Near Field Communication
Allegion, the globally renowned provider of security products and solutions, including Schlage readers and locks, together with CBORD, a renowned higher education technology solutions provider, announced that they have expanded their offerings and now provide on-campus mobile credential solutions on Android phones. Students, faculty and staff on participating campuses can now use their Android phones to conveniently, safely and securely access campus buildings and make purchases through Google...
Suprema, a global renowned company in access control, biometrics and time & attendance solutions, has announced that it has been chosen as the top brand for access control management software and mobile access solution, in a survey of over 500 respondents in security industry participants and end users. Top brand for access control The survey, by a renowned industry media, asked systems integrators, distributors, consultants and end-users in a variety of verticals to choose the top brands...
CIE (CIE Security), a global distributor of audio-visual and security brands, is pleased to announce the UK launch of the A05C Access Control Unit from Akuvox (Akuvox Networks). The A05C is the first of Akuvox’s brand new series of smart IP access control readers and features a distinct 5-inch HD color screen that is attractive in design and easy to use. AI and dual-camera Technology The A05C is one of the most advanced IP access control readers available on the market The unit also inc...
Following the outbreak of COVID-19 and the pandemic everyone is living through, the uptake in touchless access control which was previously gaining in popularity has been accelerated driving digital transformation across many industries and technologies. Among these is the rapid growth of mobile and cloud-based systems that make access control a simple and secure solution for businesses to manage keys, users, and doors across multiple locations, simply and conveniently. SALTO Systems, which has...
If you’re a security or facilities manager, you may already be aware of the quiet revolution that’s taking place across businesses and organizations up and down the country. By the end of 2020, 20% of all ID and access control systems featured mobile capability, and this is set to increase by a further 34% over the next three years. There’s no doubt that using a smartphone or mobile device in place of traditional credential and access control is a growing trend that’s o...
Herta launches a new version of access control with key functionalities to face a new normal that will require more security and precision than ever. The latest BioAccess has new functionalities such as mask detection, which helps ensure compliance with current health regulations as well as helping businesses and societies create safer spaces. On the other hand, the new version has also included a liveness detection system (antispoofing) that alerts when someone tries to impersonate an identity...
HID Global has released a ‘customer advisory’ on the use of third-party ‘parasitic’ devices that harvest power from the host HID reader. HID customer advisory The company states in the advisory that using the devices with an HID reader is an improper modification and misuse of the HID reader and the HID products used in conjunction with the reader. HID also lists devices from Safetrust, Proxy, Suprema and Zerv in the advisory. Steve Carney, Vice President of Product Marketing for Physical Access Control Systems (PACS) at HID Global, elaborates on the advisory with a Q&A. Q: Describe the evolution and background of the issue of ‘unauthorized use of third-party devices’. Steve Carney: HID Global became aware of devices that attach, connect to, and adhere to HID readers from customers asking if they had tested or approved of them. Q: What is a ‘parasitic’ device and how does it differ from any other third-party device that, for example, might be integrated with HID Global systems? Steve Carney: A parasitic device is an unauthorized product containing RF radios and has been designed to adhere to, connect to, or otherwise interact with HID readers in a manner not intended or incorporated into HID’s solution design. Often they draw power from the reader itself. No third-party products are integrated into HID Global systems designed to draw power from the readers. This advisory clarifies the HID policy regarding a concerning trend that negatively impacts HID solution performance Q: What is the impact on warranty and support position for security business integrators and resellers? Steve Carney: This advisory clarifies the HID policy regarding a concerning trend that negatively impacts HID solution performance. HID partners and customers assume risk, including the loss of warranty and technical support, when using the stated unauthorized products. Q: What is HID’s response to the assertion that this policy ‘undermines customer choice’? Steve Carney: It is important to understand that HID Global’s position related to these devices is based on the interference or potential to interfere with HID readers’ ability to perform to specifications. HID readers are the most widely installed readers in the world. Given that, and the lifetime warranty, potential interference with the power draw, power load and RF field presents risk not intended or contemplated when selling the devices. HID’s position does not impact a customer’s ability to choose. It informs them of the risk related to the company’s assertion of specifications and performance.
ComNet, Communication Networks of Danbury, Connecticut, an ACRE company, and a USA-based manufacturer of fiber optic transmission and networking equipment, is expanding the line of Cybersecurity products by adding to its line of intelligent media converters. These intelligent media converters with Link Guardian create a physical layer of protection that limits network traffic to one-way communication between the source and destination networks. The ComNet CNGEUMC4+2(TX, RX)/M is designed to prevent cybersecurity attacks by limiting data flow to one direction between a secured and unsecured network. External cyber threats How the devices are deployed will determine which direction the data will flow. Called a ‘Unidirectional Media Converter’, this physical security is more effective than software-enabled network firewalls. This data connection is un-hackable and invulnerable to malware. The ComNet CNGEMUMC4+2(TX, RX)/M is a hardened four-port all-gigabit intelligent Media Converter. This product is designed to provide deterministic data transfer in only one direction (unidirectional), to segment and protect networks, devices, and other digital assets (databases, historians, SCADA, PLCs, DCS, etc.) from external cyber threats. Distance extending device The primary purpose is as a distance extending device, but they can also be used as an entry point to a network" It has four 10/100/1000Base-T(X) copper ports and two 1000Base-FX SFP ports. It effectively only allows data to travel in one direction. The CNGEMUMC4+2(TX, RX)/M provides exclusive functionality for easy field deployment including DIP switch-based operation of RSFP (redundant SFP) for creating redundant fiber connections. According to Andrew Acquarulo Jr., ComNet CEO and President, “Media converters are generally simple to use. The primary purpose is as a distance extending device, but they can also be used as an entry point to a network. By adding features such as Link Guardian, we are offering our customers another way of making their network more reliable and secure from unauthorized access. This keeps us front and center in terms of innovation.” More competitive position The company believes that these features give them a more competitive position in the market and allows ComNet to be unique and differentiate the product line. “Making any network operate more efficiently and effectively is another way of how ComNet moves the market. Cybersecurity/ unauthorized access is a monumental concern for all security networks.” “By leading with our advanced technology, such as Link Guardian, we position ComNet and our solutions as the company to turn for ‘new and better’ transmission options. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing.
Nymi, Inc. announces a technology partnership with ELATEC, a provider of RFID readers and NFC/BLE mobile device readers. The partnership enables users of Nymi’s Workplace Wearables™ to seamlessly open doors and authenticate to systems, devices and machines that utilize ELATEC’s readers. The Nymi Band™ is the world’s only workplace wearable wristband that, once authenticated, offers the convenience of continuously authenticating the identity of the user until it is removed from the wrist. Seeking touchless authentication This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. With their flexible architecture, customizable open API and remote programmability, ELATEC RFID readers are ubiquitous in Europe and increasingly utilized in organizational ecosystem applications in North America, from vending and dispensing to secure printing, and from computer single sign-on to door access. ELATEC reader compatibility will facilitate penetration of these and other industries and global regions" “This partnership with ELATEC provides important market reach and compatibility for our Workplace Wearables,” said Andrew Foxcroft, Vice President of Nymi. “The Nymi Band is being rapidly adopted in industries like pharma and medical device manufacturing with an emphasis on privacy, security, and a natural user experience. ELATEC reader compatibility will facilitate penetration of these and other industries and global regions.” Positive user experience The Nymi Band enables organizations to incorporate Nymi's passwordless technology with applications that ensure the health, safety, and security of connected workers, enabling a range of use cases that includes COVID-19 social distancing and contact tracing, among others. “We’re delighted to be working with Nymi in providing a frictionless and hands-free authentication, authorization, and access control solution for our customers across numerous industries,” said Paul Massey, CEO of ELATEC Inc. “Wearable technology enables a very positive user experience and exciting new applications for our reader solutions.”
The SALTO XS4 One Deadlatch (DL) is a revolutionary stand-alone electronic lock thanks largely to the level of technology packed inside that brings together the convenience of a smart stand-alone access point - easy to retrofit, install, and no wires - with virtually the same power and performance of an online traditional access control point. This innovation brings electronic access control and convenience to a number of retail and commercial operations that commonly use aluminum-framed glass doors that previously had limited options for electronic locks. The XS4 One DL electronic lock combines proven robustness, the latest technologies, and elegant design, making it suitable for a wide range of applications. With its intelligent product design, the XS4 One DL offers more functionalities in less space. Access control readers Furthermore, SALTO remains true to using only high-quality materials and as few components as possible, which results in durability and longevity of the products. Thanks to its robust construction, the electronic escutcheon is therefore suitable not only for standard doors but also for access points with high intensity use. The SALTO XS4 One DL is part of the proven XS4 platform adding a new design with a totally new built-in reader. With the reader available in both black and white, the XS4 One DL has a narrow profile It includes the latest electronic components - RFID (MIFARE DESFire and HID iCLASS Seos) and BLE - Bluetooth Low Energy NFC - Near Field Communication - which ensures current and future compatibility. With the reader available in both black and white, the XS4 One DL has a narrow profile and is designed to fit most aluminum-framed doors. Smart keys technology Using smart keys and mobile technology with the SALTO XS4 One DL electronic lock allows users to manage access rights - quickly and keylessly - which is more secure than using mechanical keys. There is also additional value in the flexibility, convenience, and operational efficiency provided by the XS4 One DL wireless technology. Because the SALTO XS4 One DL is compatible with SALTO SVN, SALTO BLUEnet Wireless, and the SALTO KS - Keys as a Service - cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. This allows businesses to decide which technology fits better with their security, operations, and IT needs. Access management platform The SALTO XS4 One DL has more functionality and performance capability than any other smart electronic door locks on the market, allowing businesses to connect to their on-premises network via advanced SVN-based technology SALTO Space data-on-card platform or the cloud with the SALTO KS cloud-based access management platform. SALTO delivers profit-driven keyless smart access for retail. Say goodbye to mechanical keys and the cost of replacing them and the worry associated with lost keys Businesses can connect a SALTO XS4 One DL front door lock with management and security software (BMS) and third-party systems to automate tasks and connect alerts. Save time and money with quick installation on almost any type of door and access point. Achieve faster onboarding for new staff members by sending keys even before their first day. Say goodbye to mechanical keys and the cost of replacing them and the worry associated with lost keys. Operating platform system Control who goes where - and when - for any or all retail locations. And when expanding to new properties, affordably scale and establish access management across a number of properties. Grant specific access for one's staff, suppliers, or delivery services Monitor real-time access and entrances without disturbing the store’s customer flow XS4 One DL features and characteristics: Compatible with market standard deadlatches Simple installation is possible on any type of door, including those with narrow, medium, or wide-stile frames Body and escutcheon made of steel The lock can always be opened from the inside (single action panic feature works in conjunction with the relevant mortise lock) Reversible latch guard comes with all models Version for use with a paddle (paddle not included) Technology: SVN / BLUEnet Wireless / JustIN Mobile Operating platform system: SALTO Space - Data-on-Card - SALTO KS - Keys as Service Smart key: RFID (MIFARE DESFire and HID iCLASS Seos), NFC, and BLE Finishes and models are available in a wide variety of reader colors and lock finishes
Aiphone, the foremost international manufacturer of intercom and security communication products, is announcing its IXG Series tenant, guard, and entrance stations are integrated with Telecoil (T-Coil) to assist individuals with hearing loss or impairments who wear compatible devices. Integration This integration allows the IXG-DM7-HID IP Video Entrance Station to send out an electromagnetic signal that the T-Coil within a person’s hearing aid picks up, allowing the hearing aid and the intercom system to directly connect to produce a clearer sound and to remove audio interference. This feature allows those who suffer from hearing impairments to more easily communicate using an intercom system in multi-tenant facilities, as well as medical or elder-care facilities. Support accessibility “The Telecoil integration is important to ensure Aiphone’s intercom and security communication products can be easily used by individuals who are hearing impaired and require the assistance of a hearing aid,” said Brad Kamcheff, Marketing Manager for Aiphone Corp. “More than 13 percent of people in the United States report some difficulty with hearing and Aiphone wants to ensure that our devices support accessibility and the Americans with Disabilities Act." Process of T-Coil integration The T-Coil integration works like this: when a hearing-impaired individual approaches an intercom, the sound signal is connected to an amplifier, which generates a current to pass the signal to the induction loop, which is usually made of copper tape or wire. The loop then produces an electromagnetic field and is then picked up by the T-Coil. As each hearing aid individually tailors the sound to the specific needs of the individual, the integration with T-Coil allows for reduced background noise and the full spectrum of sound frequencies required for intelligibility will be available. IXG Series The IXG Series from Aiphone features the benefits of an IP intercom with the versatility of a multi-tenant solution, all powered by a single, full-featured system. IXG Series solutions are ideal for commercial sites, industrial facilities, schools, campuses, parking garages, retail, emergency calling, and correctional applications.
Utility, Inc., (Utility Associates, Inc.) announced the United States Patent and Trademark Office issuance of patent 10,812,755 for additional BodyWorn camera technology. Patent for BodyWorn cameras The patent covers mounting a BodyWorn camera in a holster that is embedded inside a body armor vest, duty shirt, winter coat or other garment with the camera lens fastened and aligned to provide a clear field of view through an opening in the garment. Embedding the camera within an article of clothing eliminates potential issues and concerns of the camera being pulled or falling off, which is a common limitation with body camera devices that are externally attached to law enforcement uniforms with clips or magnets. Patent covers automatic recording triggers The patent also includes claims for several capabilities incorporated into Utility, Inc.'s BodyWorn camera involving the automatic recording triggers, which are designed to ensure reliable video recording and reduce law enforcement distraction to increase safety for both the officer and the community. The automatic triggers in the patent claims include starting or stopping video recording anytime an officer: Enters into a GeoFence zone around the dispatched call for service location; Runs; Struggles with another person; Manually starts or stops video recording using an associated operational mode device, such as a wristband or duty belt-mounted controller; The BodyWorn camera receives data from an associated operational mode device, such as an in-car video system, gun holster sensor, or Video Integration Ecosystem (US Patent 10,560,668); or The officer goes to a horizontal orientation and does not respond to the BodyWorn camera's Officer Down alert prompts. Officer Down reporting and alerting The patent includes the technology of a near field communications sensor embedded in the BodyWorn holster The last capability, identified as Officer Down reporting and alerting, notifies central dispatch and nearby officers that a fellow officer is down and needs immediate assistance. Along with the instant notification, Utility's ecosystem provides turn-by-turn directions through the system to the Officer Down location. The patent also includes the technology of a near field communications sensor embedded in the BodyWorn holster that automatically associates the BodyWorn camera with the officer and the officer's in-car RocketIoT vehicle video management, GPS, vehicle diagnostics, 4G-LTE and WiFi communications server. This automatic association provides chain of custody relationship proof between the BodyWorn camera video and the officer who recorded the video. Automatic video technology "As we continue to innovate and add features to complement our existing technological advances, we appreciate knowing that our foundational technology is safeguarded," said Michael Nark, President and Chief Executive Officer (CEO) of Utility, Inc. Michael adds, "Our BodyWorn camera technology provides officer safety while solving several challenges facing law enforcement today, and our automatic video technology not only takes the burden off officers but also provides the community with peace of mind with features such as two-minute pre-event buffer and cloud upload." RocketIoT for in-car video support The company has a wide variety of solutions in addition to the BodyWorn camera. The Utility, Inc. ecosystem also includes the RocketIoT for in-car video and communications support, ALPR, AVaiLWeb cloud-based digital evidence management system and situational awareness software solutions for law enforcement, transportation agencies and utilities.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-Time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control center that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualization tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focusing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customization of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organized to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyze data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System Helps In Tailgating Mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy Enrollment And Deployment Enrollment in the system is easy. Companies can deploy a separate enrollment station, or any reader can be used for enrollment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrollment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting Intent From Positioning Of Eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
ISONAS Inc., an IP access control and hardware solution provider and part of the Allegion family of brands announced that the ISONAS™ Pure IP™ access control solution has been deployed at Our Lady of Perpetual Help Parish in Grove City, Ohio. The parish is comprised of seven buildings, which include the church, preschool, elementary school, rectory, storage garage, athletic building, and modular classrooms. The parish grew from around a dozen visitors daily to more than 80 people visiting the church every weekday morning and more than 500 people visiting over three separate services each weekend recently. Controlling Access The elementary school has grown to host more than 300 students and 50 staff members and volunteers, with the preschool adding another 40 students and staff members to the campus tally. With 28 exterior doors encompassing the fully renovated church, school, and preschool, the parish needed a substantial security upgrade. The new system needed to not just limit access, but also control it. A main challenge at the parish was being able to control access at all seven buildings and provide an environment with improved personal security for their staff, students, and patrons. The security system the parish had in place consisted of a few standalone keypads and electric locks on a couple of doors with no centralized management or communication. Upgrading Security With an influx of people accessing the parish and its facilities, both the facilities director and the maintenance/technology specialist at the parish were ready to find the right access control solution. The new system needed to not just limit access, but also control it. After careful consideration and research, the parish selected the ISONAS™ Pure IP access control solution for their security upgrade. ISONAS introduced the parish to its local certified independent security integrators, Systems 28. “Working with ISONAS on this project was a tremendous experience from start to finish, and we were thrilled to be brought on board to handle this security upgrade,” said Scott Hoover, sales estimator at Systems 28. “As a certified independent ISONAS systems integrator, we were proud to install this unique solution at our local parish and help make our community safer.” ISONAS RC-04 reader controller The parish also liked the fact that an on-site server was not required with the ISONAS solution The project consisted of installing 24 ISONAS RC-04 reader controllers, with 21 deployed on exterior doors and three on interior doors in a month’s timeframe. The parish chose the ISONAS solution for a myriad of reasons, with one main factor being the ability to use power over the ethernet for the card readers and electric locks. The parish also liked the fact that an on-site server was not required with the ISONAS solution, as having a cloud-based server was critical to managing access remotely for multiple buildings. ISONAS Pure Access software “We are extremely happy that the parish selected ISONAS as the right solution for their security upgrade and look forward to providing capabilities to easily expand the system in the future,” said Jonathan Mooney, ISONAS sales leader. The ISONAS system is extremely user-friendly and much more convenient Along with the ISONAS hardware, the ISONAS Pure Access software was deployed for its remote access capabilities. Pure Access™, ISONAS’s software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. Remote access functionality “The ISONAS system is extremely user-friendly and much more convenient than the previous ‘stand-alone’ system we had in place prior to this upgrade,” said Kevin Radwanski, facilities director at Our Lady of Perpetual Help Parish. “We especially like the remote access functionality, as it has been great for us to be able to lock and unlock doors remotely during regular times and emergency situations like the global pandemic.”
Access IS, part of HID Global, is delighted to celebrate the successful launch of contactless payments across the Stockholm region by SL (Storstockholms Lokaltrafik). Building on the successful mass deployment of Access-IS ticket readers and validators back in 2019, the latest upgrade to the system sees Access-IS devices in train gates and ticket offices as well as bus mounted validators being upgraded to permit full cEMV contactless payment capability. Contactless ticketing Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read Stockholm is leading the way with this deployment of contactless ticketing across a true multi-modal transit network. Barcode and NFC tickets, as well as bank and credit cards by VISA, Mastercard or American Express are all presented to a single, intuitive-to-use, point of presentation. Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read, meaning passenger throughput is maximized for a great user experience and reduced operational costs. Access IS transit validators and readers Common to many Transit Authorities, SL continues to operate its ‘Accesskort’ proprietary closed loop ticketing scheme in tandem with the new upgrade. However, plans are in place to migrate ‘Accesskort’ to a new SL transit (EMV technology) closed loop card, which will be read/processed on the Access-IS reader, making a single point of presentation for all tickets and payments. All of the Access IS transit validators and readers are non-proprietary, open architecture units, which free the city to use any software backend system they desire. Access IS and SL partnership When Access IS first started to work with Storstockholms Lokaltrafik (SL), it was the beginning of a journey to modernize ticketing across Stockholm. At any ticket reader on buses, metro barriers, commuter trains and boats, rail or tram platform, or with the tram conductor, passengers can now simply tap to make a payment using all major payment schemes, as well as Apple Pay, Samsung Pay, Google Pay via their mobile devices’ digital wallet. A single tap buys them a single trip, priced at SEK 38, the same as the SL app, the ticket machines, or the ‘SL Accesskort’. Initially the system has gone live with adult tickets, but concession tickets for pensioners, students or children will follow. Contactless cards for passengers For passenger security, SL does not see debit card numbers or card account The ticket becomes valid the moment a passenger taps on their contactless card for the first time, at the start of their journey and remains valid for 75 minutes. All of a passenger’s journeys are tallied up and debited as a single payment the following day, making travel payments easy to understand and simple to track for the passenger. For passenger security, SL does not see debit card numbers or card accounts, but uses a technology where the correct card number is exchanged for a random number. This means that SL cannot see which person the payment card is linked to. Deployment of contactless transit payments Speaking about the project, Charlotte Modig, Payments and Cards Senior Business Manager for SL Stockholm said, “As we modernize our ticketing system to be leading edge, the learning curve for all involved is steep. Close cooperation between SL and Access has managed to overcome challenges and deliver a service we are all rightly proud of.” Speaking about the project, Cliff Hunter, Head of Sales for Access IS said, “Our relationship with SL goes from strength to strength with a great deal learnt on all sides during this ‘the largest of its kind’ deployment of contactless transit payments.” Cliff adds, “We champion software agnostic transit products to give operators flexibility in how they implement their mobile ticketing and payment schemes.”
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authentication technology has swiftly become a necessity to prevent counterfeit coins and banknotes without compromising the encapsulation or condition of the collectibles. Collectors Universe first launched HID Trusted Tag Services with approximately 100,000 coins and received overwhelmingly positive feedback from customers. The company has purchased an additional two million HID Trusted NFC Tags to embed into broader segments of the PCGS inventory. HID Trusted Tag Services HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays “HID Trusted Tag Services is the single biggest leap forward for third-party grading since the inception of the collectibles market. I hope that every third-party grading service in the industry considers integrating similar technology into their product lines as well. It’s simply that important for the hobby as a whole,” said Brett Charville, President of Professional Coin Grading Service. HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service. Anti-counterfeiting technology Each tap generates a unique one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the collectible’s authenticity. The single-use URLs help prevent threats such as spoofing or other attempts to circumvent the HID Trusted Tag Services. “With the HID solution, Collectors Universe is the first in the numismatic industry and among the first in any of the collectibles fields to utilize this type of anti-counterfeiting technology at scale,” said Collectors Universe Chief Information Officer, John Nelson, adding “The technology provides peace of mind to customers who seek reassurance that their investment is going toward a verifiable collectable.” NFC technology and cloud authentication services “HID Trusted Tag Services was specifically designed for Internet of Things use cases that benefit from combining our trusted NFC technology and cloud authentication services to enable new, convenient experiences for customers,” said Mark Robinton, Vice President of IoT Services with HID Global. Mark adds, “Product authentication and brand protection are some of the many applications we automate by leveraging smartphones to streamline and simplify processes that were previously manual and paper-based.”
Marassi harbors, known as upcoming gateway to Egypt, is a community with a picturesque surrounding overlooking the turquoise Mediterranean Sea along the Alamein coastline. At this community one will find lavish residences that includes chalets, apartments, townhouses, villas, large marinas and signature hotels creating a lifestyle of sheer pleasure and luxury vacation destination. Secured access points to such an extravagant, lavish community is fundamental as the community is occupied by highly influential people, including high-ranking Egypt government officials. Streamlined access Until recently, manual security checks of vehicles and people were carried out at the community access to comply with the security requirements. As manual security checks were not only time consuming, but also resulted in queuing, the need for a secure and convenient access experience arose. Deluxe communities, like Marassi, strive for an automated frictionless, streamlined vehicle and people access process. Identifying tenant vehicles To automate vehicle access at the gates, Nedap’s UHF RFID uPass Reach readers, with a read range up to 5 meters, are implemented. Combined with Nedap’s UHF windshield-mounted tags, these readers are used for automatic vehicle access. The UHF tags are issued to registered tenant vehicles and when the vehicle comes within the read-range, the tag is identified and granted access. The UHF windshield tag is battery-free and maintenance-free, making it the most effective solution provide secure and seamless vehicle access. E-gate entry to residents Marassi residents manage their digital access card through the community app developed by EMAAR. Digital access cards are used as identifiers and are stored in user’s smartphones. Nedap’s multi-technology reader makes use of smartphones to identify people utilizing Bluetooth Low Energy (BLE) and NearField Communication (NFC) technologies. The solution has provided Marassi tenants with easy and secure access to the community and beach. Residents manage visitor access Visitor access to the community and beach is further simplified by enabling the residents to generate guest requests through the app. Besides supporting BLE and NFC technology, Nedap’s multi-technology reader includes a QR reader that enables scanning QR-codes displayed on a smartphone. Residents can share the QR code with guests. The guest presents the QR-code to the reader and access to the property is granted frictionless. Implementation of such an integrated solution has provided a high level of convenience to all users at Marassi. The reliable solution has also reduced the congestion at the entry gate, securing the flow of vehicles and reducing the waiting period for guests.
SMARTContactless, a value-added distributor for contactless solutions, ABS Technology and STid have been selected by INIT Innovation in Transportation Inc., a US provider of intelligent transportation systems for public transit, to create new cellphone access control for its employees and visitors. STid Mobile ID, pictured, from the access control product company STid, is a Bluetooth access control reader. Common supported credential technologies are MIFARE, MIFARE DESFire EV1/EV2, NFC and STid’s cellphone credentials using smartphone and Bluetooth for communications. The solution includes a free cellphone app, the latest multi-technologies Architect Blue readers, and offline and online programming tools. Mobile Access INIT Innovation in Transportation Inc. has installed numerous STid’s Architect Blue readers at doors and entrances to secure their new Corporate head offices. Employees and visitors use STid’s patented identification mode features and can access the building or other sensitive entrances within the offices, without taking their smartphones out of the pocket or bag. Jamie Thomas, Systems Engineer for ABS technology in Virginia Beach, Virginia, says of the STid Mobile ID: “This Bluetooth reader has so much technology built into it; it’s future proof, easy to install and program.” Feedback on the cellphone access has been positive and INIT USA Inc. is exploring the STid Mobile ID’s options to remotely assign and revoke cellphone credentials to employees and visitors over the air. Access control solution INIT USA Inc. Director of IT, David Page said: “As a provider of innovative technology to our public transit customers, INIT desired an access control solution which mirrored our innovative technology solutions, matched our company culture, and was simple to install and administer. In addition, we wanted the ability to start with a small proof of concept and eventually grow it as this type of technology inevitably transitions to a fundamental employee expectation instead of a bleeding edge innovation.” RFID reader solutions Robert Gailing, President of SMARTContactless, STid’s US Distributor said: “STid is really leading the market with innovative RFID reader solutions for security-minded professionals and end-users. The new STid Mobile ID reader solution, with its five methods of cellphone credential presentation using the smartphone and customizable distance to 60 feet, there is virtually nowhere the reader cannot be utilized throughout any access control deployment.” According to Vincent Dupart, CEO of STid, this new implementation is a testament of the growing smartphone adoption that merges security and convenience. “We are pleased that both INIT USA Inc. employees and managers are enjoying the experience. We are also proud to work with strategic partners like SMARTContactless, offering high-quality customer support to promote our cellphone access solution. The ability to use smartphones for high-security access control is becoming increasingly important, as these devices are part of our everyday lives in the business workplace.”
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honored to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?
Best Practices Guide: Analog Video To CloudDownload
Delivering a Smart, Secure and Healthy Workplace with CloudDownload
Are Your Technology Providers Keeping You In The Dark?Download
Capture New Opportunities With Computer Vision And Video AnalyticsDownload