Lenel Access Control Accessories (5)
The LNL-400X-CE220 is power-limited supply/charger that converts a 230 VAC, 60Hz input into a power limited 12 VDC or 24 VDC output. Includes tamper switch and short circuit protection. Dimensions including enclosure: 610x 457 x 114. Can accommodate up to 6 Lenel Access Control Modules. Surge protected outputs. Thermal overload protection and short circuit protection.Add to Compare
Includes high resolution CCD camera with software zoom capabilities for capturing badgeholder images. Built-in flash, tripod system. Rapid images download. USB 1.1 (USB 2.0 compliant) PAL or NTSC available.Add to Compare
The LNL-400X-CE220 is power-limited supply/charger that converts a 230 VAC, 60Hz input into a power limited 12 VDC or 24 VDC output. Includes tamper switch and short circuit protection. Dimensions including enclosure: 304 x 406 x 114.Add to Compare
Browse Access Control Accessories
Access control system accessory products updated recently
From analogue to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamour for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone has entered a restricted area: – it simply isn’t efficient. For similar reasons, a building manager wants a single interface to control heating and lighting to match fluctuating occupancy levels, particularly in a hybrid working model. Applying the digital glue The demand from end-users for system convergence is growing, but to achieve full interoperability you still need to apply some ‘digital glue’ and that requires expertise. Yet bringing together disparate systems from different manufacturers can be problematic. Just as you get things to work, someone upgrades their solution and your carefully implemented convergence can start to come unstuck. Managing an implementation can quickly become more complicated, today’s quick-fix can become tomorrow’s headache This is one of the principal issues with all types of new technology; not everyone will choose the same path to reach the desired goal – it’s the old VHS/Betamax argument updated for building management and security systems. Managing and maintaining an implementation can quickly become more complicated than it first appears and without proper oversight, today’s quick-fix can become tomorrow’s technical headache. Effective support for a hybrid workforce Today’s hybrid workforce is a response to the pandemic that looks set to become an established part of working life for many companies across the world. Security systems have a massive role to play in facilitating this transformation that goes beyond simple intrusion detection, access control, and video monitoring. They can identify the most densely populated areas in a building to comply with social distancing guidelines and provide efficient use of space. The insights gathered from a security system can also be used to identify patterns of behaviour, which can then be used for planning and directing the use of building space to help create the best possible working environment while also minimising heating, lighting, and air conditioning expenditures. Identity credentials can help manage compliance with industry regulations by limiting access to certain areas Similarly, identity credentials – either biometric or mobile-based – can help manage compliance to industry regulations by limiting access to certain areas only to approved employees. Creating and maintaining the appropriate level of functionality requires a combination of innovative solutions and industry experience. The complete security package It’s not just physical security that’s important – cybersecurity is a major focus, too. Bringing together both the physical security and cybersecurity realms is increasingly becoming a ‘must have’ capability. What is evident is that the pace of technological change is faster than ever. Today’s functionality simply wouldn’t have been possible just a few years ago, while today’s leading-edge developments may seem commonplace in five years.
Ensuring employee health and safety remains a key priority for organisations this year, especially as we see COVID-19 cases continue to rise in different areas of the world. As an ongoing challenge, COVID-19 has shifted the priorities of many organisations. In fact, “improving health and safety for employees” is the top strategic goal this year of manufacturing and logistics organisations in the U.S. and U.K., according to research conducted by Forrester on behalf of STANLEY Security. But as we think about reopening and as hybrid workforce models and “workspace-on-demand” approaches rise in popularity, leaders need to consider implementing the right technologies to help ensure a safe return to the office. This means investing in health, safety, and security solutions that can help leaders protect their people. The intersection of security technology and health and safety There’s no doubt that the scope of security has expanded in the wake of the global pandemic. What was once an area governed by a select few security or IT professionals within a business has now become a crucial company investment involving many key stakeholders. The role of security has expanded to encompass a broader range of health and safety challenges for businesses Additionally, the role of security has expanded to encompass a broader range of health and safety challenges for businesses. Fortunately, security technologies have made significant strides and many solutions, both existing and new, have been thrust forward to address today’s biggest business challenges. Investment in security technology It’s important to note that businesses are eager to adopt tech that can help them protect their people. Nearly half (46%) of organisations surveyed by Forrester report that they’re considering an increasing investment in technology solutions that ensure employee safety. Technologies like touchless access control, visitor management systems, occupancy monitoring, and installed/wearable proximity sensors are among some of the many security technologies these organisations have implemented or are planning to implement yet this year. Facilitating a safe return to work But what does the future look like? When it comes to the post-pandemic workplace, organisations are taking a hard look at their return-to-work strategy. Flexible or hybrid workforce models require a suite of security solutions to help ensure a safer, healthier environment More than half (53%) of organisations surveyed by Forrester are looking to introduce a flexible work schedule for their employees as they make decisions about returning to work and keeping employees safe post-pandemic. Such flexible – or hybrid – workforce models require a suite of security solutions to help ensure a safer, healthier environment for all who traverse a facility or work on-site. One of the central safety and security challenges raised by these hybrid models is tracking who is present in the building at any one time – and where or how they interact. Leveraging security technology With staggered schedules and what may seem like a steady stream of people passing through, it can be difficult to know who’s an employee and who’s a visitor. Access control will be key to monitoring and managing the flow of people on-site and preventing unauthorised access. When access control systems are properly integrated with visitor management solutions, businesses can unlock further benefits and efficiencies. For instance, integrated visitor management systems can allow for pre-registration of visitors and employees – granting mobile credentials before people arrive on-site – and automated health screening surveys can be sent out in advance to help mitigate risk. Once someone reaches the premises, these systems can also be used to detect the person’s temperature and scan for a face mask, if needed. We will likely see these types of visitor management and advanced screening solutions continue to rise in popularity, as 47% of organisations surveyed by Forrester report that they’re considering requiring employee health screening post-pandemic. Defining the office of the future A modern, dynamic workforce model will require an agile approach to office management. It’s imperative to strike the right balance between making people feel welcome and reassuring Businesses want to create an environment in which people feel comfortable and confident – a space where employees can collaborate and be creative. It’s imperative to strike the right balance between making people feel welcome and reassuring them that the necessary security measures are in place to ensure not only their safety but also their health. In many cases, this balancing act has created an unintended consequence: Everyone now feels like a visitor to a building. Protocols and processes With employees required to undergo the same screening processes and protocols as a guest, we’ve seen a transformation in the on-site experience. This further underscores the need for seamless, automated, and tightly integrated security solutions that can improve the employee and visitor experience, while helping to ensure health and safety. Ultimately, the future of the office is not about what a space looks like, but how people feel in it. This means adopting a “safety-always” culture, underpinned by the right technology, to ensure people that their safety remains a business’ top priority.
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organisations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing. Most organisations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes. The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security. Vulnerabilities and challenges In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalised and adopted into industry standards by the Security Industry Association in the 1990s. Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources. Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organisations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS. Legacy access control protocol Despite the well-publicised vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems. This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors. OSDP is a communication standard Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously. These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products. Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard. Why implement OSDP as a standard? OSDP is the only protocol that is secure and open for communication between readers and controllers The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organisations recognise the value of implementing an integrated solution to enhance security and add value to technology investment. OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits: 1) Increased security Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined. 2) Bidirectional communication Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller. 3) Open and interoperable OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system. 4) Reduced installation costs OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices. Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data. 5) User friendly OSDP gives credential holders greater ease of use, with audio and visual feedback such as coloured lights, audible beeps, and the ability to display alerts on the reader. For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices. Unlimited application enhancements OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment. OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organisations can use systems from numerous manufacturers as they invest in infrastructure that maximises the protection of critical data. For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader. Cost savings upon system upgrade Integrators can also capitalise on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects. Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers. Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organisations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
Soloinsight Inc., a workflow automation platform company, will be featured at this year’s CREtech event in New York City. The company’s CEO, Carter Kennedy, will be a panelist for the show’s ‘The Ever-Evolving and Future of Access Control’ session on Wednesday, October 13th at 11 am EST. As a company that was recently awarded the Security Industry Association’s (SIA) new product showcase award in the hosted solutions/managed services category, Soloinsight is no stranger to innovating in the commercial real estate and access control industries. Workflow automation platform Soloinsight has integrated with some of the biggest names in the access control and visitor identity spaces Their product, CloudGate, is a visitor identity and access management (VIAM) platform that delivers unprecedented security and an intuitive guest and host experience at multiple locations via the cloud, on-prem, or hybrid infrastructures. Since the introduction of CloudGate, Soloinsight has integrated with some of the biggest names in the access control and visitor identity spaces, such as Johnson Controls, LenelS2, and Honeywell, to deliver a secure and seamless security workflow automation platform. With a platform that touches nearly every point in visitor and access management — from its mobile concierge technology, self-service kiosks, and turnstile integrations, Soloinsight is poised to be a game-changer in the commercial real estate industry. “We are excited to partner with access control manufacturers and property management companies to alleviate these challenges and advance their access control systems to the next level.” - President and CTO, Farhan Masood.
LifeSafety Power will showcase its award-winning intelligent networked power supplies at booth 1463 during this year’s GSX show, September 27-29 in Orlando. Featured products include: FPO Generation 2 - Recently redesigned and re-engineered with updated features and capabilities, the FlexPower® FPO Generation 2 (Gen2) power supply line brings additional enhancements to both installers and users in the access control market. Network communications module FlexPower Gen2 includes the groundbreaking OutSmart™ visual voltage indication across all boards, visually showing the technician the output voltage of the power supply boards and each distributed output. Optional RS-485 capability on FPO and M8 devices allows larger managed systems on fewer network drops with the NLX NetLink™ network communications module. Refinements like built-in low battery disconnect and battery current sensor foster cleaner installations Added data points such as AC input voltage and main output current measurements on the FPO power supply and output cycle counts on the M8 yield a comprehensive view of overall system health. Refinements like built-in low battery disconnect and battery current sensor foster cleaner installations. Access control boards E12M and E12S Enclosures - One of the most spacious enclosures in the industry, the E12 is available in Unified Power or ProWire with dimensions of 48 (H) x 36 (W) x 8 (D). The E12 handles larger enterprise access control deployments–accommodating more access control boards, power supplies and managed outputs in a single enclosure for hardware and deployment savings. The E12 houses up to three FlexPower FPO power supply boards to allow up to 750 Watts of power to locking hardware, access control boards and auxiliary devices. It comes in two configurations: the E12M integrates with authentic Mercury Systems and handles 24 doors of access control; E12S integrates with Software House (SWH) controllers to handle up to 32 doors. Security management software NetLink lets users remotely monitor, control, program and report on system power Access Control Integrations - LifeSafety Power’s solutions integrate with several industry-preferred access control security management software platforms, including Genetec Security Center; OnGuard® for Lenel S2; and C•CURE 9000 from SWH. Security Center Integration for Genetec - Leveraging the Genetec integration between NetLink network communication device and Security Center, users can seamlessly add NetLink devices into the software platform, allowing real-time alerts to appear directly within the interface. From Security Center, users receive detailed data on the health and viability of power, connected locks and other devices. NetLink lets users remotely monitor, control, program and report on system power and connected devices and features patented battery management that includes health reporting, remote battery testing, email/SNMP alerts and other proactive notifications. Advanced power management OnGuard Integration for LenelS2 - The LenelS2 integration allows LifeSafety Power’s NetLink NL4 and NLX Network Communication Modules to interface with OnGuard access control software versions 8.0, in addition to 7.6, for advanced power management of enterprise access control systems. NetLink adds proactive monitoring and management capabilities to LifeSafety Power’s power systems, interfacing directly to the OnGuard platform, with all power system alerts indicated on the OnGuard software. NetLink adds proactive monitoring and management capabilities to LifeSafety Power’s power systems CCURE integration for SWH - The native integration with SWH C•CURE 9000 and LifeSafety Power’s intelligent network monitoring modules allows users to receive and centrally manage alerts and notifications through the software, for monitoring and control of PSX power and distribution modules sold and supported through SWH. Critical networking notifications are driven directly into C•CURE 9000, relaying real-time data and analytics on the health and viability of iSTAR door controller power, lock power and battery condition. Streamlining power installations ProWire Unified Power Systems/Helix - ProWire Unified Power Systems, the highest level of integration between a power system and an access control solution, are an installer’s blueprint for consistent, streamlined power installations. ProWire makes it simple to create a connected power campus, eliminating installation variability for repeatable and professional results. Network-connected ProWire systems can interface directly into Mercury Security or SWH C•Cure 9000 platforms, allowing users to receive, manage and control alerts and notifications. ProWire is compatible with Multi-Site Manager (MSM) Enterprise™, which yields advanced analytics so end-users can actively network, monitor and manage connected power solutions for greater uptime and dependability. Mission-critical applications Helix reduces the risk of system downtime or outage and features network management Helix AC/DC is the only solution for mission-critical applications in government, finance, medical and high-tech industry vertical markets. Designed for seamless failover protection with the automatic backup switchover of AC or DC power, Helix reduces the risk of system downtime or outage and features network management for predictive reporting that optimises and maintains the highest levels of performance. AC Helix monitors separate AC branch circuits, reporting trouble with a primary branch immediately and instantly transferring power to backup for uninterrupted system operations. DC Helix uses redundant power supplies to instantly transfer power to the backup supply on the failure of the primary supply. Helix is now available in standard, Unified Power and ProWire configurations to provide the ultimate protection to any access control power system.
LifeSafety Power, an ASSA ABLOY company, has announced that it has received LenelS2 factory certification and joined the LenelS2 OpenAccess Alliance Program (OAAP). LifeSafety Power’s NetLink NL4 and NLX Network Communication Modules interface with OnGuard access control software versions 8.0 and 7.6, to provide advanced power management for enterprise access control systems. NetLink modules interface with OnGuard platform NetLink adds proactive monitoring and management capabilities to LifeSafety Power’s power systems NetLink adds proactive monitoring and management capabilities to LifeSafety Power’s power systems and interfaces directly to the OnGuard platform, and is engineered to handle applications, which require network management. Leveraging this new interface, all power system alerts are now viewable in the OnGuard software. “LifeSafety Power has completed required factory testing at LenelS2, to validate the functionality of its interface to the OnGuard system. This interface to the OnGuard system allows users to add powerful remote monitoring capabilities to LifeSafety Power’s access control power systems, through an intuitive web browser interface,” said John Marchioli, OAAP Product Management, LenelS2. LifeSafety Power and LenelS2 partnership John Marchioli adds “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program (OAAP).” “The ability to receive alerts and notifications on all power-connected systems through the OnGuard system brings greater intelligence to access control solutions,” said John Olliver, the Senior Vice President of Sales and Marketing for LifeSafety Power, adding “For the end-users and systems integrators, managed power improves the ability to preemptively assess power status for greater reliability and uptime.”
Related white papers
Attention OEMs: 5 Ways RFID Readers Can Secure Your Markets
Wireless Access Control eBook
The critical importance of Trusted Execution Environment in access control
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download
ASSA ABLOY’s Code Handle offers a secure and cost-efficient access control solution for primary schools
- IOTICS to build a digital twin of Portsmouth International Port
- ASSA ABLOY’s Code Handle offers a secure and cost-efficient access control solution for primary schools
- Vincennes city deploys Assa Abloy's programmable electronic keys for safer, smarter access control across its facilities
- Avolon selects HID mobile access® to upgrade headquarter security