Key management
Fugue, the company putting engineers in command of cloud security and compliance, announces new capabilities for bringing public cloud container resources into compliance and ensuring the continuous security of container runtime configurations. The new capabilities deliver security and compliance visibility and reporting for managed container services offered by Amazon Web Services and Microsoft Azure and turnkey support for the CIS Docker Benchmark. The new Fugue features provide continuous co...
Ensuring the safety of residents and staff in specialized housing environments has always been a priority for those in the sector. Karen Trigg of Allegion UK highlights the steps decision-makers must make to keep occupants in sheltered, extra care or supported housing safe and secure. Whether it’s adhering to fire safety or infection control guidelines, a topic that is never far from ones thoughts at the moment, there are many options that decision-makers can take to ensure maximum safety...
ASSA ABLOY announces the availability of Medeco 4 (M4), the next generation of high-security key technology from Medeco. M4 builds on more than 50 years of lock engineering innovation, offering the highest level of protection against physical attack and unauthorized key duplication. Secure cylinders “With M4, we continue the legacy of trust that Medeco has built upon our over 50 years of manufacturing high-security locks in the USA,” said Joseph Kingma, Medeco General Manager, ASS...
BlueVoyant, a cybersecurity services company, announces a strategic partnership with UK-based third-party risk management consultancy, DVV Solutions, to deliver BlueVoyant’s Cyber Risk Management (CRx) services to DVV Solutions’ global customer base. This will be delivered primarily through BlueVoyant’s Vendor Risk Management (CR3) solution, which provides risk identification, analysis and threat remediation. Through DVV Solutions, BlueVoyant will generate, triage, prioritize...
Iris ID, a provider of iris recognition technology, announces Kurt Wherley has joined the organization as director of sales for workforce management, North America. Wherley, who has more than 30 years of experience with time and attendance solutions, will develop new customers and support the sales channel for Iris ID’s recently launched IrisTime™ biometric-based workforce management platforms. Workforce management solutions “Kurt’s vast experience provides him with de...
Sectigo®, a provider of automated digital identity management and web security solutions, releases multiple advancements to the company’s award-winning IoT Security & Identity Management Platform, making integration and management of secured connected devices even easier for OEMs and enterprises. The innovations include a PKI Client software development kit (SDK) for Sectigo IoT Manager and Secure Boot SDK, which eases development efforts and reduces time to market for manufacture...
News
DigiCert, Inc., one of the world’s renowned provider of TLS/SSL, IoT and PKI solutions, helps companies provision and manage digital certificates at any point during the product lifecycle with the new release of the IoT Device Manager. Manufacturers can now embed certificates on chipsets prior to and during manufacturing, or directly to an edge device, for complete end-to-end device security. IoT Device Manager is built on DigiCert ONE, which enables rapid, automated PKI deployment as a customer-managed, on-premises or cloud solution, or managed by DigiCert for any environment. A challenge that manufacturers face when implementing PKI is figuring out how to provision certificates to devices during the manufacturing and assembly process. Changing manufacturing processes by implementing new technology can be a time consuming and expensive undertaking. Digital certificate data To address this challenge, DigiCert provisions authentication and signing certificates to chips prior to arriving at the manufacturing plant for assembly. Having certificates pre-provisioned allows manufacturers, without changing any processes, to achieve the benefits of device identity, strong mutual authentication, and secure boot and over-the-air updates through the use of digital signatures. Metadata on the device's characteristics can be loaded into DigiCert IoT Device Manager Additionally, as manufacturers look for more device-level data and management capabilities, metadata on the device's characteristics - including serial numbers, batch numbers and digital certificate data - can be loaded into DigiCert IoT Device Manager to support full device management capabilities throughout a device's lifetime. Threat response platform “Signing is a critical component of strong IoT security, and manufacturers are continually signing a variety of programming elements to ensure the integrity of interactions with their devices, and the data coming from it,” said DigiCert SVP of Product Brian Trzupek. “Together with assuring the identity of the device at the time of manufacture and enabling certificate requests directly from any deployed device, IoT Device Manager is part of a holistic security and threat response platform for IoT device security.” IoT security requirements Manufacturers are simplifying the complexity of IoT deployments by pushing more activity to the edge device. To support this transition, a device-centric API in the IoT Device Manager enables unique devices to request, update and manage the lifecycle of certificates. Complicated and expensive service layers that take time and effort to develop are no longer necessary for certificate provisioning and management. This feature allows manufacturers to simplify deployments, accelerate time to market and reduce the overall risk of their PKI. IoT Device Manager uses a container-based, cloud-native implementation to: Allow organizations to provision and embed device identity at any stage of the device lifecycle, from the factory to device deployment in a variety of environments to provide trusted and secure operations. Simplify device identity, authentication, encryption and integrity with a single click and marry device data visualization with cryptographic, manufacturing and factory process data. Support standards-based interoperability with third-party manufacturing and provisioning systems and enable technology partners to address a variety of use cases for today’s IoT security requirements. Private key management Secure Software Manager can be utilised together with IoT Device Manager to: Deploy modern PKI automation for frictionless secure code signing and private key management. Sign all files at any stage of the development cycle, not only for specific code but also clusters and containers. DigiCert ONE is a PKI management platform developed with cloud-native architecture and technology to be the PKI infrastructure service to solve today's security challenges. Released in 2020, DigiCert ONE offers multiple management solutions and is designed for all PKI use cases. Its flexibility allows it to be deployed on-premises, in-country or in the cloud to meet stringent requirements, custom integrations and airgap needs. It also deploys extremely high volumes of certificates quickly using a robust and highly scalable infrastructure. DigiCert ONE delivers end-to-end centralized user and device certificate management, a modern approach to PKI to provide trust across dynamic IT architectures.
PointCentral announced the launch of Connected Retro and a new integration with ButterflyMX to give property managers more choice in smart intercom solutions controlled through the PointCentral cellphone app. Connected Retro is a unique solution that seamlessly upgrades an existing telephone-based intercom system into a connected intercom without adding or replacing hardware. Property managers can retrofit their existing system in minutes and have access to entry history and smart key usage for up to a year, unlike traditional intercoms. Combined with the full suite of smart rental solutions offered by PointCentral, property staff can offer a comprehensive curb-to-couch experience that helps increase tenant satisfaction while also improving operational efficiencies and asset protection. Smart apartment features Smart apartment features like connected intercoms play a critical role in tenant, staff and visitor safety" “The acquisition of Doorport paved the way for our Connected Retro solution to come to life and provide property managers, residents and their guests with convenient and secure access,” said Sean Miller, President of PointCentral. “Smart apartment features like connected intercoms play an increasingly critical role in tenant, property staff and visitor safety, especially during the COVID-19 pandemic." "Our new retrofit solution and integration with ButterflyMX give users a modern front door experience for safer interactions through one central app.” Scheduled smart keys Once a Connected Retro system is installed, residents can create scheduled smart keys for guests and delivery personnel and delete the keys at any time directly from the PointCentral app. Other resident benefits of the Connected Retro smart intercom include: Entry instructions with unit number and smart key code sent over email Email notifications when the smart key is used to access the resident's unit View history of smart key usage in the app for up to 60 days - details include name, associated smart key, and date/time stamp Smart intercom solutions PointCentral's integration with the popular ButterflyMX intercom adds control of the most common resident actions to the PointCentral app. Residents can receive video calls, communicate with visitors, and buzz open the front door without switching between multiple apps. The management of both smart intercom solutions through one provider increases PointCentral’s versatility and solidifies its position as the only company in the rental property market capable of meeting the growing demand for the technology. Property managers that want the Connected Retro solution for their multifamily property can contact their PointCentral representative for information on the service packages available.
The SALTO XS4 One Deadlatch (DL) is a revolutionary stand-alone electronic lock thanks largely to the level of technology packed inside that brings together the convenience of a smart stand-alone access point - easy to retrofit, install, and no wires - with virtually the same power and performance of an online traditional access control point. This innovation brings electronic access control and convenience to a number of retail and commercial operations that commonly use aluminum-framed glass doors that previously had limited options for electronic locks. The XS4 One DL electronic lock combines proven robustness, the latest technologies, and elegant design, making it suitable for a wide range of applications. With its intelligent product design, the XS4 One DL offers more functionalities in less space. Access control readers Furthermore, SALTO remains true to using only high-quality materials and as few components as possible, which results in durability and longevity of the products. Thanks to its robust construction, the electronic escutcheon is therefore suitable not only for standard doors but also for access points with high intensity use. The SALTO XS4 One DL is part of the proven XS4 platform adding a new design with a totally new built-in reader. With the reader available in both black and white, the XS4 One DL has a narrow profile It includes the latest electronic components - RFID (MIFARE DESFire and HID iCLASS Seos) and BLE - Bluetooth Low Energy NFC - Near Field Communication - which ensures current and future compatibility. With the reader available in both black and white, the XS4 One DL has a narrow profile and is designed to fit most aluminum-framed doors. Smart keys technology Using smart keys and mobile technology with the SALTO XS4 One DL electronic lock allows users to manage access rights - quickly and keylessly - which is more secure than using mechanical keys. There is also additional value in the flexibility, convenience, and operational efficiency provided by the XS4 One DL wireless technology. Because the SALTO XS4 One DL is compatible with SALTO SVN, SALTO BLUEnet Wireless, and the SALTO KS - Keys as a Service - cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. This allows businesses to decide which technology fits better with their security, operations, and IT needs. Access management platform The SALTO XS4 One DL has more functionality and performance capability than any other smart electronic door locks on the market, allowing businesses to connect to their on-premises network via advanced SVN-based technology SALTO Space data-on-card platform or the cloud with the SALTO KS cloud-based access management platform. SALTO delivers profit-driven keyless smart access for retail. Say goodbye to mechanical keys and the cost of replacing them and the worry associated with lost keys Businesses can connect a SALTO XS4 One DL front door lock with management and security software (BMS) and third-party systems to automate tasks and connect alerts. Save time and money with quick installation on almost any type of door and access point. Achieve faster onboarding for new staff members by sending keys even before their first day. Say goodbye to mechanical keys and the cost of replacing them and the worry associated with lost keys. Operating platform system Control who goes where - and when - for any or all retail locations. And when expanding to new properties, affordably scale and establish access management across a number of properties. Grant specific access for one's staff, suppliers, or delivery services Monitor real-time access and entrances without disturbing the store’s customer flow XS4 One DL features and characteristics: Compatible with market standard deadlatches Simple installation is possible on any type of door, including those with narrow, medium, or wide-stile frames Body and escutcheon made of steel The lock can always be opened from the inside (single action panic feature works in conjunction with the relevant mortise lock) Reversible latch guard comes with all models Version for use with a paddle (paddle not included) Technology: SVN / BLUEnet Wireless / JustIN Mobile Operating platform system: SALTO Space - Data-on-Card - SALTO KS - Keys as Service Smart key: RFID (MIFARE DESFire and HID iCLASS Seos), NFC, and BLE Finishes and models are available in a wide variety of reader colors and lock finishes
ASSA ABLOY announces that Medeco Security locks has been recertified for ISO 27001 compliance by Intertek, an independent, multi-national testing and certification firm. ISO 27001 certification affirms that Medeco’s Salem, Va. operation adheres to internationally recognized standards for Information Security Management Systems (ISMS) in the production and sale of the Intelligent Key (electronic locking) systems XT and CLIQ. ISO 27001 certification provides requirements for setting up and maintaining an ISMS in order to keep information assets secure. Medeco’s ISMS is comprehensive, including internal information technology (IT) systems, technical and process controls, policies, procedures, data (Personally Identifiable Information and Intellectual Property) and personnel related to their Intelligent Key product lines. Information security management Continuing to adhere to and maintain ISO 27001 certification is an extremely high priority at Medeco" “Continuing to adhere to and maintain ISO 27001 certification is an extremely high priority at Medeco,” said General Manager Joseph Kingma. “The recertification validates Medeco’s ISMS that was already in place, and has improved upon the framework of policies and procedures that include all legal, physical and technical controls involved in our information security management processes.” ISO 27001 certification assures customers that information being stored on servers or cloud-based systems is handled in a secure manner, minimizing the risk of the exploitation and takeover of data. Information assets can include financial information, intellectual property, employee information and details, and any information supplied by third parties, including vendors and end users. Continuous monitoring and improvement “Medeco’s ISO 27001 certification is of critical importance to our customers,” added Kingma. “They deserve the highest level of integrity from Medeco and, along with delivering the best products and services available in the industry, we must continue to fully protect the information and infrastructure that makes those products secure.” Medeco’s ISO 27001 certification is valid for three years. Medeco maintains the integrity of its Information Security Management System through continuous monitoring and improvement.
SecurityCEU.com, owned and operated by The CMOOR Group, has partnered with The Associated Locksmiths of America (ALOA) to offer ALOA’s popular ALOA Fundamental Locksmith (AFL professional designation) in an interactive, blended format at a discounted rate. The online ALOA AFL course is discounted by $300. The full ALOA AFL designation online program costs $1,200 (regularly $1,500). The ALOA member’s discounted rate (regularly $1,350) is also $300 off making the AFL designation $1,050. Individual courses may be purchased for $79 each. Volume discounts are available for corporate customers. Historically, the AFL training has required a student to travel to Dallas and spend five-six days in a classroom. For many companies, the expense and time out of the office is prohibitive. Security training program With the online training in place students and management now have an alternative to spending that much time out of the field - by taking the training at their pace from the Web. ALOA and The CMOOR Group had been discussing an online format for the AFL Designation for many years. Jim Hancock, ALOA’s Operations, Education and Certification Manager said, “ALOA has been looking for a way to take our classroom course into an online format for quite some time. When we found out more about the work CMOOR had done in security training program development, we also found a true partner willing to work with us in creative ways to bring the new AFL format to life.” Interchangeable core locks During the course, students will also have access to online webinars for Q&A from ALOA staff members and trainers. The online AFL program offers the same content as the classroom course which includes Lock Mechanisms, Key Identification, Pinning Locks, Master Keying, Small and Large Format Interchangeable Core Locks, Key Machines and Adjustments, Exit Devices and more. After enrolment, students will be mailed their course Lab Kit which will contain the tools, pinning kit, locks and other hardware needed to follow and complete the online study. During the course, students will also have access to online webinars for Q&A from ALOA staff members and trainers. This ensures all students have the support needed to successfully complete the course. Providing program online “SecurityCEU.com is thrilled to be working with ALOA and providing this program online to a more global audience,” said Connie Moorhead, CEO at The CMOOR Group. “Students simply register for the program, complete a background check, take the online training, and attend a one day local or regional practicum. Then they can take the final exam and receive their full AFL designation,” Moorhead said.
RS2 Technologies, a renowned provider of access control systems, announced additional functionality and enhanced integrations for video and key management with its latest software update for Access It! Universal. Version 8 brings a range of new features, including licensing updates and more options for cellphone credential functionality, which allows touchless access and streamlined integration that limit human interaction in deployment. Access It! Universal is aimed at providing businesses of all sizes with an access management solution to fit their needs - whether it’s simple access control for a few employees in a single building or multiple locations for thousands of employees in a multi-region, multi-server system. Updates to the software build on the RS2 goal to provide customers with the ability to envision a truly customizable design that allows them to select the features they need to build a scalable, cost-effective system. Intelligent key management The new update also allows for seamless integration with Traka by ASSA ABLOY The new update also allows for seamless integration with Traka by ASSA ABLOY, which offers intelligent key and equipment management through the Access It! Universal dashboard. Users can grant and restrict access to Traka cabinets and lockers, allowing for the seamless transmission of equipment, such as keys or tablets, to employees without having to assign managers to issue them. Intelligence-driven event monitoring and records enable customers to audit in accordance with company policies. The Version 8 update also includes: Licensing that can now be managed instantly, anytime from within the Access It! Universal application with the click of a button Simplified API license management Cellphone credential integration with HID Global and Farpointe, as well as ACT ID, RS2’s free credential option powered by WaveLynx Technologies Enhanced DVR integrations that allow users to view third-party video directly in the Access It! Universal software instead of launching a new program in a new window, enabling a more integrated viewing of playback and live video Access management experience “RS2 Technologies is constantly looking for ways to enhance the access management experience for our customers, listening to their needs and ensuring they’re able to get the most from their investment in our Access It! Universal software,” said David Barnard, Senior Vice President of Sales and Marketing, RS2 Technologies. “With this new updated version of the software, the user experience is truly enhanced, bringing additional value to our customers and providing even more ways that the software can be used to manage not only access, but provide more functionality for improving business operations and streamlining all aspects of the security system.”


Expert commentary
A defibrillator can save the life of a person suffering from cardiac arrest – but it is most effective when used in the first few minutes of the patient collapsing. Studies have shown that a shock given within the first three minutes provides the best chance of survival and even one minute of further delay can substantially lower the chances of recovering. Public Access Defibrillators (PADs) were created to allow untrained members of the public to deliver life-saving treatment in those precious minutes before an ambulance arrives. There are currently over 10,000 in the UK, located in parks, offices, high streets and sporting venues, and they are especially popular in rural communities, where ambulance response times are longer. Every second counts Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or locked. Leaving them open could lead to theft, vandalism or misuse. Leaving them locked could mean that precious moments are lost waiting for a local guardian to arrive – and could even cost a life. To save as many lives as possible, it’s clear that PADs need to be available 24/7, fully operational and easily accessible to users and local guardians. But there is a solution that can meet all these conditions – a lock that can protect against vandalism while providing convenient instant access when required. Life-saving solutions Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or lockedDigital locks are ideal for securing PADs because they don’t require a key, and anyone can be given access over the phone. In the case of a cardiac arrest, the user calls 999 and the ambulance controller provides them with a simple, easy-to-remember code. The ambulance controller can then advise them, step by step, what to do. Local guardians, who have responsibility for the PAD, can be provided with an override key to enable them to monitor and maintain the defibrillator. The PAD cabinets built by Duchy Defibrillators show exactly how this works in practice. Based in rural Cornwall, Duchy Defibrillators manufactures, supplies and installs monitored PAD cabinets. To provide public access to the defibrillators, it needed a lock that could keep its cabinets secure, make them easily accessible and withstand the stormy Cornish weather. Codelocks recommended a digital electronic lock that could operate on a standalone battery, making it especially suitable for remote areas. As well as offering flexible access, digital locks come with a range of varying options and functions to suit different applications. As Duchy Defibrillator cabinets are installed in a wide variety of locations and sometimes need to withstand outdoor exposure, it opted for a robust electronic digital lock that is both affordable and easy to set up. A digital-access revolution Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end-users The example of Duchy Defibrillators shows how digital locks can be used to keep defibrillator cabinets secure while affording instant access to users when they are needed. But the flexibility of digital locks also makes them suitable for securing property and equipment in a wide variety of situations, especially for shared and public facilities. This is why you’ll increasingly see digital locks used to secure restricted areas in hospitals, schools and offices, as well as shared facilities like hotel and gym lockers, public restrooms and more. Digital locks are available for a number of specific applications, including doors, lockers and cabinets. They can range from simple mechanical locks through to more sophisticated electronic locks and state-of-the-art smart locks. Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end users – making them very popular for contactless entry and with facilities managers that need to manage access to buildings and campuses. One thing is certain – whatever your access control requirements are, there’s a keyless lock solution to suit. The digital access revolution is here.
Across the globe, healthcare providers and facilities from care homes to hospitals and private clinics are working around the clock to reduce the risk to their staff and reduce the spread within their facilities. There are increasing reports in the UK that the virus has devastating effects in care homes, with fears that the US will be next in tow. The impacts on healthcare staff have also been stark with absence levels growing. In some health bodies across the UK up to almost 20% of their staff are off sick. The consequences of COVID-19 are clear to see in the short term, but it may also drive the need for technology that will help mitigate against pandemics and the spread of disease in the long term. One of these technologies that offers some promise is long-range RFID. The value offered is more than just security and safety Why long-range RFID? The value offered is more than just security and safety. Implemented correctly, it not only helps minimize the dangers posed to staff and patients, but also helps improve the efficiency and workflow around the facility. Here are 5 reasons long-range access control is part of the solution: Reduce contact spread of viruses Most viruses spread through droplets inhaled from someone else’s cough or sneeze. But a common indirect way of infection is germs being passed on when people touch surfaces such as doors, pin pads and handles. This can lead to the dangerous spread within healthcare facilities as it only takes one infected person to spread the virus to those that touch the same surface. Hence, during the current times of peak capacity, the risk increases. The right long-range access control solution can help minimize the risk by reducing shared contact points. Integrating vehicle and people access Long-range RFID is gaining traction as a complete people and vehicle solution. As an ideal solution that automates vehicle access without the need for ticket stations, pin pads or manned gates, members of staff can now go from their doorstep to the room they are required in without having to touch surfaces in order to access the car park and building. All of this can be done from a card that is transferred from a special holder in your car to a land yard for centrally managed, hands-free access around the facility. Card readers providing hands-free access around the facility More efficient building workflow Time is a precious commodity for medical staff and any time that is wasted on trying to enter the building, search for a badge or entering a PIN should be limited. Once in the building, a long-range electronic ID badge allows automated access around the building without having to present a card to the reader. For more emergency situations, its also common to attach cards to push trolleys, wheelchairs and other heavy equipment to help protect staff and patient safety. Fight against theft It’s a sad circumstance that in times of crises, theft is an issue that healthcare facilities have to deal with. Amid global shortages, there have been numerous cases of masks, medical equipment and other supplies being stolen from hospitals. A modern access control solution using long range readers can help by keeping supplies locked in a dedicated room with access granted only for approved staff ID badges, whilst also restricting access in staff car parks to only approved staff members. Proactively manage the flow of staff members in your facility Access control software offers a unique insight of real-time data Access control software offers a unique insight of real-time data into key staff members and their movements within the building. This software can then compile the data collected into reports which can help reveal bottlenecks in the flow of staff members around the facility. In the case of an emergency, an access system with connections to readers and cameras, can lock/unlock certain doors, or revoke access to particular people in case their badge was stolen. Whilst we cannot accurately predict what the world will look like post COVID-19, long-range RFID technology could prove to be a powerful tool going forward. It offers solutions that go beyond just security, and helps healthcare facilities build a better future by improving workflow, manage medical equipment, protect patients, staff and visitors from infection and future pandemics.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Security beat
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and are used to authenticate access control credentials and read the data required to access multiple applications secured by multiple vendor devices. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are AES 128 encryption keys encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent LEAF EV2/EV3 cards allow up to 16 devices to be individually accessed using 16 unique keys, respectively that are stored in the smart cards (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF Memory Model specifies a standard EV2 (EV1 backward compatible) smart card data format and application access protocols that ensure each manufacturer’s devices can interface with a card chip in the same way. Specifically, each card has a “common data structure” based on the LEAF Memory Model, which means that the location of information is arranged on a card chip in a predictable and consistent manner. Each end-user application (for door readers, secure printing, vending, etc.) stored in the card is secured with their own cryptographic key. Member companies adhere to that structure in order to be interoperable with a single credential. There are no license fees or intellectual property rights involved. Keysets The approach involves a LEAF Custom Cryptographic Keyset (LEAF Cc Keysets) owned by the end-user. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of customer-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end-user staying in control and having unlimited interoperability.” WaveLynx Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications by multiple manufacturer’s devices. WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF Enabled. They provide a key management service (for life) to end-users based on LEAF capabilities. End-users “own” the keys and can submit a request to WaveLynx to have us securely share them with any other manufacturer. Sharing a key involves two key custodians from WaveLynx Technologies and the Vendor who is receiving the customer’s keys, each of whom only has access to half of the encrypted key in order to keep it secure. Keys are shared via a “key ceremony”. Combining capabilities The LEAF consortium provides a way for manufacturers to work together to provide an ecosystem of devices that are compatible with a single encrypted smart card without the need to embed proprietary reader modules in their devices or license another manufacturer’s technology, thereby making it possible for them to increase their market share. Working together, independent manufacturers can assemble a group of devices to compete more effectively with larger manufacturers. In effect, they combine their capabilities in order to offer the end-user viable options and to compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve. Although the standard does not currently offer mobile credentials, a common mobile credential standard is currently being discussed and designed by the Consortium.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimize the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customized access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorized entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorization to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customization ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing Key Cards And Fobs With App Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognizes which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable Access Control Systems For SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favor simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving Security Dealers And Integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalizing that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS To Measure Product Quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analyzing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
Case studies
Supra, a provider of mobile credentialing and entry management systems for automotive and real estate sectors, announces that its TRAC-Box key management solution has been selected by Oregon-based Guaranty RV Super Centers to help secure and track keys while keeping pace with a growing demand for recreational vehicle (RV) travel. Supra is a part of Carrier Global Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. Located in Junction City, Oregon, Guaranty is the state’s largest dealer of recreational vehicles, from entry-level tent campers to luxurious diesel-powered RVs that sell for more than $400,000. Gaining valuable sales An industry publication, RV Business, has named Guaranty one of North America’s top 50 dealers for six consecutive years and a top 10 dealership based on customer reviews. “With our large footprint of 25 acres and long dark winters, it is difficult to have visibility of activity,” said Marty Nill, managing partner, Guaranty. “With the Supra TRAC-Box, we’ve improved security and gained valuable sales and marketing insights, and assigning permissions is simple. We’re confident we have authorized access to our vehicles with tracking controls in place. Our vehicles are retail-ready using the Supra TRAC-Box.” Providing greater visibility Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles. Each TRAC-Box uses Bluetooth to communicate with Supra’s eKEY® mobile app on smartphones carried by Guaranty sales associates. They enter a PIN code into the app to unlock the keybox and acquire the keys from a built-in container. “Each time an authorized user opens a keybox, a record of the activity is stored in both the TRAC-Box and eKEY app, so managers and users can see the history of openings without having to return to the office,” said André Lalande, vice president – sales, Supra. “The app also transmits activity to the TRACcess Manager software to create an audit trail providing greater visibility to lock-up activities.” Removing access permissions TRACcess Manager also provides prompt visibility to the activity and frequency of RV showings, enabling management to see which RVs are most popular and reposition vehicles more efficiently. Notifications can also be set to alert management of keybox activity on specific inventory they want to monitor, for example, each time the 10 most expensive RVs are accessed. The TRAC-Box system also promotes accountability among associates and saves time looking for misplaced keys needed to show vehicles. When salespeople leave the company, managers can remove access permissions in easy, streamlined steps via any internet-connected computer or mobile device within a few minutes. Supra is featuring the TRAC-Box system in its virtual exhibit at the RV Dealers Virtual Convention & Expo, Nov. 9-20, 2020.
Schools and heritage sites present their own unique difficulties for security and access control. It becomes a challenge when the same is to be applied to a school that is also a heritage site of exceptional value. This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum that requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School chiefs also required little disturbance of everyday school learning. Wireless access control was the obvious answer. A wireless access solution to a 16th-century problem Powerful management option enables real-time security control to limit free access to and around the site SMARTair® wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts) are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for its new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. “The main benefit is the ease of real-time key management — from any place and at any time — via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff because no unauthorized people can enter the school.” SMARTair locks and readers SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation and integration The system was installed without a hitch and also without any disruption to classes" The installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor. To learn how easily SMARTair® wireless access control could secure your premises, download a free solution guide at https://campaigns.assaabloyopeningsolutions.eu/smartair
Loughborough University has selected the ASSA CLIQ® Remote system from the ASSA ABLOY Door Hardware Group to help secure its plant control rooms. With more than 18,000 students at Loughborough University for 2018-19, the award-winning ASSA CLIQ® Remote technology has been used across the site for a range of different applications, including teaching laboratories and offices. Its success as a security and access control solution has led to it being extended to cover the university’s plant control rooms too. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ® Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. ASSA CLIQ® Remote solution Loughborough University can program and update each key remotely, removing or granting access privileges for the key holder in real-time. This allows only those with the necessary authority at the university to enter a plant control room. Furthermore, the system removes the security risks associated with lost or stolen keys, eliminating the time and cost spent on replacing a mechanical lock. For staff that have access to these areas and then leave the university, their access rights can be easily be removed by using the system’s simple, web-based interface, ensuring ex-employees and contractors never pose a security risk. ASSA CLIQ® Remote also provides a full audit trail for assured peace of mind around who has accessed the plant control rooms and - because the locks are powered by a battery inside the programmable ASSA CLIQ® Remote key - no extra wiring is required when installing the system. Wireless electronics locks Phil Sheppard, Senior Clerk of Works at Loughborough University, said: “For us, a big advantage to ASSA CLIQ® Remote is that its electronics effectively extend the patent of the key indefinitely. The system cannot be copied, which means ASSA CLIQ® Remote provides a long-lasting access control solution.” “The audit capabilities of the system are also really useful, ensuring we know exactly who accessed a plant control room, and when. The system can be extended really easily as well, which has been another key reason why we continue to use ASSA CLIQ® Remote to meet our access control needs across the university.” “Ultimately, by working with a trusted manufacturer such as ASSA ABLOY, we can be safe in the knowledge that only authorized individuals can access the university’s plant control rooms.” Secure access control solution Sean Falkinder, National Sales Manager for ASSA CLIQ® Remote, adds: “We have provided a range of solutions for Loughborough University over the years, and the use of ASSA CLIQ® Remote for the university’s plant control rooms is just the latest success story. We’re delighted that the technology is able to provide such a safe and secure access control solution for the site.”
Schools and heritage sites present their own unique difficulties for security and access control. But what about a school that is also a heritage site of exceptional value? This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum which requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School leaders also required little disturbance of everyday school learning. Wireless access control was the obvious answer. Wireless access control devices The school chose SMARTair Wireless Online management for their new keyless access system SMARTair wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts), are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. Issue access credentials “The main benefit is the ease of real-time key management - from any place and at any time - via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff, because no unauthorized people can enter the school.” SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. Installation and integration The system was installed without a hitch and also without any disruption to classes" “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. Education management software SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorized from unauthorized people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Resilience and efficiency have become watchwords for the public institutions, before, during and after the ongoing health crisis. In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a technology the key is familiar and proven, user-friendly and dependable. It can also be inflexible and time-consuming to manage. The security challenges of delivering public services do not stand still, but standard mechanical keys cannot move with oneself. Filtering access intelligently and dynamically has become part of security’s job description. Yet there is no need to dispose of the key altogether. One can adapt it, rather than throw it out. Intelligent, programmable keys combine the powerful features of electronic access control with the convenience of a mechanical key. They are keys, familiar and user-friendly… but evolved. When the key has a brain, one can do more with less. These efficiencies are critical in a world where demands on the public institutions are at levels not seen in generations. Cut workload and solve the problem of lost keys One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys" Lost keys present mechanical security with its most intractable problem. When a key goes missing, time and budget are expended to remedy the situation. Extensive rekeying and reissuing to relevant keyholders are complex and expensive. Programmable keys, however, solve the problem quickly. The French town of Villiers-le-Bel, north of Paris, faced these familiar key management challenges. Each person in their Municipal Technical Centre carried approximately 40 physical keys. If one was lost or stolen, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too, at great expense. Key duplication costs were mounting. “One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the town’s Municipal Technical Centre. To fix this expensive lost key problem, Villiers-le-Bel city administrators chose to combine trusted mechanical security with new electromechanical key-operated locking, all managed within the same flexible, wireless access control system. Now lost or stolen electronic keys are cancelled instantly using secure cloud software which works inside a standard browser, no software installation required. Administrators can program access rights for any key, padlock or cylinder. They filtre access to specific sites and doors according to the precise requirements of every municipal employee. Keep residents safe in their homes In Aalborg, Denmark, around 3,000 citizens in home care have programmable locking cylinders installed at their front door. This replaces a cumbersome mechanical master-key system. Aalborg’s installation was tailored to meet the needs of this vulnerable group of city residents. Certified technicians simply replaced each old cylinder with a programmable cylinder If a home care resident loses their key, its access rights can be deleted from the system without the need for a lock replacement — keeping the keyholder’s home safe and saving the city time and money on rekeying. Managing Aalborg’s system is straightforward. Lock installation was quick and easy: certified technicians simply replaced each old cylinder with a programmable cylinder — with no wiring and no major alterations to the door. Aalborg’s fire brigade quickly took over the maintenance process. Brigade staff now grant or revoke access, and tailor permissions for different users or locations according to defined needs. In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building. To speed up emergency response times and improve firefighter safety, the local service fitted houses with secure façade key cabinets.More rapid response means a better chance to prevent a fire spreading Property keys are stored inside the cabinets, so authorised firefighters get rapid building access if there is a fire. When the emergency call comes, firefighters update their individual, programmable key at the station or while on the move, using a remote key updater kept in the fire engine. There’s no longer any need for fire stations to hold multiple sets of keys or for off-site firefighters to divert to the station to collect the right key. More rapid response means a better chance to prevent a fire spreading. Safety is improved for everyone, Skellefteå residents at home and firefighters at work. Clear workflow bottlenecks in public housing With crime against empty properties on the rise, public authorities in the English city of Rotherham aimed to minimise the time a council house stands vacant. However, workers from multiple departments require access to prepare a property for a new tenant. Passing keys securely between all relevant staff members was a major cause of delay. Security managers issue the precise permissions which every staff member needs At Rotherham Metropolitan Borough Council (RMBC), intelligent key technology helped streamline these workflows, upgrading security and saving money at the same time. RMBC identified physical key handover as a major bottleneck in their workflow. They needed a solution to speed up the process. Now, each relevant RMBC staff member is issued with their own programmable key. Using simple online software, security managers issue the precise permissions which every staff member needs. The access rights of any key can be amended or revoked at any time. Physical handover of mechanical keys, and the time and money spent coordinating this process, has been eliminated. Preserve the fabric of historic buildings, and the design integrity of new spaces Building type can make a big difference to the access control one chooses. Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control. Here, wireless electronic cylinders which simply replace existing mechanical locks solve the problem, preserving doors which may be centuries old. Intelligent key security is hardly noticeable for the library’s many visitors The issue of aesthetics also affects modern public spaces, albeit differently. In Stuttgart, innovative design was a key element of the city’s new library building. Door security should be discreet and not disrupt the vision of Korean architect, Eun Young Yi. This was the first public building in Stuttgart’s Europaviertel, a unique creation with a double façade with glass bricks, a brightly lit atrium four storeys high, and public entrances on all four sides. Almost as soon as it opened, the building was declared an architectural icon — “instantly one of the world’s most beautiful libraries.” Intelligent key security is hardly noticeable for the library’s many visitors, yet critical for protecting Stuttgart’s precious public heritage Save time and money managing keys for a mobile workforce Many public services involve managing and directing a mobile or contractor workforce. Mileage expense mounts up when workers must return to base to collect keys or update their access rights. With a Bluetooth-powered solution, everyone carries their own programmable key Mobile workers use more fuel and increase a carbon footprint. One makes a business more sustainable quickly if one reduces the mileage one travels. Reducing miles while maintaining security is not easy, if one relies on mechanical keys to secure remote or dispersed sites. Bluetooth-enabled intelligent keys eliminate the need for workers to return to headquarters to collect or return a mechanical key. With a Bluetooth-powered solution, everyone carries their own programmable key and keeps its access rights up to date on the move, simply by making an encrypted connection to a secure smartphone app — meaning fewer miles driven and less money wasted on unnecessary fuel. One technology powers all the solutions All the installations referenced above — and many, many more across the full spectrum of public services — run on the same technology: CLIQ® from ASSA ABLOY. CLIQ combines electronic and mechanical security in a range of wireless cylinder applications, including a full range of mechatronic and electronic cylinders and padlocks. CLIQ locks are installed without wires: every cylinder’s power is supplied by a battery inside the CLIQ key. These keys are physically identical and programmable by a system administrator using a desktop updater; by keyholders with a portable programmer; or in the case of CLIQ Connect Bluetooth-enabled keys, via an encrypted connection to a secure smartphone app, minimising both wasted journeys and unnecessary social contact between workers and office staff. Intuitive software makes it simple to manage access rights, enable and disable keys and customise access schedules, on site or on the go. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ


Products


Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?