Mobile access
Mobile access products
Mobile access news
Zenitel, a provider of intelligent communication solutions, announced the launch of two new door entry intercoms: the Turbine Extended Intercoms TEIV1+ and the TEIV4+. The new products display Zenitel's commitment to providing convenient and secure entry via best-in-class audio and video performance with hassle-free access control. New door entry intercoms "'Secure, Convenient Access' is the key message behind the product launch. We are excited to provide security system integrators and building owners with these new door entry intercoms,” says Peter McKeag, Product Manager for Zenitel. Peter McKeag adds, “Our goal is to help them simplify and secure their access control solutions. We also want to provide them with the freedom to select third-party accessories to meet their project's requirements.” TEIV1+, TEIV4+ The TEIV4+ is designed to provide convenient access with a card reader of the user’s choice The TEIV1+ is designed to simplify a visitor’s experience with PIN-based access control and easy-to-use scroll and direct calls. The TEIV4+ is designed to provide convenient access with a card reader of the user’s choice. With the TEIV4+ it is also possible to house access control card readers like HID & Elatec, removing the need for separate card reader mounting products. Audio and active Noise reduction features Extending on Zenitel’s world-renowned Turbine platform, both new intercoms are engineered to provide the best audio and video communication performance tailored to every environment. Zenitel’s solutions deliver the best audio technology, with Automatic Volume Control, Acoustic Echo Cancellation, and Active Noise Reduction features. HD video quality This new range further expands its feature set with a wide-angle lens and exceptional low-light performance while maintaining HD video quality. As always, Zenitel products are engineered to provide high availability, even in the most demanding environments. They are backed by Zenitel’s promise of long-lifetime components, up-to-date technologies, and long-term technical support of systems and devices.
More than one million electric vehicles are registered in the U.S.—and they all have to plug in somewhere. As EV charging stations pop up across the country, one of the chief questions will be how charging station users are identified, authenticated, and connected with membership or payment systems. Radio-frequency identification cards and tokens and smartphone authentication apps have emerged as two viable options for EV charging authentication. Which is best? It may depend on the user base they plan to serve. User authentication for EV charging Most electric vehicle owners have a spot to plug in while at home, either in their own garage or carport or in a designated charging spot in a tenant parking garage. But electric vehicles also need spots to charge while owners are out and about. The EV charging market is broadly divided into two tiers: Level 2 charging stations, which operate at 208-240 V and use AC power. These stations will add 20-25 miles of range in about an hour of charging. The U.S. Department of Transportation listed more than 22,800 public Level 2 EV charging stations across the nation as of mid-2020. They are commonly found in public parking lots and garages, hotels, grocery stores, malls, and other commercial areas. They may also be installed in private parking garages and business parking lots for use by tenants, employees or fleet drivers. Collecting membership data Direct Current Fast Chargers (DCFS) are designed to charge an EV battery to about 80% in 20-30 minutes. There are currently about 15,000 DCFC stations across the U.S., but their numbers are expected to explode as more people start taking EVs on longer road trips. They are commonly found along major interstate highways. As the market evolves, user authentication requirements for EV charging stations are likely to vary by type, location, and user base. Some commercial locations may provide Level 2 EV charging as a free amenity to shoppers, guests or employees. If there is no charge for the service, there may be no need to authenticate users at all— people can simply park and plug at any available spot. However, there may be a benefit to collecting membership data (e.g., shopper reward club). Private charging stations Public, for-profit EV charging stations, like gas stations, need a method to collect payment for their services. In some cases (especially at roadside DCFS stations), users may simply pay for the minutes used with a credit card—just like at the gas station pump. However, many EV charging station users are already accustomed to identifying themselves with an RFID membership card or a smartphone app. Charging networks like ChargePoint and Blink enable members to access any EV charging station within their networks with a card or smartphone app, which connects to their membership, account, and payment information. Private charging stations—such as those offered to tenants, employees or fleet drivers—may not require payment but need to ensure that only authorized drivers are accessing power and taking up valuable parking spots. An RFID card or smartphone app can be used to identify authorized drivers and track charging behaviors. Moving forward, many EV charging stations may find that they need a mix of options for users, including membership cards, smartphone apps, and a credit card payment option for out-of-network drivers. Choosing between RFID and smartphone apps In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue When user identification and authentication are desirable, which is the better option: RFID cards or smartphone authentication? Both have their uses in the EV charging market. In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue. And for some users bases, they may not have to issue a new card at all—they can take advantage of an RFID card they already carry. In many cases, it is possible to leverage existing employee IDs and membership cards for access to privately controlled EV charging stations. RFID membership cards may be a good bet for: Fleet drivers who already carry an RFID card for vehicle access. Employee parking lots and garages where people already use a card for entry. EV charging parking spots at gyms or other locations where users want to limit charging access to active members. EV charging stations Most consumers would prefer not to have to carry a physical membership card for every retail outlet On the other hand, public charging stations may find that consumers would prefer to use a smartphone app rather than receive another membership card to carry in a physical wallet. Many consumers prefer to carry only their phone and one or two essential cards (such as a driver’s license and a single credit or debit card). As more retailers enable consumers to pay via a digital wallet app on their smartphones, some don’t even carry a physical credit card anymore. Most consumers would prefer not to have to carry a physical membership card for every retail outlet they visit—and that includes EV charging stations. Smartphone apps for user authentication are simple to set up and highly secure. Instead of RFID, they typically use either Bluetooth® Low Energy (BLE) or Near-field Communication (NFC) protocols. Public charging stations For the user, the experience is almost identical to RFID authentication, except they wave a smartphone over the reader instead of a card. Apps have other user benefits, too. A custom app for EV charging can be configured to help users locate or reserve charging stations, check their balance and usage history, and change their payment options right on their phone. These features make smartphone authentication ideal for consumers These features make smartphone authentication ideal for consumers accessing a network of public charging stations. However, EV charging network managers should keep in mind that some users may still want a physical membership card. Smartphone-Based authentication There are still some user populations, such as older consumers and those from lower income brackets, where smartphone ownership is not ubiquitous. If users are primarily using EV charging for a fleet vehicle, they may not want to download an application for work on their personal cell phone. Other users may find smartphone apps confusing or simply prefer to have a card for other reasons. The answer for both public EV charging networks and private charging station owners is to have an RFID reader that is capable of both card-based and smartphone-based authentication. This will provide maximum flexibility as user preferences change. Finding the right RFID reader for EV charging The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations The best RFID reader for EV charging is one that is flexible enough to meet the needs of all user populations and evolve as requirements change. The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations. The readers support 60+ RFID transponder technologies along with BLE and NFC smartphone authentication. This means that one reader can support all common technologies already in use across the entire user base—both nationally and internationally. This capability becomes important for applications where users want to enable drivers to use an existing RFID card (such as their employee or fleet ID card or an access card for a tenant parking garage) for access to charging locations. It also provides more flexibility as technologies or preferences change in the future. Supporting advanced encryption TWN4 MultiTech supports advanced encryption and security configurations for highly secure transactions between the card or smartphone and the reader. This is important for EV charging applications tied to payment or employee/driver identification. ELATEC readers are mobile-ready. The ELATEC Mobile Badge BLE NFC App offers simple and effective components for building or extending a mobile application for EV charging networks. Non-managed mobile credentialing using the ELATEC app is free. TWN4 MultiTech readers also work with multiple existing third-party managed credential systems, such as KleverKey, Safetrust, and Transact. The TWN4 MultiTech is easy to customize with the powerful Software Development Kit (DevPack) and App Blaster and Director utilities. Readers can be easily configured to support custom functionality (such as LED light flashing sequences or sounds for user feedback) and integration with backend software for easier member management. The DevPack tools make the TWN4 family the most powerful, versatile, and sustainable readers on the market. Hardware communication interfaces As electric vehicles move from niche to mainstream, EV charging infrastructure will need to grow and evolve to accommodate millions more drivers—both in the consumer market and in commercial fleets. With TWN4 MultiTech, EV charging station managers will be ready. Interested in learning more about technical considerations for RFID? Download 11 Considerations for Embedded System RFID Readers for additional advice, including operating power and consumption requirements, antenna placement, hardware communication interfaces, and more.
trinamiX, a provider of biometric solutions, showcases their invisible integration of secure Face Authentication into a foldable screen for smartphones. The solution is integrated behind OLED and offers enhanced security and convenience for users, without compromising on display quality or device slimness. It will be demonstrated at the International Display Week, hosted by the International Society for Information Display (SID) in San Jose, USA from May 14-16, 2024. OLED display The featured OLED display meets the growing demand for secure Face Authentication in foldable smartphones. The unique patented technology of trinamiX securely verifies a user’s identity by differentiating between human skin and other materials for reliable liveness detection. This integration does not require punch holes or notches, allowing users to fully utilize the large screen of foldable phones. The result is an immersive visual experience. Face authentication “It is an exciting challenge to integrate secure face authentication behind a foldable OLED screen for the first time," says Stefan Metz, Director of Consumer Electronics Asia, trinamiX GmbH. "trinamiX Face Authentication not only operates invisibly under the foldable screen, but thanks to its small form factor, the module is also easy to integrate without compromising the design. This is a major technological breakthrough for foldable smartphones, and we are convinced that it will attract great interest from smartphone manufacturers." trinamiX liveness detection The touchless solution offers enhanced security and convenience, meeting the biometric security requirements trinamiX Face Authentication utilizes regular 2D face detection and recognition, along with its unique liveness checks based on skin detection. This touchless solution offers enhanced security and convenience, meeting the biometric security requirements set by organizations such as the International Internet Finance Authentication Alliance (IIFAA), the FIDO Alliance, and Android (Google). Android integration and applications The solution has been approved for Android integration and high-security applications, including digital payment processes. The implementation of trinamiX Face Authentication behind OLED, without compromising device slimness, sets a new standard for secure and impressive smartphone experiences.
Codelocks (Australia) Pty Ltd, an access control company that designs and distributes innovative, standalone keyless door locks, is celebrating ten years of providing leading-edge mechanical and electronic access control solutions to the APAC market. In ten years, the Australian arm of the global company, headquartered in the UK with subsidiary offices in North America and Europe, has grown into a multi-million AUS dollar business serving over 1,500 clients across Australia, New Zealand, and Asia. Doors of cabinet makers Mark Samuelson was one of the first appointments made at Codelocks Australia Codelocks’ APAC General Manager, Mark Samuelson was one of the first appointments made at Codelocks Australia and has steered the company to its tenth anniversary. Mark Samuelson said, “When we first set up the Codelocks Asia Pacific entity, we had little market share and there was very low recognition of Codelocks as a player in the market, so building brand awareness became our number one priority.” Mark and his colleagues set about bringing the Codelocks brand to the market by knocking on the doors of cabinet makers and joiners and exhibiting at trade shows including the AWISA (Australian Woodworking Industry Suppliers Association) exhibition, no vacancy, and local industry organizations like the Master Locksmiths Association of Australia and the Locksmith Guild of Australia. Holding significant stocks Codelocks’ reputation for reliable, cost-effective, and easy-to-fit and program access control products combined with its focus on exemplary service and support has seen it become the first choice for hundreds of businesses across hospitality, mining, banking, retail, education, healthcare, and government. By holding significant stocks Codelocks Australia can service customer demand, whether this be for a single unit or several thousand units. This is part of the company’s ethos to provide a level of service that is determined by the customer and is unparalleled in the industry. Network of industry and channel partners Colin Campbell, Managing Director of Codelocks puts the success of Codelocks Australia down to the firm foundation that Mark Samuelson and his fellow Director, Adrian Young built through sheer hard work and determination. Colin Campbell said, “The growth of the company has been stellar, and that’s down to Mark and Adrian having a strong strategy from the outset and the commitment to see their strategy through. We have seen their model pay off, with strong sales through a network of industry and channel partners who actively champion Codelocks’ solutions.” Easy-to-use access control products Mark Samuelson said, "Ten years ago electronic locks weren’t a big thing, and we had some work to do to convince joiners and cabinet makers of their suitability. We took care to build out from having a single level of reseller by engaging a level of expert partners who are a channel to the locksmiths, and another that works with specifiers and architects." He adds, "Now whenever you walk through an airport or go to a gym, school, hospital, or large retail chain, the chances are you’ll see Codelocks’ products on doors and cabinets." Codelocks moved into larger offices in Chatswood, NSW Last year, Codelocks moved into larger offices in Chatswood, NSW. This was essential to meet the increasing demand for its range of easy-to-use access control products which are sold directly through the company’s website, by specialist trade retailers and via a network of distributors and cabinet makers.
Security beat
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organization created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalize identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorized access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signaling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specializing in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Mobile access articles
RFID and emerging mobile access technologies are easy to implement and allow elevator access to be integrated with other access control solutions throughout the building, from building entry to printer access. The right RFID reader can help reduce complexity by migrating diverse older technologies into a single convenient solution. Ways RFID Works Radio-frequency identification (RFID) and smartphone-based credentialling systems using Bluetooth® Low Energy (BLE) or Near-Field Communication (NFC) improve building security by limiting floor or elevator bank access to authorized persons. An RFID reader is integrated with elevator control panel. Employees or tenants use an RFID card (typically the same ID card they use for facility access) or smartphone to authenticate themselves when they step into the elevator. The RFID reader sends information to a software system that unlocks the floors that the person is authorized to access. Buttons for floors the user is not authorized to access remain non-operational. Benefits of RFID RFID provides a number of benefits for end users, building managers, and solution providers. RFID builds on existing building security infrastructure, such as an employee ID or tenant access card, or a smartphone. RFID provides simple, fast, and convenient access to building floors for authorized employees or tenants—all they have to do is wave their ID card or smartphone in front of the elevator access panel. Access can be managed through a centralized system, so elevator users can only access floors they are authorized to visit. Access can be managed by elevator bank or floor to restrict access to secure or members-only spaces or support the security needs of tenants in multi-tenant buildings. Choosing RFID Reader RFID readers/writers come with a broad range of capabilities and configurations RFID readers/writers come with a broad range of capabilities and configurations. One should make sure to invest in an option that provides the flexibility and security required to meet customers’ requirements for flexibility, convenience, and security. If one has multiple older technologies in place, one should look for a universal solution that will allow easy migration of all systems into a single solution that works with any transponder technology, anywhere in the world. It must provide flexibility so it will continue to meet needs for years to come as device specifications and end-user requirements change. The key to a successful implementation depends on hardware, software, and service—and how they all work together. When choosing an RFID reader, one should take all of these factors into consideration.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organizations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic – such as cell phones. Mobile phones have revolutionized the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organizations are adopting comprehensive risk management tools that empower personnel across the organization with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signaling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimize harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimize harm Adopting this technology and establishing a culture that enforces risk management across an organization is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organization’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Mobile access case studies
Caron Engineering needed a smart, secure RFID reader that would allow them to add operator authentication and log-in to their solutions for US and international CNC machining market customers and to enable those customers to use their current employee badge system. The reader needed to: Provide secure and accurate user identification, authorization, and access control. Read all of the RFID card technologies their clients might be using. Be easy to reconfigure for new technologies of functionality. Mount cleanly and securely to the exterior controls area of their machines. Be able to withstand industrial environments. Situation Established in 1986, Caron Engineering Inc develops advanced sensor and monitoring technology to optimize performance, productivity, and profitability for the machine tool industry. Their largest customers are in the aerospace, medical equipment, and defense industries. Demands These products utilize high-precision sensors and high-speed data processing units to make real-time adjustments Caron Engineering’s smart manufacturing products are sold worldwide and interface with virtually all CNC machine tools on the market. These products utilize high-precision sensors and high-speed data processing units to make real-time automated adjustments, optimize machining, and provide valuable information about the cutting process and the machine’s health. Finding and retaining skilled operators is increasingly tricky for Caron Engineering's customers. As a result, operator training demands are high, and so there is a need for workforce tracking and continuous process optimization. Challenge Caron Engineering realized that the "who" is typically the missing link in manufacturing data. Understanding operator identity is the key to enabling data-driven decisions in the modern factory. Machine authentication allows plants to incorporate worker activity at a granular level within the production environment and ensures that only trained, authorized operators can access machine controls. Lack of traceability with physical keys Access control is enabled using passwords and PINs, often forgotten or likewise shared among staff When there is access control, current machine access control is typically done with physical keys, keys often left in the machine, lost, or shared among the workforce. Or access control is enabled using passwords and PINs, often forgotten or likewise shared among staff including staff who shouldn’t be touching the equipment or performing a specific function. Generally, there is no traceability; when something goes wrong, the responsible party is unknown. Need for RFID solution Caron Engineering and its customers required an RFID reader solution to integrate with their MiConnect CNC control interface software to ensure only authorized operators could access equipment and specific software. They also needed authentication to ensure operators were adequately trained and traceability for reporting and improvement purposes. With the shortage of skilled operators, such training is essential for process optimization. Solution The ELATEC TWN4 Slim reader met The Slim is configurable for all the major RFID card transponder technologies used worldwide Caron Engineering’s requirements and more. The Slim is configurable for all the major RFID card transponder technologies used worldwide, more than 60, maximizing their market opportunities and helping them better serve customers using multiple technologies. Their customers use the same corporate ID cards used for building entry to grant authorized employees access to their manufacturing software and equipment. Remote configuration With its flexible architecture and open API, the Slim reader can be remotely re-configured to activate new card technologies or upgrade firmware to meet emerging security and functionality requirements. Or a contactless card may be presented to the reader, no touch labor required. The Slim is integrated with the Caron Engineering middle- and backend software, so every time an operator or maintenance worker runs the equipment, it is logged along with who did it when they did it, and what actions they performed. Machine operator authentication and access control Caron Engineering has hundreds of its MiConnect software applications installed in locations around the world. And where it has been implemented with the TWN4 Slim reader, it provides secure, reliable machine operator authentication and access control to help their customers ensure workforce training authorization and safety to optimize their manufacturing processes. Optimized turnkey solutions It helps eliminate errors by knowing exactly which operator is doing what and allows reporting back" “RFID-enabled machine operator authentication provides a check and balance. It helps eliminate errors by knowing exactly which operator is doing what and allows reporting back to the operator for improvement and where training is needed. They have accountability through the badge reader system." "Our goal is to provide turnkey solutions for our customers to optimize and control their production processes. Machine operator authentication and tracking with ELATEC RFID badge readers helps us do just that,” Rob Caron, CEO, of Caron Engineering, Inc. Benefits Integrating the ELATEC TWN4 Slim reader has significantly benefited Caron Engineering's machining customers. Firstly, the seamless integration of the Slim reader with existing corporate ID cards has streamlined access control processes. authorized employees conveniently use their familiar ID cards, eliminating the need for additional access credentials and reducing administrative burden. Secondly, the comprehensive traceability of the Slim reader with MiConnect software enables effective monitoring of operator activities. Detailed information, including the operator, timestamp, and equipment used, is tracked, fostering accountability and facilitating targeted analysis for troubleshooting and process improvement. Lastly, the Slim reader's flexible architecture and open API ensure future-proof functionality. Remote reconfiguration capabilities allow easy adaptation to new card technologies or firmware upgrades, ensuring compatibility with evolving security standards and industry requirements. Implementing the ELATEC TWN4 Slim reader empowers Caron Engineering's customers with enhanced workforce management, improved security, and optimized manufacturing processes.
UV-Concepts develops and manufactures innovative no-touch disinfection solutions using the ultraviolet UV-C germicidal wavelength of 254nm. Their flagship product is the UVE™ UV-C Enclosure, a purpose-built platform for the disinfection of primarily portable medical equipment in hospitals and other healthcare environments. Safety with RFID reader Healthcare-associated infections (HAIs) have been in the spotlight for decades, but with the COVID-19 global pandemic, infection control and prevention have become urgent priorities. The RFID reader provides a critical safety layer because of the risks of exposure to UV light. Staff is trained in the proper use of the device and only then are they authorized via their RFID badge to operate the equipment. Proper operation is tracked and flagged where additional training may be necessary. Badge reading Badge reading allows administrators to have complete oversight of the personnel using the product" “Badge reading is an essential component of our protocol management platform,” says Jeremy Starkweather, CEO, UV-Concepts. "This allows administrators to have oversight of the process, and also allows them to have complete oversight of the personnel using the product. It also helps us understand if somebody is using the product appropriately.” Challenge UV-Concepts realized the limitations of the previous readers they were using. First, as the readers were not multi-technology, they could not accommodate customers that used a mix of RFID card technologies at different locations or who changed technologies after implementation, except by issuing additional RFID. Second, their readers were single, a low frequency which limited the degree to which they could secure confidential information such as employee names and badges. Third, the readers could not be customized to provide the audible and visual feedback UV-Concepts desired for the user, And finally, the previous readers were not aesthetically consistent with the high-tech design of the UVE™. UV-Concepts wanted a single reader that would work with all of the technologies used by their customers. The reader needed to be secure and encryption-capable, easy to reconfigure after installation to meet the needs of customers who changed card technologies, and look like a high-tech medical equipment component should. Requirements: smart, secure RFID reader solution UV-Concepts wanted a smart, secure RFID reader solution that would meet the needs of its burgeoning global healthcare and commercial market customers. The reader needed to be able to: Provide secure and accurate user identification, authorization, and access control. Read all of the card technologies their clients might be using. Be easy to reconfigure for new technologies or functionality. Have a high-aesthetic quality consistent with their product design. Solution: ELATEC TWN4 Palon Compact Panel Reader The Palon is configurable for 60+ RFID card transponder technologies, maximizing market opportunities The ELATEC TWN4 Palon Compact Panel Reader met all of UV-Concept's requirements and more. The Palon is configurable for 60+ RFID card transponder technologies, maximizing their market opportunities and helping them better serve customers using multiple technologies. Their customers can use the same corporate ID cards that employees use for front door access to enable access to the UVE™ for authorized employees. Contactless solution with UVE™ digital tagging With its flexible architecture and open API, the Palon can be remotely reconfigured to activate new card technologies or upgrade firmware to meet emerging security and functionality requirements. Or, a contactless card may be presented to the reader, no-touch labor required. The Palon is integrated with the UVE™ digital tagging system and backend software so every time a disinfection cycle runs it is tracked along with who did it, when they did it, and what they did it on. Secure, reliable user identification and access control The reader helps its customers ensure staff authorization and safety in the disinfecting of medical equipment UV-Concepts has dozens of the UVE™ installed in locations around the world. And its TWN4 Palon Compact Panel Reader provides secure, reliable user identification and access control to help its customers ensure staff authorization and safety in the disinfecting of medical equipment, and most importantly, the protection of the vulnerable patients served. “Even though it's a component, the ELATEC reader is essential to the UVE™ process and safety. I believe UV-Concepts are making an impact on this planet with our technology. What you guys are doing is making an impact too, so thank you for that,” said Jeremy. Product: TWN4 PALON compact panel reader Compact and adaptable Reads 60+ transponder technologies Certified for use in numerous countries Easy to reconfigure Robust polycarbonate housing ELATEC recommended the TWN4 Palon Compact Panel Reader, a compact and powerful RFID reader/writer with flexible architecture and open API that can accommodate 60+ card technologies. Benefits Compatible with numerous RFID badge technologies. Compact to fit the form-factor of customer hardware. Supports rapid contactless configuration and updates. Easy and secure installation and integration.
Geekplus, the global pioneer in mobile robot and smart logistics solutions, has deployed the first Shelf-to-Person PopPick project in the Nordics for one of the biggest online pharmacy wholesalers in the region, Med24.dk. System Teknik partnered on the Denmark project, which includes three PopPick stations and 30 Shelf-to-Person robots, bringing a flexible solution to a region where fixed automation still dominates. "With the rise of e-commerce, Med24.dk had been struggling with huge sales growth coupled with fast delivery demands from customers in Denmark, Norway, Sweden searching for pharmacy, health and beauty products. Peak season events had also caused considerable strain to their operations," said Blond Shkodrani, channel partner manager for the Nordics at Geekplus. "Due to their overwhelming success, Med24.dk needed a modular, automated order fulfillment solution for fast, efficient order fulfillment." Order fulfillment challenges Shelf-to-Person takes goods of all sizes while removing the need for infrastructure investment The Geekplus modular Shelf-to-Person solution optimizes warehouse operations using mobile robots to transport shelves. In a region where fixed and cubic solutions have been the trend during recent years, Shelf-to-Person handles goods of all sizes while removing the need for infrastructure investment, making it the most flexible response to order fulfillment challenges. PopPick workstations use two retrieval arms and four presentation locations to present pickers with multiple, moveable 78-tote racks at one time, resulting in an industry-pioneering throughput of 450 totes per hour. PopPick can store goods of all types and sizes; the solution is not limited to small pieces and improves ergonomics for workers while picking. It also takes up less space than traditional systems, so customers can use more stations without adding facility space. Mobile order fulfillment solutions "We are very pleased to invest in flooring robots from Geekplus," said Med24.dk CEO Nils Træholt. "We believe that this new and innovative technology can help us realize our growth ambitions, while maintaining good delivery times for the benefit of our customers." Morten Kirch, System Teknik's CSO, added: "Due to Med24.dk's growth, we are thrilled to be able to deliver a tailor-made, automated solution that matches their needs." Geekplus offers a suite of Goods-to-Person mobile order fulfillment solutions-the only comprehensive robotic offering controlled by a single software platform. "Through trusted partners like System Teknik, we're showing customers all over Europe that Geekplus truly is a one-stop shop for modular warehouse automation," Shkodrani said.
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travelers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognizing this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritize security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Mobile access white papers
RFID For GMP/GLP Environments
DownloadAttention OEMs: 5 Ways RFID Readers Can Secure Your Markets
DownloadBoost Efficiency And Streamline Security With Integrated Access Control
DownloadThe Top 4 Reasons To Upgrade Physical Security With The Cloud
DownloadAccess Control: The Enterprise Buyer's Guide
DownloadEffectively Branding A Multifamily Property
Download6 Good Reasons To Embrace Mobile Credentialing
DownloadThe Wireless Access Control Report 2023
DownloadCybersecurity in Keyless Access Management
DownloadThree Essential Reasons To Upgrade Your Access Control Technology In 2022
Download10 Top Insights In Access, Cloud And More
DownloadMoving to Mobile: A Guide for Businesses Switching to Mobile Access Control
DownloadWireless Access Control eBook
DownloadThe Critical Importance of Trusted Execution Environment in Access Control
DownloadFour Areas to Consider in Frictionless Access Control
Download