Access Control Cards, Tags & Fobs(616)
Dahua Technology, a leading solution provider in the global video surveillance industry, has launched a new apartment outdoor station VTO9341D, providing new access control solutions to fence and lobby entrance with the cutting-edge face recognition technology. The apartment outdoor station elevates the safety and convenience of resident security system to a new level with the fashionable non-touch face-recognition entry, while conventional unlocking ways are preserved in case of emergency. The product’s working temperature is between -20°C to 60°C, meaning it can operate smoothly across a variety of weather conditions and geographical areas. With a shell made of aluminium alloy plate, it meets IP55 standard for water and dust resistance, and IK07 standard for impact resistance. Further enhanced by the Intrusion Prevention System, the product will offer ideal ingress protection to property owners and facilitate the work of security guards. Face recognition Once a person steps into the 0.5-metre distance within VTO9341D that triggers its approaching induction, the 2MP CMOS image sensor will capture the face in high-definition colour image for identification. In as quick as 0.5 second, it can complete recognition and open the door for the residents. With strong capacity to store up to 20000 faces, the system would suffice the demand of large housing estates or commercial lots. The Auto Gain Control supplements white light to cope with poorly-lighted conditions, enabling night vision for the outdoor station. Multiple unlocking approaches VTO9341D is also equipped with Mifare Card reader, fingerprint recognition (with a memory of 3000 fingerprints), and touch screen key pad, which provide multiple unlocking approaches via card, fingerprint and password. Working together with VTS5240B Master Station that can forward image to mobile devices, owners can even enjoy the remote unlock function while away from home. Additionally, the audio system supports bidirectional talk, which assists visitors and owners in dual-way communication as an auxiliary to face identification. As a high-end product with unique features and full market potential, VTO9341D will benefit both Dahua dealers and system integrators. With DSS EXPRESS monitoring access control & other Dahua exclusive technologies, the apartment outdoor station would lower the time cost of integration and maintenance.
Gallagher Command Centre is a powerful access and control solution designed to give you complete site control. Fully configurable to suit the unique needs of your site, Command Centre allows you to define, manage and report on all aspects of your system. Everything that happens on-site is relayed to your Command Centre operators in real time, enabling a swift and appropriate response to security threats. Seamless integration with complimentary security and site management solutions means Command Centre delivers on its promise. You’re in command. Command Centre v8 introduces new Site Plan functionality for greater situational awareness and responsiveness; Broadcast notifications to Mobile Connect for better communication in emergency situations; and Status and Overrides REST APIs for increased integration flexibility. To learn more about Gallagher Command Centre, please visit security.gallagher.com or contact your local Gallagher representative.
The new DSC1500 portable beam barricade sets up quickly and temporarily to block vehicles and secure locations during short-term events and anywhere a beam barricade is needed for interim security. With a clear opening of 16 feet (4.8 m), the DSC1500 is M30 certified, able to stop a 15,000 pound (66.7 kN) vehicle going 30 mph (48 kph). Many organisations have the need for easy to install, temporary drop-arm barriers that can install within 10 minutes to transitorily close down a roadway to one or two lanes or block parking lot exits to deter thefts. Previous beam barriers had to be filled with sand, gravel or cement to be operable. To remove the DSC1500 from its temporary site, it is simply repacked in ten (10) minutes." No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves using manual hydraulics to raise and lower the barriers off their wheels. A self-deploying trailer with integrated lifting device facilitates rapid installation. The process is simply reversed when the event is over or the time comes to deploy the beam barrier at another location. From a purchasing standpoint, it can be easier to buy portable beam barricades than permanent solutions. The latter are oftentimes placed into an organisation’s real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable beam barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department. For one time uses, a lease plan has been created where organisations can simply lease the portable barriers, use them, pack them up and return them. Delta always keeps an inventory for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. That’s because, in many cases, they are needed for events that come up quickly, such as emergency road or bridge construction or unexpected parking lot requirements.
With Openow™, facility managers and security administrators have more control and no longer need to administer physical credentials. And it’s fast and easy to upgrade an existing SMARTair® system to work with Openow™ or to install mobile-ready, wireless SMARTair® access control from scratch. The new Openow™ app has been designed around convenience, security and user experience with virtual keys. Information transfer between administration software, smartphone app and the SMARTair® device is protected by end-to-end encryption. “Right from set-up — involving simple, secure email subscription — users find the Openow™ app a joy to operate. Tap a SMARTair® lock with your phone carrying a valid virtual key, and the door unlocks. The device you carry everywhere — the smartphone — now replaces a separate RFID card with MIFARE®, DESFire, iCLASS® and other proximity technologies.” explains Félix Morán SMARTair® Product Manager at ASSA ABLOY. Openow™ also adds further layers of security to every premises Facility managers find life a lot simpler when managing access rights with the Openow™ mobile solution. Change the validation time in the administration software to automatically update a user’s virtual key (when the phone has a signal). Cancel a virtual key and it vanishes immediately from a user’s app. Facility managers can check and amend the validity of each virtual key whenever they want, and wherever they are. The complete mobile solution includes the SMARTair® device range, with wireless escutcheons and cylinders plus wall readers; the intuitive SMARTair® TS1000 software; user credentials, e.g. cards and the new Openow™ app. Business owners and directors project the right image for their premises when they offer mobile credentials via Openow™. Phones replace plastic key-cards, so there’s no need for a card activation terminal on reception or elsewhere. Users also save time, because there’s no longer any need to collect or validate an access card: your key is already on your smartphone. Openow™ makes it easy to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If you have virtual keys from multiple sites or premises, Openow™ easily handles those, too. No more key-card, or wondering where you left it; no more appointments to pick one up or have it revalidated. With Openow™, if you have your phone, you are already carrying your keys. The SMARTair® Openow™ app is free to download now from Apple’s App Store and the Google Play Store. For more information, see www.tesa.es/discoverwireless Across the EMEA region ASSA ABLOY offers SMARTair® under several trusted security brands, including TESA, Mul-T-Lock, ASSA, JPM, KESO, RUKO and TRIOVING.
The new Aperio® H100 packs the power and flexibility of wireless access control into one slim, cleverly designed door handle. With easy retrofitting to almost any interior door and comprehensive RFID compatibility, the new Aperio® H100 handle makes extending access control to more doors cost-effective by integrating with a vast range of third-party systems. The Aperio® H100’s stylish design is perfect for indoor office and facility doors. The Aperio® H100 can work within an online access control system or offline as a standalone device. A battery fits inside the handle, ensuring a minimal footprint and a discreet look to gel with any contemporary door style. The Aperio® H100 is easy to retrofit on existing doors, with no drilling and no wiring required. Any existing mechanical cylinder can still be used. The Aperio® H100 is specified with maximum flexibility and designed to fit almost any format of interior door. The Aperio® H100 is compatible with most common European (DIN) and Scandinavian mortise locks, in wooden, steel, tubular frame or glass doors with standard lock cases. It comes in left- and right-hand versions for a door between 35mm and 80mm thickness, with optional U-handle and USB adaptor. The Aperio® H100 is compatible with multiple RFID technologies, including iCLASS®/ISO14443B, iCLASS® SE, Seos®, MIFARE® Classic, Plus and EV1, and DESFire® SE. “Like all Aperio® devices, our new handle can upgrade site security for a very affordable price,” says Matthias Weiß, Product Manager Aperio® at ASSA ABLOY EMEA. “The Aperio® H100 further extends a range which adds access control wirelessly to exterior and interior doors, from fire and safety doors with regulatory requirements to meeting rooms, labs and offices.” The new Aperio® H100 handle completes a comprehensive range of Aperio® wireless access control devices that already includes online and offline Aperio® cylinders (C100/C900) and escutcheons (E100/E900); an online and offline lock (L100/L900); and a wireless lock for bringing server racks and cabinets (KS100) into the same access control system as doors.
The H4 Video Intercom integrates a 3 MP camera with a high-performance intercom and features exceptional wide dynamic range, low-light, noise reduction and echo-cancelling technologies for clear viewing and two-way communication with visitors. Combined with Avigilon Control Center (ACC) video management software, this secured entry system enables operators to quickly and easily identify and communicate with a visitor before remotely granting access.
The modern workplace never rests. People are always on the move and the environment is subject to constant change. As a result, the need for effective, flexible control and security is increasingly important. Every site has its own challenges and requirements; from the protection of files and documents to restricting access to sensitive areas in a medical centre or having real-time information about employee movements around a complex company. Intelligent online access control For every one of these needs and more, SMARTair™ Pro Wireless Online offers the ideal access control solution. This secure wireless system is quick and easy to install and provides cost-effectiveness by keeping energy use and maintenance costs to a minimum. The new SMARTair™ solution is an intelligent online access control system that uses bi-directional encrypted radio frequency communication to upgrade security and convenience for all building users. SMARTair™ wireless, battery-powered door devices communicate with the central control system via TCP/IP hubs. With SMARTair™, system administrators can now open secure doors from anywhere, configure a user’s access rights remotely, or obtain real-time audit trails for any access point within the organisation. Lost or stolen cards can be instantly cancelled. Simple and intuitive system software makes it easy for facility managers to receive active e-mail warnings and real-time reports, access real-time door updates, or modify the time and scheduling of access rights. Key components The system has a simple but effective architecture consisting of four key elements. Door and wall devices include wireless electronic escutcheons, cylinders and wall readers that can be installed at any type of exterior or interior door or access point. The SMARTair™ admin software is an intuitive management tool that offers flexibility and real-time control, accessible also from a secure portal that works inside almost any standard web browser. Communication hubs are the nexus between the management software server and the wireless online devices. Each can connect up to 30 access points at a distance of up to 30 metres. Finally, SMARTair™ supports all major RFID technologies, including iCLASS® by HID, MIFARE CLASSIC, DESFire and SKIDATA. It’s also compatible with multiple credentials for user convenience, including the SMARTair™ mobile phone app (Android, iOS, WinPho), cards, tags, bracelets and stickers. For more information visit www.tesa.es/discoverwireless
Complete access control and video management A browser and an internet connection are all that's required to access Vanderbilt’s latest addition to its cloud-based arsenal. ACT365 is a complete access control and video management solution. Ease of use and convenience are key ingredients to the product’s strength and depth in the field. ACT365 eases the installer's job for simple and quick installations and performing maintenance tasks remotely. The result is delivering ultimate control while saving time and money. With access to all sites from one online interface, installers can get more done, more easily, and in less time. Managing systems remotely Moreover, as ACT365 hardware is connected directly to the IP network, and no software needs to be installed as hosting is effectively outsourced, it ensures that the IT headaches of creating backups, VPNs, and port forwarding are things of the past. ACT365 also allows end-users the ability to manage their systems remotely including viewing live cameras. This remote monitoring capability makes it well-suited to multiple sectors. For example, dealing with early morning deliveries at a retail store is an ideal example of ACT365 in its prime. From the ACT365 app on their smartphone, the store manager can identify the courier through a live video feed and then remotely open the doors of the loading bay to allow the delivery to be made. The manager can monitor all of this remotely and once the delivery is finished, they can close the loading bay door and it will automatically rearm. Spotting misuse of gym membership Another instance of ACT365’s firepower can be seen at gyms or other types of membership clubs. If gym members are passing their access fobs to friends who are not members, ACT365 enables the gym manager to quickly match up access control events with relevant camera footage and email the clips to those members who are allowing their fobs to be misused. This is an effective way of ensuring the practice does not continue. As seen through numerous product demonstrations during IFSEC, ACT365’s features put the customer first. They eradicate once burdensome responsibilities that can now be promptly completed through the click of a button on mobile or desktop devices. Vanderbilt’s investment and innovation in cloud-based solutions harness the best efforts of the company’s core qualities – agility, adaptability, and dependability. Through the power of remote monitoring available from ACT365, Vanderbilt offers both installers and end-users convenience thorough simplicity.
“Where security is at home” at Security Essen, Hall 3, Booth F69. From 25 to 28 September, EVVA is presenting the home of security at Security Essen. At Stand 3F69, the latest products and updates can be tried out on the spot. The trade fair also marks next year's 100th anniversary of the long-established company.This will be the 23rd time that security experts from important branches of industry meet at this trade fair for four days and experience security innovations live. Security Essen is an excellent platform for presenting the latest trends in security technology. EVVA has been a byword for mechanical and electronic locking systems of the highest engineering standard for almost 100 years. What began in 1919 with the establishment of EVVA "Erfindungs-Versuchs-Verwertungs-Anstalt" still shapes the corporate philosophy: The company not only carries out research itself, but also develops and manufactures its own innovative access systems. EVVA is still a family-run business today and one of the most internationally successful companies in the industry. In 2019, it will be celebrating its 100th anniversary in style. Security Essen will mark the kick off of next year's 100th anniversary. New in the world of mechanics and electronics Trend scouts and curious visitors will be rewarded at EVVA’s stand 3F69 in Hall 3: Xesar has not only been upgraded, but further developed, with an entirely new system architecture included in the new Xesar 3.0 update. The new software makes it much easier for Xesar users to maintain control at a consistently high security level and with the greatest possible flexibility. The next generation of AirKey can be tested – with many smart, new features such as Send a key and Geotagging. EVVA experts will explain how to best utilise and combine electronic components. They will also be happy to answer questions on mechanical systems and to present the products and services in an interactive atmosphere. EVVA’s latest innovations at Security Essen: Xesar 3.0. Big ideas have been made a reality: Xesar has been upgraded and an entirely new system architecture has been developed with the new Xesar 3.0 update. The new software makes it much easier for Xesar users to maintain control at a consistently high security level and with the greatest possible flexibility. The advantages are plain to see: high scalability combined with many new features that open up an entirely new range of potential applications. AirKey. Smart, new features: AirKey represents modern and smart security: let your smartphone be the key. This access control system offers flexibility, independence and simple application. For anyone seeking maximum flexibility and maximum security – be it professionally or privately. SYMO: Need to shorten or lengthen a cylinder easily on site? No problem, with EVVA’s SYMO range. And on-site assembly is quicker than ever. The individual SYMO components can also be used in different systems.
The new CLIQ® Connect solution is a simple and cost-effective way for facility managers to administer mobile workers’ access control rights. Facility managers can update, amend, revoke or renew access rights remotely using the CLIQ® Web Manager software and the latest Bluetooth technology paired with a mobile phone. This enables a mobile worker in any location to access locks. They simply open the CLIQ® Connect app on their mobile phone to transfer updated access permissions instantly to their programmable CLIQ® key via Bluetooth. Flexible access control and key management CLIQ® is a locking system with high-end microelectronics powering programmable keys, cylinders and padlocks. It provides flexible access control and key management solutions for all kinds of locking applications, including those at critical infrastructure sites. With CLIQ®, each employee or contractor has tailored, individual access rights based on the specific time and date needed, all stored in their own programmable CLIQ® key. A lost key no longer threatens site security: system administrators simply remove its access permissions via the user-friendly CLIQ® Web Manager software — anytime and from anywhere. CLIQ® Connect app The new CLIQ® Connect app, part of the trusted CLIQ® ecosystem, makes mobile workflows even smoother. A keyholder no longer needs to update access rights physically in person, carry additional updating devices, or even return to base. CLIQ® Connect supplements — rather than replaces — wall or desktop programming devices (PDs). No additional hardware is needed, so off-site workers can amend their access rights without any need to carry mobile PDs. All they need is a smartphone and the CLIQ® Connect app. Data transfer between system and app is encrypted. The app pairs any programmable CLIQ® Connect key, via a secure cloud connection, with the CLIQ® Web Manager system. To change a keyholder’s access rights, the system administrator simply accesses the CLIQ® Web Manager software — from anywhere — and updates it. The keyholder makes a secure Bluetooth connection between the programmable CLIQ® Connect key and the app to instantly update their access permissions. Audit trails for any CLIQ® Connect key can be generated on demand, or automatically uploaded when a key’s access rights update takes place. The CLIQ® Connect key and companion app bring real-time security into the mobile era. Streamlining complex workflows “We designed CLIQ® to help our customers make their complex workflows more efficient,” says Kevin Hoare, Director Business Development CLIQ® at ASSA ABLOY EMEA. “With CLIQ® Connect, it’s now even easier to amend any time- or location-limited access rights that have been issued to remote workers. CLIQ® Connect significantly boosts site security, because access rights with very short validity are much easier to administer — making it even less likely that any lost key would pose a security threat. It slashes the time wasted on administering access rights, and saves money that would be spent on programming devices and key management systems.”
Vanderbilt released the latest version of ACT Enterprise on 25 September at the 2018 Security Essen event. What is it? ACT Enterprise is the control software suite for ACTpro hardware and streamlines the installation, management, and monitoring of the ACTpro access control system. The latest ACT Enterprise features include integration with Vanderbilt’s award-winning SPC intrusion system, a rules mapping engine, and a smartphone app. Why does it matter? The ACT Enterprise Apple and Android compatible apps mean real-time monitoring, user management and administration from your smartphone. You can lock and unlock doors, authorise users and check who’s in and who’s out – wherever you are. The ability to integrate with SPC further highlights the depth that the new feature set brings to the product’s strength. Now on one screen you can have high-quality graphical maps showing all access and alarm points from both systems, and you can control all devices with the click of a button. How does it work? One of the key new features in this ACT Enterprise release is rules mapping. The rules mapping engine offers the customer an intuitive method to create rules based on access control events and Boolean logic. It does this by permitting the creation of logical relationships between system elements through a drag-and-drop interface. For the end user, this addition ensures that system interactions can be seamlessly introduced on a system-wide basis, thereby enabling a higher level of added value to be realized, both for security and business-based functionalities. The ACT Enterprise rules mapping engine ensures intuitive, easy-to-use I/O management for trigger detection with compatible devices. These devices are usually attached to a door or an automated electrical that closes the circuit on the I/O unit. When this circuit is closed, an alarm is sent over the network, and ACT Enterprise captures that.
Nedap’s new end-to-end security solution is the first to offer digital protection for access control by unifying best practices from both IT and physical security. Protecting access control systems Until now, the latest best practices protecting IT systems from digital threat haven’t been used for physical access control systems. This is an oversight that is leaving many companies vulnerable to cyber attacks. Nedap and AET Europe have worked together to overcome this by developing AEOS end-to-end security. Taking a forward-thinking new approach, they have combined the best practices of both IT and physical security in an all-in-one access control system. Albert Dercksen, Head of R&D at Nedap, explains why AEOS end-to-end security is needed: “IT and physical security have been following different rules to protect systems. But modern access control systems are, in fact, IT systems connected to corporate networks and should be treated as such. That’s why we’ve applied the digital security principles used in IT to AEOS, our physical access control system.” Communication secured from end-to-end In AEOS end-to-end security, Nedap and AET Europe have combined the IT principles of encryption and strong authentication. This ensures storage in every element of AEOS is secure, as is communication between all elements. Both DESFire keys and digital certificates are stored in a Secure Access Module (SAM) inside door controllers. This leaves card readers with no role in decrypting data, so secure communication between card and controller is guaranteed and, by storing digital certificates in the same SAM, strong authentication is achieved to ensure secure communication between controller and server. Protect critical infrastructure In this way, AEOS end-to-end security offers far higher protection against both physical and digital threats. It also enables keys to be updated securely and centrally, without having to physically attend each card reader. AEOS end-to-end security meets a stringent level of security requirements across Europe, and is already being used to protect critical infrastructures in several countries. In France, for example, it has gained CSPN certification from the French information security agency, ANSSI.
HID Location Services platform addresses workplace optimisation, on a growing market need for accurate, real-time location awareness and analysis of your workplace. The system combines the power of Bluetooth Low-Energy (BLE), Wi-Fi, and cloud-based technologies to provide a unique seamless user experience inside and outside of the workspace. Organisations receive increased visibility into the precise location of their workplace in a defined space (indoor positioning/outdoor positioning) and can use predictive analytics to quickly understand space usage and building operational efficiency.
Browse Access Control Cards, Tags & Fobs
Access control card/ tag/ fob products updated recently
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The basic principles of access control are well established: only authorised people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organisation? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
Is your access control as effective as you think?Download
How to get buy-in from IT departments on IP video installationsDownload
The role of IT in physical access controlDownload
- ProdataKey and ASSA ABLOY wireless access control solution upgrades security at Glenaire Retirement Community
- CriticalArc’s SafeZone technology protects students and staff at three leading Australian universities
- ALMO installs Mobotix thermal imaging cameras at Newcastle tower blocks for faster fire detection
- Panasonic’s facial recognition technology helps Jumbo Ten Brink Food win the safest store award in the Netherlands