Identiv, Inc. announced the launch of its frictionless, battery-less uTrust UHF Credentials that work with identification applications that require long-distance reading. Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort memb...
Suprema, a global provider of access control, time & attendance, and biometric solutions, has announced that the company’s Airfob Patch won the Judges’ Choice Award from SIA (Security Industry Association) New Product Showcase Awards. SIA New Product Showcase Awards Since its inception in 1979, SIA New Product Showcase Awards has been the security industry’s premier product awards program recognizing innovative security products, services and solutions. The awards progra...
HID Global, a globally renowned company in trusted identity solutions, has announced the launch of its smallest embedded reader module, the OMNIKEY 5127CK Reader Core. The latest addition to the proven OMNIKEY family makes it possible for systems integrators, Original Equipment Manufacturers (OEMs) and other partners to embed RFID into devices with limited physical space to accurately authenticate people, reduce fraud and protect sensitive data in a contactless way. OMNIKEY 5127CK Reader Core...
Suprema, a global provider of access control, time & attendance and biometric solutions, recognized the trend towards contactless, biometric and cellphone credentialing long before the onset of the COVID-19 pandemic. The company's premier biometrics solution, FaceStation 2 Smart Face Recognition Terminal, employs intelligent facial recognition ensuring highly accurate personal identification and authentication for improved overall security with contactless operation. MobileAccess, Suprema's...
SALTO Systems has announced the release of its SALTO contactless smart card NCoders. The SALTO NCoder is for next-generation access control systems and they integrate the encoding capabilities of a powerful updated encoder with a built-in desktop reader function. SALTO NCoder The SALTO NCoder configures permissions and user access plans for user credentials. It is compatible with a wide range of RFID cards and mobile keys and can be used in most commercial markets including hospitality, enabli...
ELATEC, a globally renowned manufacturer of innovative multi-frequency RFID readers, will have a new CEO as of July 1, 2020. Robert Helgerth takes over the management of the company and will set the course for the company's growth in the future. In Robert Helgerth, who was most recently responsible for Microsoft's partner business in Asia, ELATEC has gained a visionary manager with great expertize in the strategies, structures and processes of internationally successful corporate management. E...
Camden Door Controls, a globally renowned provider of door activation, control and locking products, is pleased to announce the release of CV-7600 Series Bluetooth-enabled card reader, a mobile-ready reader based on RFID technology that combines Bluetooth Low Energy (BLE) and contactless smart card technologies. CV-7600 Series card reader In operation, the latest CV-7600 Series Bluetooth-enabled card reader is capable of reading data stored on a contactless smartcard credential via high frequency. In addition, it can also read data from a mobile credential stored in a smartphone’s wallet app via BLE technology, without physical contact and then pass the data obtained to the physical access control system. CV-7600 Series Bluetooth-enabled card readers are also compatible with MIFARE prox. cards and fobs. This feature allows system managers the ability to assign the best/preferred type of credential for each system user. Mobile access “The CV-7600 Bluetooth-enabled mobile readers are an ideal choice for access control system users that would prefer to use their smartphone instead of a card or fob credential,” says David Price, Vice President of Communications and Corporate Development at Camden Door Controls. David adds, “We’re proud to add this Bluetooth-enabled reader to our extensive line of indoor and outdoor access control system readers.”
Maxxess Systems, a globally renowned company in event response management and collaboration systems, is pleased to announce their partnership with SmartPTT by Elcomplus, an advanced communications radio technology company, to deliver a powerful integration with Motorola Digital Radios that will improve response times to critical events. SmartPTT integration with InSite This new SmartPTT integration with Maxxess InSite allows InSite to automatically communicate over Motorola Digital Radios in the event of an emergency, speeding information dissemination and saving critical time for first responders and security personnel. “Maxxess is dedicated to improving the response to any emergency,” said Nancy Islas, President of Maxxess Systems, adding “This new integration expands our current capabilities, and will save the First Responders precious time.” SmartPTT dispatch solution The SmartPTT integration adds new capabilities to the InSite Ultimate Lockdown software “The SmartPTT dispatch solution by Elcomplus has been developed and constantly enhanced for more than 10 years,” said Evgeny Teplyakov, Chief Executive Officer of SmartPTT by Elcomplus, adding, “This new integration will enhance our dispatch technology to benefit users and emergency responders during any emergency.” The SmartPTT integration adds new capabilities to the InSite Ultimate Lockdown software. InSite currently offers extensions to a wide range of related systems, including radios, door locks, PA systems, alert strobes, and signage, all of which are used to ensure appropriate response actions, including information dissemination and automated triggers for door locks. Elcomplus – Maxxess Systems software integration With the SmartPTT integration, when someone triggers a mobile panic alert from the InSite mobile app, the SmartPTT software triggers the Motorola Digital Radios to annunciate that a panic alert has been triggered, including the location and identity of the person who triggered it. The InSite rules engine and automation is helping organizations take early action to address critical events before they spread or grow to become unmanageable and costly. This fast, coordinated response saves critical time, improves the safety and security of anyone located in the affected areas, and ensures that accurate and essential information is disseminated to first responders and security personnel.
Connect ONE by Connected Technologies presents a new cloud badge printing integration with the InstantCard ID Card Service, allowing dealers to easily expand into offering customized identification badging and credentialing as part of their menu of services while earning additional revenue. API with InstantCard Connected Technologies developed the Application Programming Interface (API) with InstantCard so dealers can use the powerful cloud-hosted Connect ONE security management platform to create customized badge templates for users and their facilities in a wide range of vertical markets. All the latest identification technologies, including barcode, magnetic stripe, smart card, QR and RFID can be created, printed and shipped by InstantCard directly to the dealer’s Connect ONE customer. "This integration checks all the boxes for dealers,” said Dan Simon, Co-Founder and Managing Partner, Connected Technologies. Integration with Connect ONE The integration with Connect ONE allows customers to associate users with a badge template Dan adds, “It gives them the option to offer a convenient service for user badge management while removing the cost and burden of onsite printer maintenance as dealers continue to build additional recurring monthly revenue (RMR) and add value to their business." Once dealers become a dealer/distributor, they can easily create card templates while InstantCard handles printing and shipping badges to customers. The integration with Connect ONE allows customers to associate users with a badge template, automatically supplying the user information and image to the template at InstantCard and then ordering a badge for print online. Mobile Badge with Connect ONE After the badge is ordered, the same template will also become the Mobile Badge with Connect ONE so the user can display it via the Connect ONE app as well as physically in person. Integration into Connect ONE, the platform that allows dealers to view, manage and control all their services to their customers through a single interface, gives dealers the opportunity to add to their offerings and start receiving RMR from both the customer and InstantCard.
Identiv, Inc. has announced its cohesive collection of COVID-19 response solutions in order to support enterprises and government customers in worldwide offices that are now reopening. Identiv’s frictionless, touchless solutions create healthier and more hygienic offices. The hands-free technology also streamlines transactions and access, temperature tracking, and contact tracing to help employees and visitors feel safe and secure. Frictionless, hands-free technology “With the threat of COVID-19 still around us, frictionless, hands-free solutions are a key part of any organization’s efforts to make a healthier, safer environment,” said Steven Humphreys, Identiv Chief Executive Officer (CEO). Identiv’s highly secure access and identity solutions address multiple business needs to re-open and grow" Steven adds, “Identiv’s highly secure access and identity solutions address multiple needs for businesses to re-open and grow again in the new pandemic-era normal.” Quick, affordable temperature tracking “As large public venues begin to reopen, quick, affordable temperature tracking will be the first line of defense to assure visitors and employees that operators have their safety at top of mind,” added Dr. Manfred Mueller, Identiv Chief Operations Officer (COO) and General Manager, Identity. Dr. Mueller adds, “For those not yet comfortable returning to work, secure network log-in options facilitate a bridge between on-site and telecommuting teams.” Identiv’s complete portfolio of COVID-19 response solutions include: Smart, frictionless access control MobilisID uses the latest in Bluetooth and capacitive technologies to allow complete frictionless access, no touching required. The MobilisID App (available via Apple iOS and Android) acts as a physical credential — the user can keep their mobile device in their pocket, wave their hand near the MobilisID Reader and the door automatically unlocks. MobilisID can also integrate with ADA-compliant automatic door hardware to form a complete touchless solution. With the Freedom access control system, no reader is even required at the door. Freedom’s software-defined architecture uses the location of a user’s mobile device to determine their proximity to a door for hands-free ingress and egress. The system can also be used in parallel with conventional reader doors. Frictionless, battery-less uTrust UHF Credentials work with identification applications that require long-distance reading (i.e., more than 18 - 21 feet). Ultra high-frequency (UHF) technology is ideal for parking lot access and gate control, door entry in hospitals or gated communities, logistics, object and people tracking in emergency situations, real-time locationing, cafeteria access, and any hands-free environment, including medical or care facilities, club and resort membership, sport facilities, and universities. The credentials can be read through badge holders, handbags, pockets, and No-touch time and attendance uTrust 3721 F multi-technology smart card reader features multiple frequency options and a keyboard emulation. Perfect for employers who use a mixture of technologies for logical access, uTrust 3721 F leverages existing 125 kHz low-frequency (LF) or 13.56 MHz high-frequency (HF) cards. Out-of-the-box, uTrust 3721 F can work with most time and attendance systems, letting employees simply tap a card to the reader to clock in. Nearly hands-free transactions and access With Near Field Communication (NFC) technology, it’s easy to get near an access point without ever actually touching it. Identiv’s NFC-enabled solutions feature a catalog of transponders compatible with NFC Forum created for secure contactless transactions and connecting electronic devices with a simple tap-and-go model. Designed for comfort and wearability, the uTrust Proximity Wristband keeps wearers from reaching for their phone or card every time they need to gain access to a parking garage, building, room, or elevator. A passive radio frequency identification (RFID) device, the no-battery credential is robust, resistant to cracking, and impervious to moisture. Temperature tracking and contact tracing Identiv’s Body Temperature Measurement Patch is a wearable NFC-enabled transponder that supports the reopening of public spaces worldwide, including theme parks and stadiums, and helps operators keep attendees and employees comfortable, confident, and safe. The patch also supports global governments and healthcare workers that need to periodically monitor quarantined patients diagnosed with COVID-19. The new solution combines the simplicity of using NFC and the smart technology potential of the Internet of Things (IoT), making body temperature monitoring easier than ever. Identiv has partnered with Telaeris to deliver a rapidly deployable, industry-renowned, mobile access control hardware and software solution that provides security in a variety of mission-critical situations where traditional systems cannot be supported. By leveraging Telaeris’ mobile credential verification hardware, Hirsch Velocity Software-based access control systems can go beyond protecting the perimeter and empower security staff to authenticate and authorize users with photos from anywhere, at any time, with real-time server synchronization. Telaeris handheld units with HealthCheck functionality can prompt staff to ask a series of health questions and input the taken temperature of a validated user to create a ‘health/access check’ profile upon entering which can then be repeated upon exiting. If a person enters a building and is later found to be symptomatic, Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. While this is useful during the days of COVID-19, it can also be used for other applications, such as the seasonal influenza. This means every office can be proactive in responding to potential outbreaks, while simultaneously providing employees with the peace of mind that there are measures in place to keep them safe. Working from Home For some organizations, even as worldwide economies are restarting, employees continue to or are more comfortable working from home. Identiv’s smart card reader portfolio keeps work flowing while ensuring everyone’s data and health stays safe and secure. Top selections for secure network log-in while telecommuting include, uTrust Token Pro Mini Type A (smallest form factor, strong PKI, and Java Card technology, uTrust Token Pro Mini Type C (USB C and can feature user branding and applets), uTrust 2700R Contact (supports all PC operating systems and cards ICs), 0 USB (ultra-compact, CAC and PIV-approved, and available in USB C, uTrust 4701 F Dual Interface (combines contact, contactless, and NFC tech), and uTrust SmartFold SCR3500 A (USB A, ultra-compact, and CAC and PIV-approved). As the economy begins to open up and people around the world return to work, it’s critical to have solutions in place that keep employees and visitors feeling safe, comfortable, and confident.
Identiv, Inc. announced the development of Identiv’s Body Temperature Measurement Patch. The near field communication (NFC)-enabled transponder supports the reopening of public spaces, including theme parks and stadiums, and helps operators keep attendees and employees comfortable, confident, and safe. The product also supports global governments and healthcare workers that need to periodically monitor quarantined patients diagnosed with COVID-19. The new solution combines the simplicity of using NFC and the smart technology potential of the Internet of Things (IoT), making body temperature monitoring easier than ever. Identiv’s Body Temperature Measurement Patch makes it simple for anyone to monitor personal temperature curves. The patch is most accurately read when applied under the upper arm and is currently being tested on other areas of the body. Affordable temperature tracking The solution features skin friendly adhesive and can be worn for multiple days. For instant temperature measurements, tap the passive patch with any NFC-enabled smartphone. The positioning of the patch allows temperature measurement close to the body yet keeps the readout as simple as possible. As large public venues begin to reopen, quick, affordable temperature tracking will be the first line of defense in order to assure visitors and employees that operators have their safety at top of mind. Identiv has developed passive body patches, and samples are immediately available" “Besides incredibly uncomfortable nose swabs, there are no safety indicators adoptable by large public venues except temperature readings,” said Dr. Manfred Mueller, Identiv COO and GM, Identity. “In order to support the safest possible reopening of these spaces — in the most practical, scalable way — Identiv has developed passive body patches, and samples are immediately available.” High-accuracy temperature sensor For clinical-grade applications, Identiv’s Body Temperature Measurement Patch can be combined with a high-accuracy temperature sensor, which follows the ASTM E1112 Standard for Electronic Thermometers for Intermittent Determination of Patient Temperature. For customers who need to track body temperatures over a longer period of time without tapping, Identiv has made available an active battery version. Attached to the body, it can track temperature measurements over multiple days and store the data in the cloud or in an offline application. Global governments and healthcare workers can utilize either the passive or active version of Identiv’s Body Temperature Measurement Patch for quarantined citizens, employees, or patients testing positive for COVID-19. Monitored via the cloud, temperature measurements can be assessed without sending someone to take a reading in-person. Ultra high-frequency However, if a patient’s condition suddenly grows worse, healthcare personnel can be immediately alerted. Identiv has been creating award-winning IoT-enabled temperature-sensing and datalogging solutions for the past five years. The team is expert in designing and manufacturing high-frequency (HF) and ultra high-frequency (UHF) transponders for embedded use in billions of everyday objects, including medical devices, books, toys, athletic apparel, perishable food items, and pharmaceuticals. Regardless of the form factor, Identiv’s transponders are uniquely positioned to deliver radio frequency identification (RFID) connectivity to and interact with virtually any object in the IoT.
Businesses, large and small, create data which needs protecting, whether in an onsite server room or co-located at a data center. When a business imagines a corporate data breach, they’re probably picturing black-hat hackers pursued by cybercrime investigators. The reality is often more mundane. Only around a half of breaches involve hacking, according to one recent report. Gaps in the physical security, the business’ data and servers are equally important targets. Perhaps the company director leaves their laptop on the train. Or an unauthorized visitor spots open server racks and quickly downloads records onto his smartphone. Or maybe the server room access control is left entirely to lock-and-key technology which cannot be easily tracked. Physical server security Securing sensitive data needs the involvement of every member in an organization, from top to bottom. But physically protecting servers and data stores is the heart of the security and IT manager’s role. How much could a data breach cost someone? In the absence of appropriate physical server security, the mundane can be dangerous — and expensive. Recent research for IBM by the Ponemon Institute estimates the average total cost of a data breach at $3.86 million (€3.57 million). According to the same benchmark report, this average is rising, by 6.4% in the last year alone. Some of the highest breach costs are borne by companies in Europe, including Germany, France, Italy and the UK. Unauthorized access As Big Data gets bigger, so does the regulatory landscape for data handling Such costs can be direct: in business disruption, lost mailing lists or disabled logistics software. They can be indirect: an erosion of customer trust and damaged “brand equity”. Hard-earned goodwill and positive reputations are quickly reversed. Costs also come from fines levied by government and supranational regulators. As Big Data gets bigger, so does the regulatory landscape for data handling. The most relevant framework for those operating in the EMEA region is the European Union’s General Data Protection Regulation (GDPR). This wide-ranging data privacy rulebook has been enforced since May 2018. GDPR requires businesses to protect storage of all personal information, including customer and employee data. The business’ safeguards must include both electronic and physical barriers to unauthorized access. Server protection is critical. Physical security for the servers Does a company know who last accessed their servers, and when? If the answer to either question is “no”, the company is taking unnecessary risks with data security. Yet ensuring they stay on the regulators’ right side, and avoid a costly breach, could be straightforward: better access control. To ensure maximum security of their servers, in its recent white paper ASSA ABLOY recommends three levels of security working together within an integrated access system. Security management systems Level 1 — perimeter security ensures only authorized personnel enter a data storage building. Here, door and gate electronic locks with credential readers can work alongside the likes of CCTV and monitored fencing. It’s a company’s first line of physical breach defense. Level 2 — server room access can be monitored and controlled with a range of access control door devices with inbuilt credential readers, including Aperio battery-powered escutcheons or complete security locks. Either device integrates seamlessly with access and security management systems from over 100 different manufacturers. At room level, physical security must also include water- and dustproofing, electromagnetic security and protection against other physical threats to servers and data. Level 3 — final level of physical data security is a company’s server rack or cabinet. Server rooms have a steady flow of authorized traffic: cleaners, maintenance staff, repair technicians and others. Employee screening cannot be perfect — and accidents happen. Rack or cabinet locking with RFID readers is the last line of defense against a malicious or accidental physical data breach. Real-time access control ASSA ABLOY’s Aperio KS100 adds real-time access control and monitoring to server racks and cabinets ASSA ABLOY’s Aperio KS100 Server Cabinet Lock adds real-time access control and monitoring to server racks and cabinets. The lock works with an existing or new access control system; compatible credentials employ all standard RFID protocols including iCLASS, MIFARE and DESFire. Under the EU’s GDPR, the business must inform anyone affected by a breach “without undue delay”. With the Aperio KS100, the business would know right away if unauthorized access had even been attempted. Once installed, KS100 locks integrate with the access control system and communicate wirelessly via an Aperio Communications Hub, even if the company’s racks are co-located in a distant data centre. Once online integration with the security admin system is complete, lock access decisions are communicated from and recorded by the company’s software wirelessly. Data protection regulations “When Aperio replaces mechanical locking at all three levels of server access control, lost keys no longer compromise data security. Lost credentials are simply deauthorized and a valid replacement reissued. The current status of any lock, at any level, is revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 and other Aperio wireless locks invaluable for incident investigation”, explains Johan Olsén, Aperio Product Manager at ASSA ABLOY Opening Solutions EMEA. The right electronic locking keeps the customer reputation intact, the business data off the Dark Web, and on the right side of the multiple data protection regulations, including GDPR.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. There are 750 members with boats in the Vejle marina, and through the Harba booking system, they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed on a monthly base via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Readers with RFID tags and smartphone access ACT365’s readers were well suited to this installation because they are made of robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit card to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernise two buildings, university managers sought a retrofit-ready access control solution to upgrade security. Aperio locks University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities, the staff can deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily workload with mechanical locking — vanishes. Luminy campus is equipped with 372 Aperio Electronic Cylinders & 42 Aperio Electronic Handles with built-in RFID readers The Luminy campus is now equipped with 372 Aperio electronic cylinders & 42 Aperio electronic handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas — especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cédric Lopez, Maintenance Manager at Luminy. Campus security and incident management In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic — in real time. Because their new Aperio devices are integrated online, the staff can see a ‘live’ overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. Seamless integration with university’s scheduling system Aperio locks are built on an open platform for easy integration with the university’s scheduling system Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cédric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Aperio wireless technology Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus. Learn more about Aperio® at https://campaigns.assaabloyopeningsolutions.eu/aperio-university
Doncaster Culture and Leisure Trust (DCLT) is a registered charity delivering premier leisure provision venues across Doncaster. DCLT offers a diverse range of health, fitness, leisure, and entertainment activities to customers to help to achieve a healthier community across Doncaster. DCLT’s premier venue, The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Alongside interfacing the onsite gym membership system to enable a single source of data to populate the access control and automate the process, the Trust was also in a transition period of moving members from barcode to RFID badges. Advanced fast-acting swing speed gates Moreover, the entrance to The Fitness Village gym was also under renovation. The access control system would also need to feature advanced fast-acting swing speed gates and slim lanes. Advanced user obstacle protection also had to be kept in consideration to keep members safe during peak times when there would be a high level of footfall from visitors. Solutions Provided: Oliver Law Security (OLS) did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based product; it offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. In addition to DCLT’s security requirement, OLS also realized ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. Key Highlights: According to OLS, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. The system is very user-friendly and can grow with DCLT’s plan for the future, and adding further developed integration for other areas within the near future. The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The solution that OLS has implemented has removed the need for old, antiquated technologies and moved DCLT’s security system forward to the cloud and future-proof solutions. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernize two buildings, university managers sought a retrofit-ready access control solution to upgrade security. University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities staff deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys, part of the daily workload with mechanical locking, vanishes. The Luminy campus is now equipped with 372 Aperio Electronic Cylinders and 42 Aperio Electronic Handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas, especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cedric Lopez, Maintenance Manager at Luminy. Access smart-cards In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic, in real time. Because their new Aperio devices are integrated online, staff see a “live” overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. The benefits of Aperio extend beyond just enhanced campus safety and student security Real-time access control upgrades Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cedric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus.
Student accommodation is a fast-growing sector. Student numbers across France have grown around 10 percent in a decade. Around $1 billion was invested in France’s purpose-built student accommodation just between 2016 and 2018. Efficient solutions to help manage security for these student properties are always welcome. For new premises in Rennes, France, specialist provider Easy Student sought reliable, key-free locking. They wanted their new residence to run efficiently, “like a hotel,” and without the unnecessary workload that comes with managing and keeping track of physical keys. SMARTair Wall Readers Wireless Electronic Escutcheons with inbuilt RFID readers control access through 83 doors at Easy Student Rennes Following a positive experience with the same technology in Nantes, Easy Student chose SMARTair Update on Card wireless access control. Wireless Electronic Escutcheons with inbuilt RFID readers control access through 83 doors at Easy Student Rennes. SMARTair Wall Readers secure non-standard entrances. SMARTair’s TS1000 software was one major reason for Easy Student’s choice. The intuitive interface and time-saving functionality make it easy for administrators to manage their access system. “SMARTair does not require any technical knowledge. I trained quickly and found the software very easy,” says Cyril Verger, Managing Director at Easy Student Rennes. “The solution corresponds perfectly to our needs. Installation was simple.” If someone loses a credential, the TS1000 interface makes cancelling it fast and easy, a major change from the old days of physical keys, mechanical locks and key organization charts. “A lost key can still be used,” M. Verger adds. “A lost credential can be canceled easily.” Flexible door entry It gives Easy Student managers the ability to change a user’s access permissions anytime, without visiting the doors SMARTair provides secure, flexible access control for every student, service provider and facilities manager who uses the residence. Around 100 access credentials are active at any one time. It gives Easy Student managers the ability to change a user’s access permissions anytime, without visiting the doors. If an incident occurs, they act quickly and decisively. Security managers program every student credential to open multiple doors: the student’s own room, the main door and bike park around the clock; a common relaxation area and the laundry room between 6.30am and 11.30pm only. “Managing this way avoids comings and goings by people who don’t live here,” M. Verger says. “Our students are very happy with the solution,” he adds. “They got used to it quickly, because this type of access control is found in lots of hotels and private homes. I highly recommend installing SMARTair at other student residences.” Learn more about SMARTair® https://campaigns.assaabloyopeningsolutions.eu/student-accommodation
Fast-growing Spanish menswear brand Álvaro Moreno has selected ID Cloud, Nedap’s renowned RFID-based inventory visibility platform. The deployment of the RFID solution at source of production, in the distribution center and throughout the 50 stores across Spain started in June 2019 and was completed in September 2019. RFID inventory visibility platform Álvaro Moreno leverages RFID for complete traceability within the supply chain. “We believe RFID is a main pillar in our digitalization strategy as this allows us to close the gap between online and brick-and-mortar store experience”, says Álvaro Moreno, CEO of the menswear brand. Ultimate customer satisfaction is very important for our current and future success" “Ultimate customer satisfaction is very important for our current and future success. That is why we recently implemented omni-channel services such as BOPIS (Buy Online, Pick up in Store) and BORIS (Buy Online, Return in Store). In order to do this successfully, inventory accuracy as provided by RFID is key. For the future, we are considering to offer services like ship-from-store, mobile payment and self-checkout as well”, he continues. ID Cloud software suite Álvaro Moreno wanted to roll-out nationwide at a fast pace and was looking for a reliable partner. He said, “We selected Nedap because of their extensive experience within RFID projects. This enabled us to quickly deploy this technology throughout our 50 stores in just three months.” Nedap’s ID Cloud software suite is a Software-as-a-Service solution specifically developed for retail RFID applications. It offers retailers the quickest route to implement RFID and improve their in-store inventory accuracy to over 98%. Álvaro Moreno integrates ID Cloud with the Comerzzia POS-system. This enables seamless data transfer and provides the most accurate real-time business information.
Round table discussion
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?