traka’s technology to further develop KEYper’s offering to its existing customers"“KEYper’s product range and expertise, especially in the US automotive and property management market segments, will complement Traka’s extensive product range and specialist solutions in key and asset management solutions globally. This acquisition will allow us to leverage Traka’s technology to further develop KEYper’s offering to its existing customers, and widen the product range globally for Traka in all of our market segments,” says Justin Sasse, MD of Traka. "This transaction provides us the opportunity to further strengthen our position in the industry, while advancing Traka’s strategy to increase its presence in core markets globally," says Danny Garrido, President of Traka Americas. "Traka and KEYper are an excellent strategic fit. We have highly complementary product and service offerings, strong sales and marketing organizations and a shared dedication to quality customer service - we expect this combination to result in an even more effective and successful Traka." Accelerating Product And Market Development “I am very pleased to be joining Traka and ASSA ABLOY. KEYper will be able to accelerate its product and market development and is looking forward to engaging with the wider Traka and ASSA ABLOY organization to share knowledge and expertise,” Ric Stone, CEO KEYper Systems. The acquisition is conditional upon satisfaction of customary legal conditions and is expected to complete during the first quarter of 2019.
Seagate Technology plc, a provider of data storage solutions, and IBM announces they are working together to reduce product counterfeiting using blockchain and security technologies. The project, which is designed to help manufacturers, integrators, and business partners fight counterfeit hard drives, uses the IBM Blockchain Platform to authenticate the provenance of disk drive products, bringing a new level of multi-layered security protection to the data management industry. According to the International Anti-Counterfeiting Coalition, global trade in counterfeit and pirated electronic products has reached more than $1.7 trillion in value. To verify product authenticity, Seagate will update the IBM Blockchain Platform on the IBM Cloud with product authentication data based on the Seagate Secure Electronic ID (eID) at the point of manufacture. Cryptographic Erasure Technology Seagate’s Certified Erase employs cryptographic erasure technology to produce a digital certificate of data purge Each unique identifier (serving as an electronic fingerprint) can be used to verify the identity of a hard drive at any time during its product life cycle. Seagate’s Certified Erase employs cryptographic erasure technology to produce a digital certificate of data purge, which is electronically signed by the device under the Seagate Secure public key infrastructure (PKI) and stored on the blockchain for compliance management with emerging global data privacy laws. Building upon IBM’s blockchain expertise and powered by the Linux Foundation’s Hyperledger Fabric distributed ledger framework, the IBM Blockchain Platform is designed to allow network participants to append and view blockchain data based on their level of permissioning. Throughout a product’s life, technology vendors, service providers, and end users will be able to confirm the product’s provenance on the blockchain, which provides an immutable record of events. This can help reduce data loss, fraudulent products and warranty costs, while improving product assurance for customers during deployment. Ecosystem-Wide Effort “Blockchain technology can be extremely effective in confirming provenance and authenticity of assets,” said Bruce Anderson, global managing director, electronics industry, IBM. “The ability to work with Seagate to combine blockchain with advanced cryptographic product identification technology is what sets this work apart, and signals blockchain’s potential to reimagine the electronics product life cycle management processes. Counterfeit electronic components are a global issue that requires an ecosystem-wide effort to address.” Customers can benefit from knowing that a drive is a genuine Seagate product and that any data on it can be securely erased The eID and Certified Erase capabilities are built on the Seagate Secure technology, which can enable higher levels of trust of product provenance and proof of data erasure. Customers can benefit from knowing that a drive is a genuine Seagate product and that any data on it can be securely erased which can assist customers with their efforts to adhere to international compliance standards. Global Product Counterfeiting “IBM has a proven history of technology innovation as evidenced by its market leadership in blockchain technology for product provenance in various industries,” said Mark Re, senior vice president and chief technology officer at Seagate. “By combining Seagate’s innovations in product security with IBM’s blockchain expertise, we want to prove that we can help reduce the incidence of product counterfeiting in the future.” As project development continues in this combined effort to fight global product counterfeiting, Seagate and IBM are anticipating that they will expand the business network to include participation from supply chain partners.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: Prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: How do we all, collectively, keep up? More critical is finding ways to offer or utilize new technologies and total solutions that make operations easier Ensuring Security Preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training In New Security Solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying An End Goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilizing new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing Access To Buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing Security Partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry Collaboration For A Secure Future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realized in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labor costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportunities and untapped potential of wireless locks. Allegion panellists elaborated on some of the many advantages of wireless locks, including the following: Providing More System Flexibility It’s a time of change in corporate and institutional environments. Customers are trying to manage a smaller operating budget with more people and more multi-use applications. Building applications are changing more frequently. Wireless locks can be used to convert more mechanical applications to electronic, but they are not necessarily real-time and/or monitored applications.Customers are trying to manage a smaller operating budget with more people and more multi-use applications For example, a wireless lock could be installed on a seldom-used door, such as a storage closet, to avoid the need to manage keys. The flexibility of wireless locks also would allow that same door to be transitioned to communicate with a network via WiFi, or it could be used for real-time communication in a monitored system. “It’s much more flexible if one product can do about six different things,” says Brad Aikin, Allegion’s Channel Led Business Leader, Integrator Channel. New product approaches enable intelligence to be added after the fact to existing wireless locks, thus further increasing flexibility. Designing Systems That Are Scalable “We now have products that can start from very basic applications, and then build capabilities through systems and integrations all within one device,” says Mark Jenner, Allegion Market Development Director. Offering A Useful Complement To Wired Systems Once you understand how to deploy the wireless technology, the efficiencies of it from a labor perspective are pretty amazing” Wireless is not a “silver bullet” – not for every application, says Aikin. “I think it is an incremental opportunity,” he says, and more likely to drive conversion of existing mechanical locks than to transition wired electronic systems. “You’re just looking to get a more efficient credential, and to get rid of that master key system, or to dramatically shrink it down,” he adds. “Wireless is an example of how the integrator can do more, not just differently, but have more conversations and help their end users. They are not things the end-users are going to ask for inherently; these are latent needs. They are not going to bring it up.” Allegion panellists elaborated on some of the many advantages of wireless locks Less Labor Involved In Installations “Once you understand how to deploy the wireless technology, the efficiencies of it from a labor perspective are pretty amazing,” says Robert Gaulden, Allegion Project Based Business Leader, Electronic Access Control. “Integrators can deploy two additional jobs in a day because they are on and off jobs more quickly. There are huge benefits, depending on what environment you are in.” Labor is a significant cost for integrators – finding, retaining and training good employees. Any new efficiencies in terms of labor – such as the simplified installation of wireless locking systems – is a saving grace for integrators.Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment “We see a lot more adoption from our customer base once they become comfortable with how to use the wireless technology,” says Gaulden. New Opportunities For RMR There is a shift among integrators away from one-time installations and toward an recurring monthly revenue (RMR) model in which the integrator manages all aspects of the system over time for a monthly fee. Wireless systems can help to simplify that transition by lowering costs. Managing interior doors and locks can add value and incremental revenue, says Jenner. Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment. “We support that from the product perspective, but developers and software companies need to take advantage of it,” says Devin Love, Allegion Market Development Manager. “It’s an important feature for the end user, but we are still navigating through the world of wireless adoption.” “No one wakes up in the morning and thinks ‘I am going to buy a lock today,’” says Aikin. “We need to ensure we are having conversations about security needs, but also about how to deploy the technology to make it easier to manage and have more flexibility,” says Aikin.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and information widely available on the Internet. In this case, technology offers a solution, too. A new kind of key cannot be duplicated by 3D printing. Ironically, it is manufactured using 3D printing techniques. UrbanAlps Stealth Key A Swiss company called UrbanAlps has introduced the Stealth Key, a key that is designed and manufactured from the inside out. The mechanical elements that enable the key to uniquely open a matching lock are hidden away inside the key beneath a pair of narrow ledges, where they are not susceptible to being scanned and duplicated using 3D printing. UrbanAlps offers a range of cylinder locks and keys based on the Stealth Key concept. A high-tech padlock incorporates additional security features such as a shrouded shackle to avoid cutting, anti-drill capabilities, and resistance to lock picking. Stealth Keys are made using 3D printing and a laser to fuse together successive layers of metallic powder added in a manufacturing process called "successive layer melting." Manufactured from the inside out, complex internal features are "printed" and then covered over later with a solid layer that shields the complex inner workings from being duplicated. Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities. It is less expensive than other technologies designed to shore up the security vulnerabilities of 3D printing, such as keys that combine both mechanical and electronic components. The company’s website touts “simple and affordable key copy protection.” Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities 3D Printing Challenge Locks and keys are among the oldest security technologies, dating back to Egyptians and the Romans. Their value has been proven over the centuries and they continue to provide security in many applications, even in today's high-tech environment. However, 3D printing presents a challenge. 3D duplication became a high-profile problem in 2015 when 3D printable computer-aided design (CAD) files for Transportation Security Administration (TSA) master keys were published on the Internet. Those are the keys used by airport security staff to open private suitcases for inspection. The files allow the keys to be duplicated and used to successfully open TSA-approved locks. The hacking of security systems is nothing new—most electronic security systems have been hacked, or have the potential to be hacked in the future. Increasingly, security involves an ongoing one-upmanship between the good guys and the bad guys – the programmers and the hackers, the white hats and the black hats – whether the technology is computer systems or even the locks and keys that have been around for centuries.
Responsible for the safety and security of a huge number of public facilities, including leisure centers, libraries and event spaces, local authorities are increasingly looking for ways to improve security, while also streamlining the security management process. With multiple requirements from a legislative, insurance and public safety perspective, local authorities need a simple and effective solution that provides flexibility through advanced technology. Security must be closely monitored and access restricted where necessary, while at the same time enabling easy access to public areas. Electronic Key Technology Advanced software suites can provide access to all operations performed by users Through innovative electronic key technology, local authorities can simply and cost-effectively replace existing mechanical locks, with a solution that provides integrated intelligence in the key, with permissions stored within it. If your key has authorization for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by your key will be recorded. With high volumes of people entering and exiting local authority facilities, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by local authorities for audits, improvements or compliance. Utilising the latest contactless technology further enhances the electronic key solution, enabling multiple access options and deeper levels of access rights. Manage Access Operations The most innovative system is compatible with badges and cards, and the keys are equipped with a radio-frequency identification (RFID) module. Combining the solutions enables local authorities to manage access operations in great detail, with access rights granted depending on specific conditions. For example, the members of an orchestra may only be able to access the music conservatory, using their membership card or badge, if a music professor has already entered the premises using his electronic key. Permissions can be added or updated from a computer or, even more conveniently, using an app on a smartphone at any time, which will update your key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with local authority access policies and removes travel and fixed authoriser costs. Public Safety And Security Saint-Avertin's access points are now managed by the new LOCKEN solution In turn, this delivers increased flexibility and higher levels of security. With public safety and security high on the government’s agenda, local authorities are increasingly required to adopt the most technologically advanced access control solutions and LOCKEN, the leader in cable free access control solutions is on hand to help with their solution based on advanced software LOCKEN Smart Access. Equipped with LOCKEN electronic cylinders since 2010, Saint-Avertin's access points are now managed by the new LOCKEN solution. More efficient and communicative, this makes it possible to adapt to even more varied types of access. Laurent Lacour, head of the municipal police, highlighted the benefits of this decision: “It is a very positive step for us. Firstly, because the new contactless key is much faster than the previous one. It is impressive and very important for our day-to-day work: as soon as the key is entered into the lock, the cylinder opens. It opens regardless of whether any dust or foreign bodies have built up." New-Generation Keys “Above all, the MyLocken app significantly enhances the system’s security by allowing rights to be allocated anywhere and at any time.” Christophe Fort, deputy head of the police, added: “The new-generation keys offer another vital advantage for our town. The system is compatible with the use of badges and the keys are equipped with an RFID module, which acts as a badge.” While an electronic key cannot be given to every member of a sports association, it is possible to give the members a badge. This means that, eventually, several thousand people will have access to the facilities while respecting the security of the premises as a whole. Access Control Solution Combining the solutions does not stop the management system from remaining perfectly effective" “Combining the solutions does not stop the management system from remaining perfectly effective. On the one hand, because the program manages access operations in great detail. And on the other, the badge reader specific to a building is only triggered if access to the site has previously been unlocked by an electronic key belonging to a manager. For example, the members of a swimming association will only be able to access the building if a swimming pool manager is already on the premises.” The future prospects mentioned by the two police officials - installation in a new gymnasium, fitting electronic padlocks to the mobile barriers around the château, etc.- demonstrate the extent to which the solution meets the municipality's needs across the board. Saint-Avertin, is a dynamic town with a population of 15,000, which forms part of the university town of Tours, twenty times larger. LOCKEN hopes to extend its access control solution to other areas of this historic city.
Each of Denmark’s 550 individual Free Schools shares a common ethos: parents and students participate together in activities outside school hours, including weekends. It’s excellent for building a school community. Not so easy for managing security, when issuing and tracking keys becomes a 7-day task every week. The Vejle Friskole turned to SMARTair® wireless access control for a solution. Previously, key management ate up “a very long time, approximately 5 hours a week,” explains Henrik Kækel, Technical Service Officer at Vejle Friskole. Individual Access Permissions Vejle Friskole’s mechanical keys have been replaced by a SMARTair access control system Secure wireless electronic locks, already proven in schools across Europe, were the answer. Vejle Friskole’s mechanical keys have been replaced by a SMARTair® access control system. Over 80 doors and cabinets around the school are secured with SMARTair® wireless devices. Even at a historic property like Vejle Friskole, battery-powered SMARTair® devices are easy and unobtrusive to retrofit. Now approximately 250 students, teachers and parents each carry their own key fob, programmed with individual access permissions. Because the SMARTair® system portfolio has locking devices tailored to different kinds of openings, everyone at the Friskole opens the right doors and cabinets with a single fob. There’s no more need for the school to distribute separate keys for student or staff lockers, for example. Issuing Fobs “It was really bad because we had big problems with keys that were lost,” says Henrik Kækel. “There was a lot of work in key administration.” SMARTair® is easy for the school to manage. Today, Vejle Friskole staff spend around 5 minutes a week managing their access system. It's incredibly easy to figure out... it takes 1 minute to code a student" “It's incredibly easy to figure out... it takes 1 minute to code a student,” he adds. Even managing the leasing of school buildings for non-school events is simple and secure. School facilities staff issue fobs for the duration of the event, then cancel them immediately afterward – with no concerns someone may have copied a physical key. Saving Staff Time In addition to making everyday life easier and saving staff time and admin costs, SMARTair® has increased security. Using the intuitive SMARTair® software, they always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using their SMARTair® system. And it's no disaster if a credential gets lost. Henrik adds: “Then we cancel the credential and issue a new one.” Vejle Friskole’s SMARTair® system is easy, fast and cost-effective to extend to new doors, cabinets and users — at the beginning of a new school year, or any time they choose.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces that its SmartCode 888 Deadbolt Lock was chosen to become part of the new Home is Connected smart home system from D.R. Horton, Inc. The inclusion of Kwikset’s SmartCode 888 in the system was based on its value (great functionality at an entry-level price), reliability, and high degree of security. Incorporating the latest Z-Wave 500 chipset, the SmartCode 888 offers keyless entry through a convenient, easy-to-use touchpad. Kwikset’s patented Home Connect technology enables the lock to wirelessly communicate with other devices in the home through a third-party smart home controller, as well as to remotely check the door lock status, lock or unlock the door and receive notifications. Innovative Program D.R. Horton’s Home Is Connected system is included in the base price of each new home from the company’s family of brands D.R. Horton’s 'Home Is Connected' system is included in the base price of each new home from the company’s family of brands. The system includes a robust central hub by Qolsys that controls the smart home features, including a home alarm and automation platform by Alarm.com, Honeywell Home thermostat from Resideo, smart switches by Eaton Corporation, video doorbell by SkyBell and hands-free, voice-first experiences with Amazon Alexa. “We are pleased to be part of such an innovative program created by the nation’s largest volume homebuilder,” said Dave Seeman, Director of National Builder Accounts, Kwikset and Baldwin, Spectrum Brands, Inc. – Hardware & Home Improvement Division. Convenience Of Keyless Entry “We are confident that buyers of D.R. Horton homes will not only appreciate the security and convenience of keyless entry that our SmartCode 888 provides, but also the endless benefits of whole home automation. To be a part of a system that includes such well-known, reputable brands indicates to us the high level of trust D.R. Horton puts in our products.” Brad Conlon, Vice President of National Accounts for D.R. Horton, said, “We are pleased to work with Kwikset to provide this essential component to D.R. Horton’s new Home is Connected smart home system. We know our customers will appreciate the peace of mind that comes from Kwikset’s SmartCode 888 lock and the Home is Connected system overall.”
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorized smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the center console. Seamless Vehicle Sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorized, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorized users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognized, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity Approach TAP utilizes a multilayered industry-recognized security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognized cybersecurity approach.” Vehicle-Function Permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective Solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralized Management Software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorized to access) as part of their job. A lost key is easily disabled within the centralized management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic Access Management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorize subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending Electronic Key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimize the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?