Hirsch Electronics Access Control Accessories(16)
Browse Access Control Accessories
Access control system accessory products updated recently
The physical security market continues to experience growth as users look to capitalise on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase in cybersecurity threats and breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organisations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand for safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalise on opportunities for growth in the coming year.
2017 was quite an interesting and eventful year for the physical security industry. The economy has been robust and technology has become progressively sophisticated—with interactive services, cloud computing and network-based solutions taking charge to provide new insights to installers and their end-user customers. The Internet of Things is creating increasingly integrated solutions, with a heightened emphasis on total connectivity. Changing security expectations World events have also put the spotlight on the need for comprehensive security at public events, tourist attractions and schools and campuses. Security is an expectation and systems integrators are becoming trusted advisors to their customers, who are looking to them to solve problems or issues. Residential systems are more robust and now, are migrating to the commercial side of the business. There’s a blurring of the lines of technology—many of the products that come to the security industry originate from the consumer side. This proposition is also changing expectations by both residential and commercial customers, who want common, easy operation from their smartphone or user interface. Unexpected was some of the biggest deals in the industry, including acquisitions by dominant companies who grew even larger and continued ongoing consolidation on the manufacturing side. Those who remain will need to be progressive and step up their game with the latest proven technologies. Selling hardware isn’t the end game any longer. It’s providing solutions that generate revenue for security dealers and offer a solid return on investment for the end-user. In addition, solutions need to be easier for the user, and integrate many different systems and components across the enterprise. Cybersecurity safeguards End users want to get the most out of their solutions—and they want to be able to have more than safety and security. They are looking for the types of products that yield insights into system performance and give them the data the need for greater control and to proactively address any challenges or problems before they occur. Downtime is not an option and therefore, there’s an increased emphasis on consistent power so solutions are always on and running reliably. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines Cybersecurity is a dominant conversation in the security industry these days and that buzz will continue into 2018. Because solutions are increasingly network connected, they have vulnerabilities that will have to be addressed by service providers and manufacturers. Manufacturers will need to take the upper hand in providing hardened products—testing and certifying for cybersecurity safeguards. That is not an easy task and can be expensive, but it needs to be done. Because cybersecurity is in constant evolution, many will go the route of outsourcing this component of their manufacturing to third parties well-versed in threat detection and hardening. Hardened products will also need to evolve with new emerging attacks. For security dealers and integrators, physical security and cybersecurity services will be part of their offerings and no longer separate disciplines. Intelligent access control solutions Manufacturers no longer operate in silos. They are working with systems integrators to more fully understand their needs and those of the end-user. Manufacturers are also partnering with technology providers—bringing in the expertise of others so their solutions are comprehensive and holistic. We will continue to see integration of formerly disparate components, open systems and open APIs. There will also be strong migration to access control systems with edge intelligence and power over Ethernet, leveraging existing cabling for network connectivity. The winners will be those who take the lead in providing cyber secured and hardened products, as well as companies who partner with others to bring best of breed solutions to market. The losers will be those who continue to develop proprietary, closed systems and fail to recognise the importance of network connectivity for real-time, proactive reporting. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7 Ongoing partner success LifeSafety Power® has been working consistently and diligently on elevating the status of power from unintelligent hardware device to network-connected component that yields rich data for the user and allows the installer to provide remote monitoring and managed power services. We have changed the paradigm of power but there’s additional work to do to get people to understand the new, critical role power plays in comprehensive enterprise and campus security. Now, security installers can help the end user know what’s happening with locks, access control, gates or other connected solutions and fix problems before they happen. Without networked power, the facility cannot yield the proper insights it needs to stay reliably connected 24/7. We have also had continued, ongoing successes with our many partners in the access control community and that’s where we will further focus our efforts in 2018—working with leading security solution providers to present the best technologies and solutions that are reliable, certified and present the types of insights security dealers need to offer customers to provide the highest levels of service. This will also help security dealers and integrators differentiate themselves and compete more effectively in the crowded marketplace.
Part 1 in our Intercoms in Security Series Lambert-St. Louis International Airport uses Code Blue intercoms Organisations are demanding a new level of interoperability among mission-critical security systems. Intelligible audio, the ability to hear, be heard and be understood, is critical to communication, which is essential to the core security processes within an organisation, as well as to emergency situations. Intelligible audio provides a platform to optimise various processes, including the use of security officers. “Our main thrust is to ensure our clients see intelligible and interoperable audio, not as an option, but as instrumental to their budget optimisation, stakeholder communication and risk mitigation efforts,” says Jim Hoffpauir, President of Zenitel North America, a manufacturer of intercoms and other communications solutions. Iintercoms in building safety and security The role of intercoms in building safety and security is a given across many markets, and that use is growing. Intercoms are used in campus call boxes, elevators, muster locations, and for emergency notification. The trend is toward video, audio and access control, all tied together. There is also an emphasis on providing intelligible audio in any environment, even demanding ones. The education market has historically been a large sector for intercoms. Emergency phones and intercoms traditionally have been found throughout education settings, including colleges and universities, where they remain quite popular. Expanding markets for two-way communication In recent years, however, their popularity has also grown within the healthcare and mass transit sectors, where their versatility allows authorities to react to emergency situations while also providing a wide range of applications for non-emergency situations, such as car trouble or requests for directions. Intercoms can fulfill a variety of emergency and non-emergency needs in places like downtown Santa Ana, California (Photo courtesy Code Blue) “Markets of all sizes and shapes can benefit from a two-way communication solution that can help individuals place calls for assistance with first responders, police departments or customer service representatives,” says David Fleming, Chief Design Officer for Code Blue Corp. Intercoms for public and private sectors Aiphone is another intercom manufacturer for which education is a big market. Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp., says about 80 percent of both public and private K-12 and higher education campuses are using at least one intercom in some form. That percentage grows to nearly 100 percent for hospitals, which are using intercoms as nurse-call stations and at parking facilities, exterior door entries, nurseries and pharmacies, he says. "About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms" Up to 70 percent of larger multi-family facilities are also using intercoms. And that percentage is even higher in older, heavily populated Eastern cities. Many locales have laws mandating the use of audio and video intercoms on buildings beyond a threshold number of units. About 40 percent of commercial units – from strip malls to large, multi-tenant campus settings – are using intercoms, says Czerwinski. In the past year, Aiphone’s emergency stations have become very popular, particularly in campus settings; both commercial and higher education. Also, a growing number of unmanned parking garages are using the stations to allow patrons to immediately reach first responders or security personnel. Each of these markets still has growth potential, but by its sheer size, the commercial market offers the greatest opportunities, according to Aiphone. Video-enabled IP intercoms Intercom usage differs widely in various global markets, according to Craig Szmania, CEO of 2N USA, a manufacturer of IP intercoms. In the North American market, intercom usage is relatively low compared to the Europe, Middle East, and Africa (EMEA) region, where intercoms are a more mature market. Security, convenience, systems integration and IP-versus-analogue adoption are driving usage and growth to more than 20 percent year-over-year. More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution, according to Szmania. “Our intercom portfolio targets all the major verticals, but we have had particular success in the education sector – K-12 and universities,” says Szmania. “These end users are looking for specific features in securing their campuses, providing convenience to their administrators, employing programmability for differing use scenarios throughout the campus, and integration to their telephony or other systems.” More and more video-enabled IP intercoms are seen as an integral part of a system wide security and video solution Szmania says the latter point is becoming a particular need in light of a requirement for campus-wide communication and coordination in emergency situations. “Our intercoms integrate seamlessly with third party solutions such as Cisco’s telephone systems that are the communication backbones of many schools and campuses,” he adds. IP-based solutions in residential verticals Considering near-term growth potential, single family and multi-tenant residential verticals have fantastic opportunities for increased usage of door stations/intercoms in the United States, according to Szmania. The company has entered this space over the last several years and has grown to be a market leader in IP-based integrated solutions, especially in the home automation space. The adoption of IP networked solutions for condominiums and apartments is just taking off, driven in part by consumer demand for mobile-anywhere video, audio and door control. The service is also a driver for integrator/dealer adoption of the technology to provide recurring monthly revenue (RMR). 2N has also achieved triple-digit growth in commercial building installations over the past two years. Building owners, IT departments and security managers want and need a networked solution for control and security. 2N’s open platforms are a good fit, says Szmania. Read part 2 of our Security Intercoms series here
Identiv, Inc. announced that integral components of the company’s award-winning, high-security access control portfolio — Hirsch Mx-4 and Mx-8 Controllers, Relay Expansion Board with 8 Inputs (REB8), and Alarm Expansion Board with 8 Inputs (AEB8) — have received EurAsian Conformity (EAC) and UkrSEPRO certifications. With this global expansion, Identiv and its Hirsch and Cisco partners are now approved to sell and ship the high-security physical access control products to EAC member countries, including Russia, Belarus, Kazakhstan, Armenia, Kyrgyzstan, as well as Ukraine. Hirsch Mx-4 and Mx-8 Controllers are four and eight-door models of the innovative Hirsch Mx Controller line. Award-winning, multi-door Mx provides a wide range of features for enterprise-scale solutions encompassing large buildings, campuses, and multi-campus facilities. The modular design and scalable architecture enable an installation to start small and grow large, from a single controller system to a larger, multi-site enterprise. Mx is the core of Identiv’s physical access control system (PACS) portfolio. It is fully firmware, function, and communication protocol compatible to the complete Hirsch family of products. Hirsch Velocity Software and ICPAM An expansion board for the Mx line, AEB8 adds eight additional high security alarm inputs, allowing the Mx to monitor devices like motion sensors and duress buttons. The REB8 adds eight additional 2 Amp Form C relays to control access to specific floors, individual racks in a datacenter, drug cabinets in a pharmacy, or weapons storage lockers at a military armory. Each controller supports up to five boards. Users can choose to connect an Mx Controller to either Identiv’s government-grade Hirsch Velocity Software or Identiv Connected Physical Access Manager (ICPAM). Identiv’s Hirsch Velocity Software is an integrated platform that manages access control and security operations in thousands of different facilities, from single high secure rooms to multi-building, multi-location campuses, meeting the most stringent security compliance requirements. ICPAM is a software platform developed to utilise Cisco’s industry-leading IP networking technology to connect and manage Identiv’s feature-rich Hirsch physical access hardware, sold and supported by Cisco and Cisco channel partners. “Customers around the globe depend on Identiv to provide the most reliable, cost-effective, simplest to install physical security systems in the world,” said Edward MacBeth, Identiv VP Global Sales. “We help protect museums, jails, federal facilities, airports — anywhere that needs a complete, secure, easy-to-maintain system. As part of Identiv’s commitment to a global presence, we are pleased to announce that our Hirsch Mx-4 and Mx-8 Controllers, REB8, and AEB8 have received EAC and UkrSEPRO certifications. These certifications of product quality and safety now allow Identiv’s Hirsch and Cisco partners in these regions to provide their customers with these integral components of our high-security physical access control portfolio. It is our goal to make affordable, award-winning access control universally available.” Easy integration with Cisco application ecosystem A global standard for over three decades, Identiv’s government-grade Hirsch portfolio is robust, extremely reliable, feature rich, and while designed and developed with the most secure facilities in mind, is priced to install anywhere. Designed from the ground up to be optimised for network architectures, ICPAM easily integrates with the Cisco application ecosystem.
Identiv, Inc. has announced that the company will showcase its latest robust, reliable, feature-rich physical security solutions during ASIS International 63rd Annual Seminar and Exhibits (ASIS 2017) on September 26 – 28, 2017 in Dallas, Texas. During ASIS 2017, Identiv will provide live demonstrations of its new Power over Ethernet (PoE) edge controller, Hirsch Mx-1, the latest update to its network-based, Cisco-integrated Identiv Connected Physical Access Manager (ICPAM), its award-winning, APL-certified Hirsch U.S. government FICAM solution, the newest, FICAM-compatible update to its Hirsch Velocity Software, featuring enhanced communications protocols and government-grade biometric support, and its newest line of physical access readers. Visit Identiv at booth 3617 during ASIS 2017. ASIS International is an organisation for security professionals worldwide. For the 2017 event, more than 22,000 global security professionals from both the operational and cyber security disciplines are anticipated to attend the three-day conference.
StoneLock Pro’s proprietary NIR technology measures over 2,000 points of reflectivity at the sub-dermal level StoneLock, a designer and manufacturer of secure facial-recognition access control solutions, announces that it is participating at ISC West, April 4-7, 2017 at the Sands Expo in Las Vegas. In addition to the StoneLock exhibit space at Booth #7040, StoneLock technology will be demonstrated with industry partners AMAG at Booth #10053, Boon Edam at Booth #8037, HID Global at Booth #11063, Hirsch by Identiv at Booth #L6 and TYCO Security Products at Booth #20005. “The past year has realised unprecedented growth in sales, partnerships and product advancements for StoneLock and we look forward to returning to ISC West for our fourth consecutive year since coming to market in 2013,” said CEO and Co-Founder Colleen Dunlap. “This year, StoneLock is excited to unveil the latest innovations with our industry leading StoneLock Pro devices, which provide a superior way to confidently and securely verify identities, whether used as a standalone solution, or as part of an integrated security system.” Near Infrared (NIR) Technology StoneLock Pro’s proprietary near infrared (NIR) technology measures over 2,000 points of reflectivity at the sub-dermal level and creates an encrypted reference file that never contains personally identifiable information (PII), making it less susceptible to typical security and privacy-laden vulnerabilities associated with photo-based facial recognition systems. With an accuracy rate of less than one in a quarter million, (less than 0.0004% False Acceptance Rate) it is ideal for users who recognise the inherent weaknesses of standalone access badges or PINs that can get lost, stolen, or shared. StoneLock’s frictionless and reliable verification of identity is quickly gaining acceptance in the most critical and rigorous applications enterprise security has to offer with adoption by over a third of the Fortune 100 companies as their enterprise biometric of choice for access control.
Physical security supports a future-proof cyber security strategyDownload
Combining systems intelligence and human insight for superior securityDownload
Three reasons for adopting open architecture access control solutionsDownload
- Airbus provided state-of-the-art communication solutions to secure the G7 meeting at Biarritz
- ASSA ABLOY offers range of locks and doors to safeguard Pupil Referral Units and pupils in care
- Alpro secures Fred Perry headquarters with transom door closers, pole and door handles
- ASSA ABLOY’s door opening solutions safeguard RAF Benson children's nursery