ISONAS Access Control Cards, Tags & Fobs(4)
Browse Access Control Cards, Tags & Fobs
Access control card/ tag/ fob products updated recently
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
Cybersecurity has become a major element – and a major source of discussion – in the physical security marketplace as a result of the rise in networked systems. And we may still not be talking enough about cybersecurity. Here is part one of our Cybersecurity series. “Cybersecurity requires everyone in the security industry to be playing offense and defense at the same time, every single day,” says Bill Bozeman, President and CEO of PSA Security Network. “It needs to just become part of the standard conversation when we are talking about physical security because they are so intertwined.” Creating new industry leaders Cybersecurity and physical security can be seen as two parts of a single entity, and increasingly the two will be combined at the enterprise level over the next several years. “This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership,” says Rob Lydic of ISONAS, now part of Allegion. Data capture form to appear here! Cybersecurity issues dominate almost every discussion in today’s physical security industry, and the clear message is that “manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities,” says Lydic. He contends that cloud services providers (such as ISONAS) are more cybersecure and reliable ‘by orders of magnitude’ than non-cloud solutions. Cybersecurity is linked to cloud-based systems and managed security service provider models Cloud-based services The Security Industry Association (SIA) has listed cybersecurity as one of 2019’s ‘Top Megatrends’ in the physical security market. SIA says it is important to prioritise cybersecurity among security businesses, for customers’ businesses, and for vendors. The trend calls for continual process improvement and investment. Bill Bozeman of PSA Security Network agrees: “Cybersecurity has definitely taken a strong foothold in the industry.” With the continued expansion of cloud-based services, cybersecurity will be more important than ever to integrators, manufacturers and end users alike, he says. Notably, cybersecurity is directly linked to two other important industry trends listed by Bozeman: cloud-based systems and the rise in recurring monthly revenue (RMR) and managed security service provider (MSSP) models, whose focus will include cybersecurity. Loss prevention executives The days when cybersecurity was exclusively the domain of the information technology (IT) department are gone. “Cybercrime is one of the biggest threats organisations of all sizes and types face today,” says Michael Malone, CEO of ADT Cybersecurity (formerly known as Datashield). “Considering the magnitude of these crimes, it now falls on the entire organisation, including the traditional security or loss prevention executives, to band together to combat these threats.” Cybercrime is one of the biggest threats organisations of all sizes and types face today Malone favours (and his company offers) a managed detection and response (MDR) service, which combines advanced technology and human analysis. Using packet capture on the network, an MDR analyst can ‘replay’ a cyber security event and dig deeper into the incident and determine remediation steps. It’s an approach that significantly cuts through false positive ‘noise’ so security teams can focus on what matters. Helping security officers Interestingly, cybersecurity is poised to benefit from another major trend in the physical security market – the rise of artificial intelligence. Specifically, machine learning applications for cybersecurity include: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analysing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. But AI in this case is not a panacea. Christopher McDaniels of Mosaic451 recommends pairing human intellect with machine technology to sort through data faster and catch hackers before they do much damage. See part two of our Cybersecurity series here.
Booth number: 20043 ISONAS, now part of the Allegion family of brands, is an IoT solution for physical access control with a purely IP-based reader-controller driven from a fully featured access control software hosted in the cloud. ISONAS has been revolutionising access control with this simple solution and is a leading manufacturer of Pure IP Access Control hardware. The open architecture hardware can be paired with their cloud-hosted software or with any full-featured access control solution; providing a complete access control platform. An ISONAS system provides an ideal product solution for securing facilities while reducing costs and providing all of the advantages that Pure IP technology brings to the door. We use ISC West to establish thought leadership opportunities in the market and drive the appropriate groups to our booth Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience? The first full year we exhibited at ISC West was in 2015. We had a smaller booth in relation to the show, but one of the most memorable moments was the energy of the tradeshow floor and in our booth – almost like being on the floor of the stock exchange. The constant flow of people through our booth was a fulfilling experience - the number of folks that patiently waited to hear the ISONAS story and learn why our products could provide differentiation for them in the market was validation of our hard work. Q: What strategies do you use to get the most out of exhibiting at ISC West? We have a strategic formula for pre-show, during show and post show communications and messaging. ISC West has traditionally been one of the largest marketing spends annually and our objective was to drive significant traffic and see as many people as possible. To do this we task our teams with setting meetings with customers ahead of time. In addition, we use ISC West to establish thought leadership opportunities in the market and drive the appropriate groups to our booth to help proliferate our message. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? We quantify success by the number of leads, along with the quality of those leads and how many turn into viable opportunities. We also measure success based on the amount of thought leadership coverage we obtain, and relationships we build. The face-to-face conversations with partners and customers is also invaluable and tough to gauge from the ROI perspective, but it is an important part to building real relationships and trust with customers. Q: What company activities (outside the show floor) does your company organise each year? ISC West is where the who’s who of the security industry debut new products and partnerships Traditionally we have held our annual sales meeting prior to ISC West to bring our teams together for some face time as well as educate them on new products, messaging and talking points for the trade show. Q: What sets ISC West apart from other trade shows on the calendar? ISC West is where the who’s who of the security industry debut new products and partnerships. The educational workshops, industry events and ability to connect with the majority of your network for three days in one place is incredibly valuable. Customers from all verticals and sizes see value in the ISC West show, and this drives high attendance rates and a greater opportunity to interact with new and existing customers.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
H.265 High Efficiency Coding: Video compression for security applicationsDownload
How to overcome the storage challenges of adopting surveillance AIDownload
Physical security supports a future-proof cyber security strategyDownload
- ASSA ABLOY's Aperio handles, security locks and escutcheons to secure H-Farm with streamlined access management
- ASSA ABLOY’s SMARTair swaps manual keys for centralised electronic access control at Westbridge
- PACOM’s 8002 integrated access and alarm controller helps Mimoto Parking keep Spain’s motorbikes safe and secure
- Third Millennium and Kings Secure Technologies combine to retrofit client site with high-security card reader technology