The Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces the launch of SmartCode 955. Functioning as a commercial grade electronic lever, SmartCode 955 provides advanced security, strength and durability. It is the first commercial grade electronic lever from Kwikset - U.S door hardware manufacturer - designed to serve the security needs of facility managers, residential and commercial property owners, and small business owners. SmartCode 955 electr...
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effective...
The Physical Security Interoperability Alliance (PSIA) was founded in 2008 with a goal of creating ‘plug-and-play interoperability’ among physical security devices, systems and services. Since then, the organization’s mission has both expanded to include logical security and focused more narrowly on identity, a critical aspect of security today. In recent years, PSIA has concentrated on its PLAI (Physical Logical Access Interoperability) specification, which provides a means t...
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces its Digital Hood Defense for ATM security. Compatible with S&G’s Digital Platform products, this innovative device increases the overall security of ATM units by protecting the hood from jackpotting attacks - whereby malware has been attached to an ATM to rapidly access money - without compromising convenience for operators. Digital Hood Defense for ATM security The Digital Hood...
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces that it has been acquired by OpenGate Capital, a global private equity firm. News of S&G and OpenGate Capital entering into an agreement to acquire was initially announced in January and financial terms were not disclosed. “With the support from OpenGate Capital, we are working to develop and release advanced locking solutions for safes, vaults, ATMS and highly sensitive environm...
Among the cloud’s many impacts on the physical security market is a democratization of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annua...
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, globally renowned residential security solutions firm, has introduced the next generation of its popular Signature Series Deadbolt with Home Connect. Signature Series Deadbolt With Home Connect Available in both traditional (round) and contemporary (square) models like the original version, the new Signature Series Deadbolt (2nd Generation) with Home Connect will feature two significant upgrades: The lock will utilize the newer Z-Wave Plus 500 Series chips. Supporting over-the air firmware updates, the new chip extends the lock’s wireless range while providing robust network security and encryption. The lock will also feature a smaller interior footprint, creating a more pleasing aesthetic and blending in more easily with any décor. Kwikset Single-Cylinder Deadbolt With these two substantial enhancements, the Signature Series (2nd Generation) is expected to extend the popularity of this well-received lock line. Utilizing the popular Kwikset single-cylinder deadbolt as its foundation, this is the ideal lock for the first-time homebuyer or homeowners who want to experience the safety and peace of mind of a Home Connect solution an entry-level price point. SmartKey Security Kwikset’s Signature Series Deadbolt offers advanced features for maximum security When connected to any standard smart home hub, these motorized deadbolts enable true remote locking and unlocking. This allows homeowners to remotely access and control the lock from anywhere in the world, using the app from the homeowner’s home automation controller. As a result, they can lock a door while traveling for work or vacation and can also remotely provide access to their home to service providers, guests or other family members. Users can also attain valuable information through their smart phone and have the peace of mind of knowing a door’s lock/unlock status. Like its predecessor, Kwikset’s Signature Series Deadbolt (2nd Generation) with Home Connect offers advanced features for maximum security and convenience, including Kwikset’s patented SmartKey Security, which not only protects against advanced break-in techniques but also allows homeowners to re-key the lock in seconds without a locksmith.
Allegion, global provider of security products and solutions, announced Identiv’s Hirsch Velocity Software and Mx controller now integrate with Schlage wireless electronic locks for a highly scalable access control offering. The integration supports Schlage LE wireless mortise locks, Schlage NDE wireless cylindrical locks and AD-400 wireless locks. Schlage Wireless Locks “Allegion continuously looks for ways to improve security, efficiency and convenience for end users and integrators, which is why we’re excited to work with Identiv,” said Robert Lydic, vice president of PACS/OEM business at Allegion. “Schlage wireless locks are ideal for facilities that want an affordable way to upgrade traditionally mechanical doors to electronic credentials. When paired with Velocity Software, users can bring a reliable, seamless experience deeper into their buildings.” The award-winning, multi-door Hirsch Mx Controllers provide a wide range of features for enterprise-scale solutions The award-winning, multi-door Hirsch Mx Controllers provide a wide range of features for enterprise-scale solutions. Hirsch Velocity Software is an integrated platform that manages access control and security operations, from single high-security rooms to multi-building, multi-location campuses, with the most stringent security compliance. When combined with the strength and flexibility of Schlage wireless locks, these offer an advanced access control solution that can be tailored to fit facilities of all sizes. And these solutions are agile by design, enabling users to start small and grow as security needs evolve. Velocity-Schlage Wireless Locks Integration “When flexibility and scalability are requirements, Velocity combined with Schlage’s wireless locking platforms is the perfect solution,” said Sam Tuthill, Identiv senior product manager. “Velocity’s new integration with these Schlage wireless locks expands the capabilities of our software while incorporating the power of Hirsch Mx controllers.” This solution is ideal for customers looking to introduce or expand electronic access control in commercial real estate, K-12 and higher education campuses, assisted living buildings, medical offices and multifamily properties. Wireless electronic access control solutions allow users to secure more doors without the need to run wiring, enabling quick and easy installations with minimal interruptions. Electronic Access Control The Schlage AD Series has a modular design that enables the reader or communication module to be changed The Schlage LE wireless mortise lock, Schlage NDE wireless cylindrical lock and AD-400 wireless lock were designed to bring electronic access control beyond traditional perimeter and high-security openings. These locks are adaptable: The Schlage AD Series has a modular design that enables the reader or communication module to be changed as needed. The Schlage LE and NDE allow end users to upgrade from the ENGAGE web and mobile applications to a fully integrated system through a physical access control provider. The lock, credential reader, door position sensor and request-to-exit switch are combined in one unit to simplify installation and reduce costs.
Sargent and Greenleaf (S&G), renowned manufacturer of high-quality mechanical and electronic locks, has announced the release of its Digital Vault Lock solution. Through a secure online interface and user-friendly software, this static code, electronic time lock allows for increased flexibility and security for convenient vault access. Digital Vault Lock Combining an attack-resistant lock case and enhanced features to protect against a variety of threats – vibration, bouncing and punching attacks – the Digital Vault Lock provides durable security for financial institutions. With the ability to assign four independent time lock schedules for up to 100 users and retrieve up to 1,000 time- and date-stamped audit events with a simple USB connection from the lock, the Digital Vault Lock increases shift coverage without overriding security and can be customized for a single user, dual user or manager. “With S&G’s Digital Platform features and benefits continuing to evolve, the Digital Vault Lock will provide our customers with additional flexibility and security for a smarter and faster vault access lock,” stated Keith Deaton, COO of Sargent and Greenleaf. “The auditing capabilities along with the scheduling and management features of this lock, make it possible for banks to have a digital vault security option,” said Deaton. S&G’s Digital Vault Lock’s main features include: User-friendly programming via website interface or keypad for secure programming. Audio and visual signals, including a display screen and three keypad LEDs for lock status indication. 1,000 time- and date-stamped events for precisely managing audit trails. Offers dual control, automatic daylight savings, a management reset code, time delay up to 99 minutes and a penalty lockout. S&G 3029-3XX Lock S&G’s Digital Vault Lock is powered by the S&G 3029-3XX lock with a motor-driven lock bolt. With same mounting footprints as the S&G 6400 and 6500 series mechanical vault locks, retrofits are quick and easy.
At ISC West 2019 (booth #13109), Sielox LLC is showcasing versatile new enhancements to its Pinnacle v.10.4 Access Control Platform. New functionality allows users to seamlessly access the features of Allegion’s Schlage Engage Wi-Fi locks enabling them to be easily integrated with Pinnacle Schlage Wi-Fi access platform feature. Additionally, Allegion Schlage wireless locks can now receive firmware updates through Sielox’s 1700 controller using Allegion ONR technology, which can save integrators tremendous time and money when upgrading and maintaining layered security systems using cost-effective wireless locks. Pinnacle v.10.4 Access Control Platform Pinnacle v.10.4 provides seamless integration with Allegion Schlage NDE and LE wireless locks “Pinnacle v.10.4 provides a number of features that are exclusive to Sielox that further enhance the implementation and maintenance of Wi-Fi locks on our access control platform,” said Karen Evans, President, Sielox. “This, plus other new feature additions like LDAP (Active Directory) and improved security, further leverage the versatility and cost-efficiency of Pinnacle for myriad access control applications.” Pinnacle v.10.4 provides seamless integration with Allegion Schlage NDE and LE wireless locks so they can easily be incorporated as part of a facility’s overall access control system using existing Wi-Fi infrastructure. Integration With Allegion Schlage Wireless Locks The Pinnacle Schlage Wi-Fi integration provides access to the wireless locks’ features, enabling advanced door management capabilities along with credential management, detailed audit reports, and customizable screen layouts. With this integration, users are able to control an unlimited number of Allegion Schlage NDE and LE wireless locks, manage cardholder records, create access groups, define holiday schedules and more. Additional Schlage wireless lock fields are now reported in Pinnacle providing users a single dashboard to monitor the lock status. An industry first, Allegion Schlage NDE and LE wireless locks can receive firmware updates when using the Sielox 1700 Controller Allegion ONR feature via RS-485 communications. By pushing the ONR Firmware Package for Allegion Schlage wireless locks using 1700 Controllers, users and integrators can save both time and money. Transport Layer Security (TLS 1.2) An additional update to Pinnacle v.10 includes Lightweight Directory Access Protocol (LDAP) Sielox has also added a new Transport Layer Security (TLS 1.2) enhancement to Pinnacle v.10.4. TLS, and its predecessor Secure Sockets Layer (SSL) for improved network security. TLS/SSL operates by establishing an encrypted communication path between two applications, "wrapping" the entire application protocol inside the secure link. This provides complete privacy for the entire transaction so that sensitive information is protected from unauthorized access while in transit. Pinnacle TLS 1.2, which is available to current Pinnacle users, provides compliant level security. An additional update to Pinnacle v.10 includes Lightweight Directory Access Protocol (LDAP), a licensed service that can be installed on the same server as Pinnacle. The feature simplifies administration by assigning roles to users with permissions, which makes the overall solution more efficient and easier to use for larger security systems. Pinnacle 10.4 will be released in Q2 2019 and is available in several configurations that can be specifically tailored to the needs of any size business or facility or integrated in a layered systems model.
Sielox LLC is demonstrating its portfolio of layered security systems at ISC West 2019 in booth #13109, which address the complexity of providing the right combination of features and configurations to best accommodate specific applications and needs. Featured solutions include: the new release of Pinnacle v.10.4 access control solution; Sielox CLASS crisis lockdown alert status system; AnyWare browser-based access control platform; and the company’s highly-touted 1700 Intelligent Controllers. Sielox Access Control Systems Sielox access control and emergency notification systems are also ideal for stand-alone operation Designed for seamless integration with one another, Sielox access control and emergency notification systems are also ideal for stand-alone operation and are scalable for future expansion. “Sielox has always operated under the principle of continuous technology and process improvement in order to consistently deliver solutions that deliver the performance and functionality required to meet our customers’ evolving security and operational challenges,” said Karen Evans, President, Sielox. “Our innovative layered security solutions provide users with a high degree of flexibility when configuring the systems, they need today and tomorrow.” Sielox Solutions On Display At Booth #13109 At ISC West 2019 Include: The newly-released Pinnacle v.10.4 access control platform that allows users to seamlessly access the features of Allegion’s Schlage Engage WiFi locks enabling them to be easily integrated with Pinnacle Schlage WiFi access platform feature. Additionally, Allegion Schlage wireless locks can now receive firmware updates through Sielox’s 1700 Controllers, which can save integrators tremendous amounts of time and money when upgrading and maintaining large systems. Additional enhancements in Pinnacle v.10.4 include: Transport Layer Security (TLS 1.2) that establishes an encrypted communication path between two applications, "wrapping" the entire application protocol inside the secure link; and Pinnacle LDAP Sync Service (Lightweight Directory Access Protocol), that simplifies administration by dynamically importing and verifying user and cardholder data through data synchronization. Sielox CLASS (Crisis Lockdown Alert Status System) Administrators or any designated initiator can issue an emergency alert to notify responders The Sielox CLASS (Crisis Lockdown Alert Status System) emergency notification and response solution provides vital emergency status details to responders so they can best manage events. Administrators or any designated initiator can issue an emergency alert to notify responders of conditions in real time while communicating status via one of five programmable color-coded alert levels. Occupants within a facility can then report status at their specific location enabling responders to view detailed facility maps with compiled room-by-room color-coded conditions that update in real time as the situation evolves. A chat feature enables two-way communications between occupants and first responders to exchange detailed information or instructions. CLASS can also issue messages with response instructions specific to each alert level via email or text and override any PC on the network to ensure the highest visibility of alert status. Sielox AnyWare Browser-Based Access Control The Sielox AnyWare browser-based access control platform features a variety of enhancements that make it faster, easier and more scalable for small to mid-sized businesses to take access management mobile. The intuitive and easy-to-use AnyWare solution features a capacity increase from 8 up to 40 doors, allowing for an increased number of controllers and readers. Other features include; custom fields allowing users the ability to add additional information to the cardholder record including the card holder images, multiple card type formats, reader block and privilege access levels. Sielox 1700 Intelligent Controller No personal data is required or collected from the user or integrator The Sielox 1700 Intelligent Controller is an intelligent fully-distributed controller ensuring decisions even if communications have been interrupted. New I/O series boards provide a flexible, cost-effective means to expand the input and output functionality of the access control solution, a next-generation access control panel, utilising 32-bit technology with real-time operations for speed, performance and reliability. The new series have the same footprint and mounting as the Sielox 1700 controller; are backwards compatible with Sielox Pinnacle and AnyWare systems; and are cost-effective, not requiring a separate backplane and power module. Integrated with Sielox’s 1700 Controller and the AnyWare and Pinnacle software platforms, Conekt mobile credentials and readers from Farpointe Data use Bluetooth to enable communication between smartphones and readers. No personal data is required or collected from the user or integrator, and multiple credentials can be stored on the app.
Supra, a renowned global provider of mobile credentialing and entry management systems, has introduced the TRAC-Guard padlock for authorized, secure access to virtually any remote site. Ideal for installations in telecom or utility stations, storage units or other locking points, this Bluetooth-enabled padlock adds convenience and security in place of traditional mechanical or combination locks. TRAC-Guard Padlock The versatile TRAC-Guard padlock comes ready for use and fits seamlessly into Supra’s TRACcess Manager system to enable mobile access The versatile TRAC-Guard padlock comes ready for use and fits seamlessly into Supra’s TRACcess Manager system to enable mobile access, real-time communications and 24/7 cloud-based management. The padlock allows access to authorized users, giving operators visibility into remote site activity. “The TRAC-Guard padlock transforms remote operations, delivering online capabilities in remote and offline locations,” said Fayyad Sbaihat, president, Supra. “Having visibility to site activity with real-time control lets operations managers increase workforce efficiency, reduce travel, monitor vendor visits and more.” Authorized And Tracked Access Control The padlock enhances security via authorized and tracked access – unlike mechanical keys that can be lost or stolen or combination codes that can be shared. TRAC-Guard padlock operations are protected with layers of security such as individually authorized keys that routinely expire; required individual PIN codes; user permission for each locking point; and encrypted system communications. “This mobile padlock solution is based on proven mobile-credentialing technology,” said Sbaihat. “Supra key credentialing is deployed across an installed base of more than 3 million Bluetooth-enabled locking devices in multiple industries. This platform, combined with 20 years of mobile credentialing experience, delivers an industry-leading solution.” Cloud-Based TRACcess Manager Cloud-based, 24/7 TRACcess Manager administration provides a view to access activity from the portal Cloud-based, 24/7 TRACcess Manager administration provides a view to access activity from the portal, or email alerts or routine reports, to monitor job status, confirm vendor maintenance visits and check the electronic logbook. Setting up mobile keys is quick and easy with permissions delivered in real time to the TRACcess eKEY app. This eliminates the need for staff travel solely for opening gates or doors or providing access to assets such as heavy machinery. Bluetooth communications between the mobile key and the lock enable operations even in areas lacking cellular coverage. Based in the USA, Supra offers access control, key access, storage devices, ATM solution, and wireless security solutions for real estate, banks, property management, fire departments, automotive, and industrial sectors.
The basic principles of access control are well established: only authorized people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organization? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable Entry Management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorized individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorized access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable Hardware Components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorized employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing Security Needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorizations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorizations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion Alarm Systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customized Intrusion Systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customize the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video Management System A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full Alarm And Event Management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analyzing video content over large distances Intelligent Video Analytics have the unique capability of analyzing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
With the ever-growing availability of video data thanks to the low cost of high-resolution video cameras and storage, artificial intelligence (AI) and deep learning analytics now have become a necessity for the physical security industry, including access control and intrusion detection. Minimizing human error and false positives are the key motivations for applying AI technologies in the security industry. What Is Artificial Intelligence? Artificial intelligence is the ability of machines to learn from experience using a multi-layer neural network, which mimics the human brain, in order to recognize items and patterns and make decisions without human interference. The human brain is estimated to have 86 billion neurons; in comparison, the newest Nvidia GPU Volta has 21 billion transistors (the equivalence of a neuron), which offers the performance of hundreds of CPUs for deep learning.AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge In addition, unlike humans, AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge. With such enormous processing power, machines using Nvidia GPU and similar chips can now distinguish faces, animals, vehicles, languages, parts of speech, etc. Depending on the required complexity, level of details, acceptable error margin, and learning data quality, AI can learn new objects within as fast as a few seconds using Spiking Neural Network (SNN) to a few weeks using Convolution Neural Network (CNN). While both SNN and CNN offer advantages and drawbacks, they outperform tradition security systems without AI in terms of efficiency and accuracy. According to the research reports of MarketsandMarkets, the market size of perimeter intrusion detection systems is projected to increase from 4.12 billion USD in 2016 to 5.82 billion USD in 2021 at a Compound Annual Growth Rate (CAGR) of 7.1%. Meanwhile, the predicted market of AI in security (both cyber security and physical security) will grow from 3.92 billion USD in 2017 to 34.81 billion USD by 2025, i.e., with an impressive CAGR of 31.38%. Legacy Perimeter Intrusion Detection Systems Legacy perimeter intrusion detection systems (PIDSs) are typically set up with the following considerations: Geographical conditions: landscape, flora, fauna, climate (sunrise, sunset, weather conditions, etc.), whether there are undulations in the terrain that would block the field of view of cameras Presence or lack of other layers of physical protection or barriers Integration with other systems in the security network: camera, storage, other defensive lines (door, lock, alarm, etc.) Types of alarm triggers and responses System complexity: intrusion detection with various types of sensors, e.g., microwave sensors, radar sensors, vibration sensors, acoustic sensors, etc. Length of deployment Local regulations: privacy protection, whether the cameras/sensors must be visible/hidden/buried, etc., electromagnetic interferences that may affect other systems such as oil rigs or power plants Human involvement: on-site personnel arrangement, human monitoring, human action in response to alarms AI object detection can easily distinguish different types of people and objects Pain Points In Intrusion Detection Systems And Benefits Of AI The conditions listed above correspond to certain requirements of an intrusion detection systems: minimal false alarm, easy setup and maintenance, easy integration, and stable performance.AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions: it should be integrated with existing video recording systems Minimal false alarms: False alarms lead to increased cost and inefficiency but are the main problem of PIDSs without AI technology, where animals, trees, shadows, and weather conditions may trigger the sensors. AI object detection can easily distinguish different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Therefore, the amount of false alarms can be reduced by 70% to orders of magnitude. Easy setup and maintenance: Legacy PIDSs without AI must account for terrain, line of sight of cameras, sensor locations; any changes to the system would require manual effort to recalculate such factors and may disturb other components in the system. In contrast, AI PIDSs enable the system administrator to access the entire system or individual cameras from the control room, configure the region and object of interest in the field of view of cameras within minutes, and adjust with ease as often as necessary. Computing knowledge and even specific security training are not required to set up a secured PIDS with AI because AI PIDS is designed to relieve humans from knowing the inner working of machines. Easy integration with complementary technologies: Legacy PIDS without AI relies on physical technology, which are often proprietary and require complete overhaul of systems to function smoothly. On the other hand, AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions, so AI PIDS is easily integrated with existing video recording (camera) and storage (NVR) systems. AI also eliminates the need for physical wireless or fiber-based sensors; instead, it functions based on the videos captured by cameras. Furthermore, AI enables easy and instantaneous combinations of multiple layers of defense, e.g., automatic triggering of door lock, camera movement focusing and access control as soon as a specified object is detected in the region of interest, all set up with a click of a button. Stable performance and durability: Legacy PIDS without AI requires complicated setup with multiple components in order to increase detection accuracy. More components mean a higher probability of malfunction in the system, including exposure to damages (e.g., sensors can be destroyed) and delay in detection, while human monitoring is inconsistent due to human fatigue (studies have shown that a person can concentrate in mundane tasks for only up to 20 minutes, and the attention span decreases even more rapidly when humans are faced with multiple items at once, e.g., multiple camera monitoring screens). AI significantly reduces, if not completely eliminates the need for human involvement in the intrusion detection system once it is set up. In addition, AI reduces the risk of system malfunction by simplifying the hardware sensors needed. Minimizing human error and false positives are the key motivations for applying AI technologies in the security industry Additional Benefits Of AI In Intrusion Detection Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily life Maximal detection capability: The most advanced AI intrusion detection system today provides an all-in-one solution to distinguish any combination of alarm-triggering criteria beyond perimeter protection. Using AI, the system administrator can configure as many zones with different settings and object of interests as necessary, which include detections for specific colors or attributes (e.g., person not wearing the required uniform or carrying food/drink), numbers and dwell time (e.g., group of more than 5 people loitering), or movements (e.g., cars moving faster than the speed limit). In addition, AI can accurately pinpoint the location of event occurrence by displaying the camera that records the event in near real time, i.e., with few-second delays. Lower security operation cost: By minimizing the number of false positives and human involvement while maximizing ease of use and stability, AI intrusion detection systems significantly decrease the total cost of ownership. Companies can reduce the large security personnel overhead and cost of complicated and expensive legacy PIDS systems. McKinsey Global report in June 2017 shows that proactive AI adopters can realize up to 15% increase in profit margin across various industries. Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily life. In security, legacy systems are giving way to AI-based systems, and the first enterprises to adopt AI-based systems will soon, if not immediately, benefit from such investment. By Paul Sun, CEO of IronYun and Mai Truong, Marketing Manager of IronYun
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing Key Cards And Fobs With App Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognizes which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable Access Control Systems For SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favor simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving Security Dealers And Integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalizing that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS To Measure Product Quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analyzing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, N.Y., would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smart locks and building automation. This year, ASSA ABLOY is marking the 175th anniversary of the Yale brand. Global home security brand “People all over the world trust the brand to protect what they love most in their homes,” says Kate Clark, Managing Director of Yale EMEA at ASSA ABLOY. Although Yale has a successful commercial sector business in the United States, in the rest of the world Yale is a residential brand. The Yale brand is well known in 130 countries from Australia to the Czech Republic to Colombia, and is popular in Africa, too. In the EMEA (Europe, Middle East and Africa) market alone, Yale has around 20,000 products; that’s without counting products sold in the Asia-Pacific and Americas regions. Yale is familiar as a generic term for “lock” in some areas and is one of the largest home security brands in the world. Expansion Into Digital Locks Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand “I think we stand for safety, quality and reliability, and that hasn’t changed,” says Clark. “It’s as important now as ever. We have tried to pioneer new technology in the industry, new innovations. The rate of acceleration has increased, and there are so many technologies we have to understand and work with.” Growing beyond its heritage in mechanical locking systems, Yale is now expanding into digital locks that can protect homes with a high level of security synonymous with the Yale brand. The current selection of locks includes partnerships with tech brands such as Nest Labs (Google) and Alexa (Amazon). There is a rapid acceleration of growth in the electro-mechanical lock market. But even as the focus expands to smart locks and partnerships with tech companies, Yale continues to dedicate time and resources to the design of their core mechanical products. Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand. Yale padlocks and bike locks also keep the name top-of-mind. There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. Beyond Mechanical Locks And PIN Codes “It’s important for people to know that we have been around a long time, and we want to celebrate that,” says Clark. “It’s a fantastic story around the brand and what we have achieved. Internally we have a lot of people doing a lot of great things with the brand. We inspire people working with the brand and show them that this is the pedigree, and it should be cherished. We are also raising awareness among younger people, so they know that we are still relevant.” We have an obligation to show people that the new technologies are just as secure as mechanical locks" There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. “We have to take people on a journey,” says Clark. “We have an obligation to show them that the new technologies are just as secure as mechanical locks. If we eliminate PIN codes, we have to do it in a secure and safe way. Then suddenly access to your home can be made available by a company you trust.” Smart Home Security “We have a responsibility to do our best job with the new technology – it’s wonderful, but it needs to be used correctly,” says Clark. “I personally feel a responsibility to do that in the right way.” For example, in working with Amazon and Alexa to remotely authorize the delivery of a parcel to a home, concerns of security must be weighed carefully along with issues of convenience. “It’s important that we get the balance right,” says Clark. “We need to know the right person is giving the right voice command to lock a lock. We have to be true to our core as ‘security first.’” Will Yale be here another 175 years? Clark says she doesn’t expect to be around to find out but will do her best to preserve and promote the brand until she hands it off to a new caretaker.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
One French town just north of Paris faced familiar key management challenges. Each person in their Municipal Technical Centre had to carry approximately forty physical keys. If a single key was lost or stolen, for even one door, all compromised cylinders had to be changed. To prevent unauthorized access, all the keys had to be replaced, too — at great expense. Key duplication costs were mounting. “One lost key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the Villiers-le-Bel Municipal Technical Centre. Administrators can program access rights for every CLIQ key, padlock or cylinder using the Web ManagerTo fix their expensive lost key problem, Villiers-le-Bel city administrators chose to combine ABLOY’s mechanical PROTEC2 and CLIQ electromechanical locking within the same flexible, key-based access control system. Almost 500 CLIQ wireless cylinders, 850 programmable, battery-powered CLIQ keys, plus programming devices and wireless CLIQ padlocks, have been deployed in a multi-year, rolling upgrade program. CLIQ Web Manager software Now, with CLIQ, lost or stolen keys are canceled instantly using the CLIQ Web Manager software. The Web Manager works securely inside a standard browser, with no software installation needed. Administrators can program access rights for every CLIQ key, padlock or cylinder using the Web Manager. They filter access to specific sites and doors according to the precise needs of every city employee. “CLIQ Web Manager is a very easy and pleasant system to use every day,” says Fabrice Girard. CLIQ also saves time for the city’s security team, because staff no longer must return to the Technical Centre to collect the keys for multiple sites. Authorized users carry a single, programmable, battery-powered CLIQ key, where all their individually tailored access rights are stored. Wireless system to enhance safety Using the CLIQ Web Manager, security staff can track exactly who has been granted access to every school site“We wanted a wireless system with reduced maintenance costs and increased safety,” adds Fabrice Girard. “CLIQ met all these requirements.” The city has already rolled out CLIQ beyond their Municipal Technical Centre to 10 local schools. Using the CLIQ Web Manager, security staff can track exactly who has been granted access to every school site — critical for these sensitive premises and to improving overall school safety. Plans are in place to equip Villiers-le-Bel’s 12 remaining schools with CLIQ within 2 to 3 years, including canteens and boiler rooms. Because CLIQ can be deployed and scaled flexibly, the city’s dedicated security budget funds this gradual extension of their CLIQ system.
With a large campus comprising historic and modern buildings and significant research facilities and equipment, the University of Otago has assets in excess of $1.4 billion (NZD). In 2006, an internal security review of campus facilities identified that a number of critical areas – including laboratories where medical research is conducted on animals and human cadavers – could attain an increased level of security and achieve greater cost efficiency through the installation of Gallagher systems. A key priority of the security upgrade was to replace the traditional lock and key system in place in facilities across campus with Gallagher’s electronic access control solution. By moving to an entirely electronic system, the University has mitigated the risks associated with lost keys and unauthorized access. Lost and misplaced cards are reported and immediately deactivated ensuring complete control is maintained over facility access. Comprehensive alarm monitoring The team at the University of Otago needed an auditable system, capable of identifying access by people, place, and timeThe electronic system also allows for comprehensive alarm monitoring per door and per freezer, ensuring campus security is immediately notified if a door or freezer has been left open. Gallagher’s Mobile Client, available with the Command Centre v7.30 security management platform, means these alarm notifications can be communicated directly to security personnel’s Apple iPhone devices providing valuable information in real-time, to those outside of the control room. More than simply managing the access permissions across campus, the team at the University of Otago needed an auditable system, capable of identifying access by people, place, and time. Gallagher’s Command Centre application provides this high-level of traceability and enables the University to quickly and easily extract the exact information required both for internal use and for the regulatory audits required of research facilities. Identifying who accessed which areas “Due to the nature and value of our assets, it’s critical not just to control who has access to facilities but to be able to identify exactly when areas were accessed and to know who was there,” said Deputy Proctor at the University of Otago, Andrew Ferguson. Key industry challenges Eliminate the security threat that comes with lost keys Enhance the level of security for critical areas including Medical Research laboratories Procure a solution capable of producing comprehensive audit trails Introduce a secure, automated facilities management system Gallagher security products installed Command Centre Electronic card readers Syllabus Plus integration Syllabus Plus integration Syllabus Plus enables automation in the scheduling and booking of resources and equipment Founded in 1869, the University of Otago is New Zealand’s oldest university. Ranked in the top 200 universities worldwide, the University of Otago is New Zealand’s primary medical tertiary institute and is considered the top research university in New Zealand. The Gallagher system installed at the University of Otago includes a Syllabus Plus integration. Syllabus Plus enables automation in the scheduling and booking of resources and equipment through Command Centre. The University of Otago team were quick to see value in the opportunity to synchronize their access control system with class time-tables, and subsequently manage room resources by automatically unlocking doors. Easily search and book resources A key benefit for the University was a move away from the manual process of entering room bookings into Command Centre. In addition to removing the labor associated with this manual process, the university also found a reduction in the number of booking inaccuracies caused when people changed their plans, as staff can now quickly and independently reschedule their resource and room bookings if their requirements change. “Smart scheduling gives authorized users in our wider team the ability to quickly and easily search and book resources,” said Ferguson. “It’s a genuine time-saver for us and ensures our facilities are managed efficiently.” The university has implemented an ongoing software maintenance agreement with Gallagher To ensure the University of Otago’s security system remains at the forefront of technology, the university has implemented an ongoing software maintenance agreement with Gallagher to ensure they receive the latest system developments as they are released. “We would never go without software maintenance, it’s imperative that our high-end security be the best it can possibly be,” said Ferguson. Training for system operators In addition to ensuring their security products and systems are up-to-date, the University of Otago also ensures their system operators undergo regular training. According to Ferguson, “We arrange annual training with Gallagher for our Campus Watch security team. The training teaches the team valuable tips and tricks on how to utilize the system to its fullest.” During the years since the initial installation of Gallagher security systems, the University of Otago has experienced significant savings associated with not needing to re-key facilities or replace locks when traditional keys have been lost or not returned – maintenance that the University estimates used to cost tens of thousands of dollars each year.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, announced that Corning High School, in Corning, Arkansas, has increased its security and greatly enhanced its lockdown capabilities by installing the pdk io wireless access control system. Pdk io is a wireless, cloud-based solution that provides advantages such as around-the-clock accessibility, remote management, superior backup and redundancy, automated updates, and strong cyber security. The installation was undertaken by Blue Sky Technologies (Blue Sky) of Jonesboro, Arkansas. Wireless PDK solution The system is proving to be a useful tool for monitoring student traffic patterns and identifying problem behaviorsCorning High School comprises seven buildings connected by breezeways, designed in an open style common to campuses constructed in the 1960s. Integrator Blue Sky chose the wireless PDK solution because it was perfectly suited to the multi-building layout, with no need to run copper or fiber cable to all connected door locations. As a result, material and labor costs were greatly reduced – a major plus for the small and budget-conscious school district. The installation includes exterior doors for each of the classroom buildings and a few other key locations. As budgets permit, additional doors will be added throughout the high school as well as in other district buildings. The wireless connectivity makes the solution exceptionally scalable; new doors can be immediately brought online through connection with the system’s wireless mesh network without additional infrastructure. Enhancing campus security In addition to enhancing the security of the campus by automating the unlocking and locking of exterior doors to align with the high school’s bell schedule, the system is also proving to be a useful tool for monitoring student traffic patterns and identifying problem behaviors. Faculty and support staff find the pdk io system to be much more convenient than the traditional locks and keys Classrooms are each allocated with ‘student fobs’ for use by students who need to travel between buildings during class periods when doors are otherwise locked. Their use of the fobs enables administrators to track where the students go, making sure they head to the intended destination (i.e. the library or nurse’s office) rather than elsewhere. Suitable access control solution for schools Faculty and support staff find the pdk io system to be much more convenient than the traditional locks and keys that previously secured most doors. Permission groups, managed through the pdk io software, control different access levels for teachers, administrators and custodians. Programming of special door schedules, as well initiating lockdown conditions, can all be handled by the IT staff using the mobile interface. Brian Duckworth, sales consultant with Blue Sky, says, “Pdk io has become our go-to access control solution for K-12 installations because the wireless aspect leads to such major cost savings for the schools, which are always budget-challenged. In addition, the installation process causes very little disruption for the students and teachers.” Keeping students safe and secure Pdk io is ideal for K-12 applications, providing educators with a tool that’s powerful and easy to manage"School Superintendent Kellee Smith adds, “We strive to make our campus a place where our students enjoy the freedom to focus fully on learning because they’re not worrying about safety and security. This solution is making our goal so much easier to meet. It’s also making the teachers’ daily routines less stressful and they really like it.” “PDK is passionate about creating technology that delivers security and peace-of-mind, and what could be more important than keeping our children safe?” says ProdataKey’s President, Jeffery Perri. “Pdk io is ideal for K-12 applications, providing educators with a tool that’s powerful and easy to manage, affordable, scalable over time, and is sure to provide value for the long term.”
Business Finland together with Metsä Group is creating the Metsä pavilion for the 2020 summer Olympics and Paralympics in the grounds of Embassy of Finland in the heart of Tokyo. The pavilion will operate as the official National Hospitality House during the Olympics and Paralympics for Finnish teams. digital locking systems Among the topics promoted in the pavilion are smart energy, sustainability, digitalization, health and wellbeing Among the topics promoted in the pavilion are smart energy, sustainability, digitalization, health and wellbeing. It was a logical decision therefore that iLOQ would be a partner of the Metsä pavilion, and deliver its self-powered, digital locking system to the house. iLOQ is an innovator in the locking industry and has a strong portfolio of safe and sustainable products that maximize safety and minimize administration and lifecycle costs. iLOQ’s mobile and digital locking systems are self-powered and enable electronic locking without batteries or cables. They cater to the needs of industry and the utility sector by providing smart locking and secure and simple access management solutions for the buildings and spaces used daily. President and CEO of iLOQ, Heikki Hiltunen, commented: “We are delighted to showcase our state-of-the-art and environmentally friendly digital and mobile access management systems in the Metsä pavilion. This will open business opportunities for us in the Japanese markets and among Japanese customers and will help us establish new connections with partners in the region and globally”. Advanced remote control services In accordance with the Company’s environmental program, iLOQ conserves natural resources and the environment. For example, it maximizes the usability of their products, minimizes battery and metal waste, favors recyclable packaging and reduces the need for maintenance-related travel by developing advanced remotely control services. Every year, iLOQ’s solutions save 27,000 kg or battery waste and, compared to mechanical locking solutions, 7000 kg of metal waste. The aim of the pavilion is to provide Finnish companies with the opportunity to create new business in Japan and gain new contacts in the market. iLOQ – Metsa platform integartion We are happy to cooperate with iLOQ and present their locking solutions “We are happy to cooperate with iLOQ and present their locking solutions among other leading Finnish technologies in the Metsä pavilion. We believe that Finland can offer numerous complementary products, services and innovations for Japan” states Petri Tulensalo, Head of Sports Cluster, Business Finland. Joni Lampinen, Chief Marketing Officer, explains: “We are looking forward to working closely with the Metsä pavilion and raising iLOQ’s brand awareness in Asia. We have a lot to offer customers and partners in the region, and they will be able to see this firsthand as our locking systems will be in use in the pavilion”.
Responsible for the safety and security of a huge number of public facilities, including leisure centers, libraries and event spaces, local authorities are increasingly looking for ways to improve security, while also streamlining the security management process. With multiple requirements from a legislative, insurance and public safety perspective, local authorities need a simple and effective solution that provides flexibility through advanced technology. Security must be closely monitored and access restricted where necessary, while at the same time enabling easy access to public areas. Electronic Key Technology Advanced software suites can provide access to all operations performed by users Through innovative electronic key technology, local authorities can simply and cost-effectively replace existing mechanical locks, with a solution that provides integrated intelligence in the key, with permissions stored within it. If your key has authorization for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by your key will be recorded. With high volumes of people entering and exiting local authority facilities, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by local authorities for audits, improvements or compliance. Utilising the latest contactless technology further enhances the electronic key solution, enabling multiple access options and deeper levels of access rights. Manage Access Operations The most innovative system is compatible with badges and cards, and the keys are equipped with a radio-frequency identification (RFID) module. Combining the solutions enables local authorities to manage access operations in great detail, with access rights granted depending on specific conditions. For example, the members of an orchestra may only be able to access the music conservatory, using their membership card or badge, if a music professor has already entered the premises using his electronic key. Permissions can be added or updated from a computer or, even more conveniently, using an app on a smartphone at any time, which will update your key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with local authority access policies and removes travel and fixed authoriser costs. Public Safety And Security Saint-Avertin's access points are now managed by the new LOCKEN solution In turn, this delivers increased flexibility and higher levels of security. With public safety and security high on the government’s agenda, local authorities are increasingly required to adopt the most technologically advanced access control solutions and LOCKEN, the leader in cable free access control solutions is on hand to help with their solution based on advanced software LOCKEN Smart Access. Equipped with LOCKEN electronic cylinders since 2010, Saint-Avertin's access points are now managed by the new LOCKEN solution. More efficient and communicative, this makes it possible to adapt to even more varied types of access. Laurent Lacour, head of the municipal police, highlighted the benefits of this decision: “It is a very positive step for us. Firstly, because the new contactless key is much faster than the previous one. It is impressive and very important for our day-to-day work: as soon as the key is entered into the lock, the cylinder opens. It opens regardless of whether any dust or foreign bodies have built up." New-Generation Keys “Above all, the MyLocken app significantly enhances the system’s security by allowing rights to be allocated anywhere and at any time.” Christophe Fort, deputy head of the police, added: “The new-generation keys offer another vital advantage for our town. The system is compatible with the use of badges and the keys are equipped with an RFID module, which acts as a badge.” While an electronic key cannot be given to every member of a sports association, it is possible to give the members a badge. This means that, eventually, several thousand people will have access to the facilities while respecting the security of the premises as a whole. Access Control Solution Combining the solutions does not stop the management system from remaining perfectly effective" “Combining the solutions does not stop the management system from remaining perfectly effective. On the one hand, because the program manages access operations in great detail. And on the other, the badge reader specific to a building is only triggered if access to the site has previously been unlocked by an electronic key belonging to a manager. For example, the members of a swimming association will only be able to access the building if a swimming pool manager is already on the premises.” The future prospects mentioned by the two police officials - installation in a new gymnasium, fitting electronic padlocks to the mobile barriers around the château, etc.- demonstrate the extent to which the solution meets the municipality's needs across the board. Saint-Avertin, is a dynamic town with a population of 15,000, which forms part of the university town of Tours, twenty times larger. LOCKEN hopes to extend its access control solution to other areas of this historic city.
Each of Denmark’s 550 individual Free Schools shares a common ethos: parents and students participate together in activities outside school hours, including weekends. It’s excellent for building a school community. Not so easy for managing security, when issuing and tracking keys becomes a 7-day task every week. The Vejle Friskole turned to SMARTair® wireless access control for a solution. Previously, key management ate up “a very long time, approximately 5 hours a week,” explains Henrik Kækel, Technical Service Officer at Vejle Friskole. Individual Access Permissions Vejle Friskole’s mechanical keys have been replaced by a SMARTair access control system Secure wireless electronic locks, already proven in schools across Europe, were the answer. Vejle Friskole’s mechanical keys have been replaced by a SMARTair® access control system. Over 80 doors and cabinets around the school are secured with SMARTair® wireless devices. Even at a historic property like Vejle Friskole, battery-powered SMARTair® devices are easy and unobtrusive to retrofit. Now approximately 250 students, teachers and parents each carry their own key fob, programmed with individual access permissions. Because the SMARTair® system portfolio has locking devices tailored to different kinds of openings, everyone at the Friskole opens the right doors and cabinets with a single fob. There’s no more need for the school to distribute separate keys for student or staff lockers, for example. Issuing Fobs “It was really bad because we had big problems with keys that were lost,” says Henrik Kækel. “There was a lot of work in key administration.” SMARTair® is easy for the school to manage. Today, Vejle Friskole staff spend around 5 minutes a week managing their access system. It's incredibly easy to figure out... it takes 1 minute to code a student" “It's incredibly easy to figure out... it takes 1 minute to code a student,” he adds. Even managing the leasing of school buildings for non-school events is simple and secure. School facilities staff issue fobs for the duration of the event, then cancel them immediately afterward – with no concerns someone may have copied a physical key. Saving Staff Time In addition to making everyday life easier and saving staff time and admin costs, SMARTair® has increased security. Using the intuitive SMARTair® software, they always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using their SMARTair® system. And it's no disaster if a credential gets lost. Henrik adds: “Then we cancel the credential and issue a new one.” Vejle Friskole’s SMARTair® system is easy, fast and cost-effective to extend to new doors, cabinets and users — at the beginning of a new school year, or any time they choose.