Pyronix Access Control Cards, Tags & Fobs(4)
Browse Access Control Cards, Tags & Fobs
Access control card/ tag/ fob products updated recently
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
Pyronix is delighted to provide even more value and capabilities to installers and users alike, with the addition of video verification to ProControl+. Now, using our Enforcer V10 control panel, Wi-Fi cameras and security and life safety peripherals, the system can be tailored to detect, notify and verify any activity. “We’re really pleased to add this latest feature to our ProControl+ app,” said Pyronix Marketing Manager, Laurence Kenny. "Video verification delivers fantastic upsell opportunities to video monitoring for our installers, while providing greater functions for the user; showing them exactly what activity has triggered an event or alarm.” The addition of video verification enables the linkage of Pyronix Full-HD Wi-Fi cameras to inputs on the system via the PyronixCloud. This simple setup process adds greater scope to security; providing a 25 second video clip directly to the user via ProControl+ when an event or alarm activation occurs. The clip, which can be downloaded and stored as an MP4 file, shows 15 seconds pre-alarm and 10 seconds post-alarm; allowing the user to truly verify the activation, before taking appropriate action. Voice push notification Whether it’s an existing system or maintainance, service can be offered to provide greater selling options for installers" For example, should an intruder be detected by an XDL12TT-WE outdoor detector, a push or voice push notification will be received by the user through their ProControl+ app, via the Enforcer V10 and PyronixCloud infrastructure. If this detector has been linked to an outdoor Mini Dome camera surveying the area, the user will also be provided with the 25 second video from the linked camera to verify the alarm. “By adding this new feature, we’re giving installers new services to offer their customers; expanding the security offering by providing real tangible benefits across both residential and commercial applications to users,” Laurence commented. "So, whether it’s an existing system, a maintenance visit or a brand-new installation, this added-value service can be offered to provide greater selling options for the installer and greater functions for the user. Simple to setup and deliver via the PyronixCloud, we want to make sure we continue to proactively provide more features, functions and capabilities via ProControl+.” Video verification for applications With video verification already added to ProControl+, more developments are in the pipeline “Now, the system not only alerts the user via voice push notification, but also shows exactly what activity has taken place on the system, so that appropriate action can be taken. Our objective is to continue to extend the potential of every installation and the level of function and value it adds to installers and users alike and we intend to do this as seamlessly and easily as possible.” Linking cameras with inputs can be set up to deliver video verification for various applications across the entire security system, from setting and unsetting, indoor detection, shock sensors and outdoor detectors, to life safety sensors, door and window contacts and even panic, hold-up and medical alerts; providing additional product upsell opportunities. With video, voice push notifications and now video verification already added to ProControl+ and many more developments in the pipeline, now’s the time to make the switch.
At IFSEC International 2019, Hikvision, the global supplier of innovative video surveillance products and solutions, will help launch the pioneering Secure by Default initiative, and unveil a host of its new product and technology developments. Secure by Default is a set of minimum requirements which for the first time will provide a guarantee for users that network video security products are as secure as possible in their default settings out of the box. Secure by Default will be launched by UK Surveillance Camera Commissioner Tony Porter as part of the first National Surveillance Camera day, the launch of which takes place on Thursday June 20 from 10am to 10:45am at the IFSEC Key Note arena. Porter’s address is followed immediately by a Hikvision interview panel further discussing Secure by Default and featuring Tony Porter, Detective Constable Patrick McBrearty, who is the Cyber Protect Officer within the Regional Organised Crime Unit for the West Midlands, Norbain’s Jeremy Hockham, and Hikvision’s Gary Harmer. Products and technology developments During IFSEC International 2019, Hikvision will be showcasing a host of its latest products and technology developments, including its: HikCentral Solution Deep Learning Series Panoramic Series Turbo HD Series Pro Series & Ultra Series PTZ Series Access Control & Intercom Series Smart Retail Solution Smart City Solution Smart Utilities Solution DarkFighterX Technology Technology Partner Program Portal Hikvision will also introduce its new Technology Partner Program Portal at the show. The TPP Portal is designed to bring together technology partners and systems integrators, in order to accelerate projects, enhance collaboration and drive the development of more innovative customer solutions. It will provide partner listings, easy engagement with Hikvision’s integration department, comprehensive technical documentation, management of Hikvision Embedded Open Program (HEOP) including license management, and regular updates and increased functionality. Pyronix will be launching a new addition to their all-round perimeter protection solution Intruder alarm specialist Pyronix, part of the Hikvision group of companies, will be present on the Hikvision stand during IFSEC International. Pyronix will be launching a new addition to their all-round perimeter protection solution, adding even greater functionality for additional peace of mind and greater upsell and retention advantages for installers. Hikvision partners on the stand Other Hikvision Technology Partners will also be present on the Hikvision stand, including: Manything Pro will be showcasing their offsite cloud video storage platform and showing how easy it is to add cloud to Hikvision camera installations. Manything Pro cloud storage plans start from £3.19/month, allowing installers and integrators to add margin and introduce a new recurring revenue stream to their businesses. IPS Intelligent Video Analytics will show five camera-based analytics modules for the HEOP. They enable indoor and outdoor real-time detection of motion, intrusion, sabotage and loitering. Seagate will be showcasing Seagate SkyHawk Health Management, with embedded drive monitoring software designed for prevention, intervention, and recovery. Now integrated with Hikvision NVR Plus receive notification alerts from the SkyHawk HDD directly to the Hik-Connect app. Visit Hikvision during IFSEC International 2019 at Stand IF1530. Stop by the stand for 15 minutes daily talks on hot industry topics: 12.00: Dive Into Deep Learning 13.00: HikCentral MasterClass 14:00: Pyronix Powering Business Growth
Exhibiting alongside their parent company Hikvision for the third time, Pyronix will be hosting new and existing customers at IFSEC International, UK and Europe’s leading security event and one of the biggest exhibitions in the security industry. Since IFSEC 2018, they have been listening to customer feedback; refining their product portfolio by developing advanced features and exciting new updates. Securing perimeter with XD detectors Securing a property’s perimeter can be one of the most effective ways to prevent intrusion. Pyronix has now taken that one step further. Pyronix will be demonstrating how to set up a secure perimeter with XD detectors, indoor and outdoor Wi-Fi camerasOn their stand, they’ll be demonstrating how to set up a secure perimeter with their XD detectors, indoor and outdoor Wi-Fi cameras, security control panels and the updated ProControl+ app; all soon to be made even more flexible! This year they’ll also be showcasing something very exciting at the show; adding even greater functionality to their all-rounded perimeter protection solution, for additional peace of mind and greater upsell and retention advantages for their installers. Bolstering the business of installers “We’re really excited to be showcasing their latest technology at IFSEC 2019,” Pyronix Marketing Manager, Laurence Kenny, said. He continued: “Our focus this year has been about developing a product and service offering that our installers can use to bolster their business growth. Our complete perimeter protection solution and video integration adds new dimensions and service offerings to the market, so we’re thrilled to be showing these new features at IFSEC.” To find out more about the launch and see their perimeter protection solutions in action, visit Pyronix on Stand IF1530.
The security behind financial securityDownload
Nine ways to make your retail security system work harderDownload
Financial institutions require future-ready physical security technologiesDownload
Maxxess eFusion technology to be integrated along with the critical building management and security systems at Wasl Tower in Dubai
- Maxxess eFusion technology to be integrated along with the critical building management and security systems at Wasl Tower in Dubai
- ASSA ABLOY's Aperio handles, security locks and escutcheons to secure H-Farm with streamlined access management
- ASSA ABLOY’s SMARTair swaps manual keys for centralised electronic access control at Westbridge
- PACOM’s 8002 integrated access and alarm controller helps Mimoto Parking keep Spain’s motorbikes safe and secure