Access Control Readers (1,633)
Vanderbilt recently launched the latest updates to VCredential, their cloud-based credential management platform that offers users the ability to create and manage Bluetooth credentials independent of the access control platform. What is VCredential? VCredential represents Bluetooth access control technology that is easy to use, simple to navigate, and offers the added benefit of mobility for users. Originally launched in September 2020, VCredential was developed in response to the growing trend of virtualization, a shift in the market to touchless door access, and the ever-evolving landscape of added security threats. Now, 10 months on from that first release, VCredential has been developed further. The key feature of this new release is the simplification of the authorization process that allows customers to use a Bluetooth credential. What’s New? VCredential was proving such an intriguing option for customers that this latest release now means that the process of creating and managing Bluetooth credentials is even faster. The process has been reduced to a simple two-step program now. Admin sends out an email invitation to the user. This email contains instructions for the user on downloading the VI Mobile ID app alongside a 6-digit alphanumeric activation code. The end-user downloads the VI Mobile ID Bluetooth app enters the activation code. The credential is now ready for use. It is as simple as that. Why Use VCredential? All the original benefits of VCredential still remain. Smartphone credentials are time and cost-effective alternatives to managing physical credentials that enable mobile phones to be used just like a traditional access control card or tag. The addition of mobile credential functionality is critical in today’s threat landscape as more users demand touch-free flexibility and a streamlined approach to visitor management and access control. VCredential is a one-off license purchase as opposed to a subscription-based model that would include annual charges per virtual credential. With this latest version, now credentials on lost, stolen, or old phones can be deactivated and transferred over to a customer’s new device meaning there are truly no hidden or extra costs, allowing for big savings in the long-term. Greater Control Moreover, thanks to additional integration functions, the creation, and management of Bluetooth credentials can now be carried out directly by the administrator within ACTpro and SiPass integrated systems for easier management and greater control. Meanwhile, the integration with the award-winning ACTpro reduces the workload on the operator by automating the issuing of Bluetooth credentials to cardholders from within the ACTpro software. It also enables the customer to manage credential allocation through this single interface.
Highly secure – Like all Seos credentials, Seos Essential is Secure Identity Object® (SIO)-enabled, which allows for multi-layered security beyond card technology and the protection of identity data from unauthorized access Simplified, cost-effective migration – Support for read/write identification is provided using 125 kHz contactless technology to enable migration from legacy 125 kHz credential technologies Convenient – Fully supported by HID Signo, iCLASS SE®, multiCLASS® SE, HID Prox and Indala reader platforms Heightened privacy protection – Seos Essential offers best-in-class data and privacy protection by incorporating mutual authentication and secure messaging mechanisms into stringent best practices for data protection
Secu365 is built specifically for small and medium business owners, simplifying security interactions for property managers, tenants, employees and visitors. Regardless of what type of service you provide, if you have a brick-and-mortar business, a well-rounded and easy-to-use security system is not just important—it's essential. Just take a look at a few of the benefits that you might be concerned about and get from the business security system Monitor customers and employees with video surveillance in case of any accidents that happen Help prevent theft, vandalism, and other crimes With a mobile device, remotely control your business from anywhere Furthermore, as businesses continue to maintain a mostly remote workforce, the drive towards adopting cloud-based and hybrid solutions has grown as well.Thus, with 24/7 video monitoring, indoor and outdoor cameras, integrated with biometric or mobile access—Secu365 system is the perfect way to protect your small business. It enables visual multi-validation of alarm events and real-time remote control.
Remote access control from anywhere Built on a cybersecure web platform, the Software House C•CURE 9000 Web-Base client lets you manage personnel and monitor alarms from anywhere in the world on any PC with an internet browser. With an adaptive interface, you get the information that you need when you need it. The C•CURE 9000 Web-Base client allows you to easily perform tasks such as configuring, editing, and viewing personnel records and user credentials, and assigning clearances and roles. Alarm monitoring is also made easy with color-coded bubble images for a visually dynamic user experience. Along with the Event Viewer, manual actions and intrusion zones have been designed to handle core alarm management functions for critical infrastructure projects. Balancing security responsibilities Customize what employees can view based on their roles within an organization using Web Views. This allows you to streamline productivity and balance both responsibility and workload. Corporate security administrators can delegate control to individual department managers allowing them to grant access in the physical areas for which they are responsible. Customization for enhanced user experience With the C•CURE 9000 web-based client, you can dynamically change the appearance of personnel screens, customizing the user interface to show different tabs, columns, and fields based on a user’s role within the organization. Simply drag and drop from a list of more than 100 fields to show only the fields you need to see, streamlining and enhancing the user experience. A responsive layout automatically adjusts and adapts to device screen size and orientation.
Anviz CrossChex is a personnel identity verification, access control and time attendance management system. The system facilitates management of personnel information by biometric technology and helps meet customer's time attendance and access control requirements. CrossChex Cloud is a cloud-based time attendance software and can be used to access data anywhere, anytime, from any browser. You can schedule attendance requirements for a specific employee and create shifts for their work period within one click. During this global pandemic, CrossChex Cloud can work with Anviz biometric time clocks to enable users to check whether their employees are wearing a mask or not, and get timely reports on - employee attendance record, entrance record, and temperature record.
HID Global, the worldwide leader in trusted identity solutions, has announced the most feature-rich implementation of the latest MIFARE DESFire EV3 credential. This new access control credential based on NXP MIFARE DESFire EV3 delivers this technology’s full range of advanced security and privacy capabilities and reinforces them with HID’s powerful model for identity data protection. This HID credential provides AES128 encryption, a secure channel for protecting card data from man-in-the-middle attacks, and a random unique identifier (UID) for protecting user privacy. The credential works with readers based on MIFARE DESFire EV1 and EV2 products and is interoperable with HID® Signo™, iCLASS SE®, and multiCLASS SE® readers. In addition to choosing standard or custom security profiles to meet their specific needs, users can take advantage of HID’s Secure Identity Object™ (SIO®) model that protects a credential’s identity data through key diversification, authentication signatures, and encryption. Users can create multi-technology cards with HID’s credential based on NXP MIFARE DESFire EV3 to provide a smooth migration path from vulnerable legacy, low-frequency 125 kHz-based systems to modern and secure credential technology. What are the benefits of HID Global’s MIFARE DESFire EV3 credential solution? Feature-rich security that offers profile choices to fit your needs Advanced security features that aren’t available elsewhere, such as modern encryption, mutual authentication and secure messaging and SIOs Key management and card formatting that adhere to the highest standards of data protection and governance Click here for more information.
Symmetry Mobile is a web credential application designed to be used with AMAG Technology’s Symmetry Bluetooth readers. Symmetry Mobile is a convenient solution for organizations using mobile devices or in conjunction with physical credentials for users who are transitioning to a mobile system to gain access to secured doors. It works with AMAG’s Symmetry Access Control system, as well as other access control systems, providing a seamless, efficient and cost-effective solution for enterprise users deploying more than one system. The touchless solution supports multi-factor authentication when used with a PIN or biometric (fingerprint or facial recognition) on both Android and Apple iOS devices. Users can type their PIN or use a biometric on their phone, eliminating the need to touch the reader and in support of COVID-19 guidelines. The frictionless setup of a credential eliminates the need to physically interact with the security team. Organizations can centrally issue and manage mobile credentials, photos and devices to their entire user base from a remote location, eliminating the need to buy and carry a physical credential and come into the badge office. The virtual credential in Symmetry Mobile displays a person’s name and photo. An unlimited number of credentials can be stored within their digital wallet, allowing people who need to access multiple sites using different access control systems to use the same mobile device. In an effort to support businesses that required employees to be on-site and ensure the health and safety of the labor force, AMAG developed a customizable health screening questionnaire to help reduce the risk of potentially infected employees from entering a building. Upon successful completion of the questionnaire, an employee’s physical access card or mobile credential will be enabled for a specified period of time, for example, one day. If the form is not completed successfully, the access card will expire and the employee will be denied access to the building. The system will send email notifications to managers for visibility. The questionnaire’s functionality operates independently and can be used on virtually any existing Symmetry Access Control system installation — and without any local infrastructure changes. Symmetry Mobile data is highly secure, as all of the data is encrypted when sent to the reader or stored on the phone, ensuring the mobile solution is completely secure. Users can customize the signal strength and read range on a per device and/or per person basis, increasing security and accommodating those who may need a longer read range, such as a person in a wheelchair, to open a door. Door read and unlock time is less than 1.2 seconds. Symmetry Mobile is available as a hosted or on-premise solution. The app is available in English, Spanish, French and Arabic, and is available now in the Apple App Store and Google Play Store.
Incedo™ Business Cloud access management from ASSA ABLOY Opening Solutions is created for businesses on the move, who need a flexible security solution which grows with them. Now, security managers managing an Incedo Business solution can work remotely too – while maintaining complete control over their building’s access points. Incedo connects security software and hardware within a single, seamless platform. To accommodate the restless change and disruption of modern business life, Incedo enables scaling up or down on demand. And now, the new Incedo Business Cloud management keeps security and facility managers in control of their premises from wherever they happen to be right now. Incedo Business Cloud solves many pressing daily challenges of access management, Managers no longer need to be on-site to handle day-to-day security. It operates securely 24/7 from any PC with an internet connection. Installing the system is easy, with no complex integrations needed. Software updates are regular and automatic, with real-time reports and analytics available with a few clicks.
HID® Signo™ Readers bring today’s organizations into the future of access control. Beyond its sleek, modern design, this cutting-edge reader platform provides flexible, reliable performance with support for an unmatched range of credential technologies. HID Signo extends the leadership position of HID Global in the access control industry while providing unrivaled security and powerful performance with the addition of new features to better fortify facilities and beyond. Upgrading your access control readers to HID Signo ensures convenience and security today while preparing you for whatever comes tomorrow—this is the signature promise of Signo. Key Features Highly Versatile - Support for the widest range of credential technologies, including HID Mobile Access via native Bluetooth and Near Field Communication (NFC) capability. Also features Apple’s Enhanced Contactless Polling (ECP) to support credentials in the Apple Wallet. Unparalleled Performance - Ultra secure storage of cryptographic keys on certified secure element hardware, plus a new surface detection feature that allows the reader to automatically recalibrate and optimize read range performance. Connected to the Future - All readers include out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bidirectional communication. Each reader is also designed to be connected and managed remotely without “sneakernet” or the need to be physically touched.Add to Compare
With the SMARTair® Openow™ app, security managers enjoy Update-on-Card functionality and a touchless credential handling process. Openow brings online benefits to existing offline devices in a SMARTair access control system, so management tasks are completed more efficiently. Powerful features usually only available in online mode are now enabled for SMARTair offline locks — without any need to fit dedicated wall updaters or communications HUBs. This means no cabling at all; and faster, less invasive installation. Now, every time a user opens a SMARTair door with Openow, the event and entire door history are reported in the SMARTair software, alerting security managers about low battery status, access denied, out of time zone and more. Openow is the convenient mobile solution for SMARTair wireless access control systems. Users store validated digital keys securely in their own Openow app. To open a SMARTair lock, they simply tap their phone against its inbuilt BLE reader. An encrypted Bluetooth connection connects the phone and locking device to quickly approve or deny a unlock request. With Openow, if you have your phone, you are already carrying your keys. Facility managers get through their access management workload faster when they replace traditional card and tag credentials with Openow. Because Openow and the intuitive SMARTair TS1000 software handle everything, virtual keys may be securely deployed over-the-air to anywhere in the world and security managers can easily and quickly update access plans. Delays in issuing or revoking keys for sensitive doors no longer jeopardize site security or business efficiency. There are no physical credentials to handle or track; no card encoders to buy; and no queues at reception for staff or visitors awaiting credentials being issued. The entire credential handling process — for both building users and security managers — is touchless.
With resistance to attack and extreme weather, wire-free installation and battery-powered operation, the new SMARTair i-gate Electronic Padlock is built for use almost anywhere. This new device in the SMARTair wireless access control range enables facility managers to add real-time control to non-electrified gates, cupboards, cabinets, closets, crates and more — wherever they are and whatever the climate. Security and access needs do not stop at the perimeter door. Yet finding reliable locking devices which are easy to operate with an electronic access system can be difficult. Gates and outbuildings are hard to reach with cabling. Access devices may not have the resilience required for operation outdoors. The i-gate meets all these challenges. The SMARTair i-gate padlock is robust enough for almost any climate. It has a watertight cover (IP68 rating) and an internal cylinder with Durability EN 15684 Class 6 Certification. It is battery powered and works with all standard proximity credential technologies, including MIFARE®, DESFire and iCLASS®, as well as Bluetooth Low Energy. Upgrading an existing padlocked closure involves simply swapping the devices and integrating the i-gate Padlock into an existing or new SMARTair wireless access control system. No drilling or wiring is required. Exterior and interior openings previously unsuited to electronic access control can now be controlled and monitored from the SMARTair TS1000 or Web Manager. An i-gate is compatible with any SMARTair system management option, including mobile management via the Openowä app.
Another large survey confirms the growing importance of integration across building security functions. According to the Wireless Access Control Report 2021, “95% [of security professionals] cited system integration [of access control] with other building/security management functions to be ‘somewhat’ or ‘very’ important” for the coming five years. Extensive expertise in the security sector made Plexus’ procurement team aware of this growing need for connectivity across functions — including access control. Plexus managers sought a more flexible access system for their own head office in Swansea, Wales. Alongside integrated control, Plexus prioritized modern access control with lower maintenance costs than their current system, as well as the potential to be operated securely from the cloud. Any new installation should offer the option to further scale — in any direction — in the future. They require a broad choice of wireless and wired door devices and readers for multiple types of opening — and of course a straightforward upgrade path for both hardware and software. ASSA ABLOY Opening Solutions’ Incedo™ Business platform is now running at Plexus. Installing wireless locks, readers and controllers from the broad ASSA ABLOY range was fast and simple, streamlining their switch to Incedo Business. “Hardware architecture is well manufactured, and this goes hand-in-hand with software that has fantastic ease of use,” says Marcus Elphick, Operations Director at Plexus Fire and Security. Coming soon: fully featured cloud management With keyless locking and Incedo Business management software, Plexus managers control exactly who goes where around their offices. They can set times when defined user groups may open specific doors. It keeps staff moving and safe without the hassle of physical keys. The “new software has been seamless, much simpler and [with a] common sense approach to structure,” says Marcus Elphick. Incedo Business software is intuitive to operate from any PC. The entire Incedo platform is fully flexible and modular, allowing Plexus to add more locks or change management software options whenever they need. They are already planning to extend control: remote sites, entrance gates and warehouse access control will be covered, too. “We have been so pleased with the system and its capabilities,” he adds. Plexus aim to quickly upgrade to new Incedo Business Cloud management, which offers them real-time 24/7 access from anywhere, and for a greater number of doors, as they look to expand coverage to more sites. “Incedo’s integrated access control platform already delivers connectivity and convenience,” says Stephanie Ordan, VP Digital and Access Solutions at ASSA ABLOY Opening Solutions EMEA. “Now it delivers in the cloud, too. Incedo keeps premises secure and filters access intelligently, to manage the ever-changing movement of people — from anywhere.” “Your business is not static, and there is no reason why your security should be.” “Incedo’s system management options scale from entry level up to cloud-based administration,” adds Kevin Hoare, Incedo Product Unit Director at ASSA ABLOY Opening Solutions EMEA. “You can manage multiple sites and third-party integrations, including security solutions like CCTV. Scale up and down, add or remove hardware and credentials on demand — or switch system management options — all within your single environment. Migration between local and cloud management is always seamless in any direction, ensuring total flexibility for your business.” Whatever the 2020s bring next, Incedo gives security the flexibility to adapt.
Identification Modes: Face, card, password multiple ways to choose, convenient, flexible and safe to use Attendance Status: User-defined function keys to switch attendance state, meeting multiple identification needs Card: Standard EM, Optional Mifare Open the Door Remotely: Remote opening through network and software management Security: Security incident monitoring and alarm Access Control Interface: Support Relay Output, Wiegand26/34 Input and output, magnetic, etc. Infrared Sensing: Infrared sensor activation U Disk Download: Support U disk, user information record backup And firmware upgrade Multi-language: Support Global Multilingual Display
HID SE RP10 is a multiCLASS reader with intelligent power management that reduces power consumption. It also supports multiple credential technologies for seamless migration and is field programmable for secure upgrades and extended lifecycle.Add to Compare
Nedap AEOS Convexs MN80FG is a flush mount Mifare Nedap reader. It can be linked to external controllers using a Wiegand interface. Also, migration can be implemented in controlled phases, as the Convexs MN80FG is capable of handling several different card types simultaneously.Add to Compare
HID SE RP15 is a multiCLASS reader with intelligent power management that reduces power consumption. It also supports multiple credential technologies for seamless migration and is field programmable for secure upgrades and extended lifecycle.Add to Compare
Nedap AEOS Convexs MN80FC is a flush mount Mifare Nedap reader. It can be linked to external controllers using a Wiegand interface. Also, migration can be implemented in controlled phases, as the Convexs MN80FC is capable of handling several different card types simultaneously.Add to Compare
Nedap AEOS Invexs MND170B is a MIFARE Nedap DESfire reader for indoor use. Unique multiple card reading technology makes the MND170B reader capable of simultaneously reading different card technologies, which is extremely useful during migrations or when a company uses a mix of card technologies. It is easy to configure and program.Add to Compare
Offers high reliability, consistent read-range and low power consumption in an easy-to-install package. Sealed in a rugged, weatheriszed polycarbonate enclosure. Recognizes card formats up to 85 bits, with over 137 billion unique codes. Reader range depends on card/keyfob in use. A 'Hazardous Location' version is also available, featuring an incorporated junction box rated for use in hazardous areas.Add to Compare
Fully integrated access control system. Base 2-door system can be upgraded to a 16-door unit with a simple personality chip change. Intel 32-bit microprocessor provides fastest response time in the industry. Support for multiple access technology: Digital Proximity, Smart Card and Biometrics. Can monitor 255 inputs and control 96 output with additional MIROs. 2 Weigand ports on-board which can be expanded by additional Wiegand external board. Host communications via RS-232, RS-485, Dial-up or Optional Ethernet LAN module. Elevator control upto 96 floors. Compatible readers: DigiReader, OmniProx, OmniSmart, DR4200K, MSR42, Precise biometric fingerprint reader and Bioscrypt V-Series.Add to Compare
Honeywell Access Systems' OmniProx™ family is a complete line of 125kHz HID compatible proximity readers. All OmniProx readers (except the OP90) include three bezels: black, charcoal gray and ivory and are potted for both indoor and outdoor applications. For locations that require a proximity reader able to withstand vandal-prone environments, the OP90 vandal resistant readers come standard in zinc die-cast metal housing.Add to Compare
The bioCLASS RWKLB575 is a read/write contactless smart card reader with keypad and biometric sensor. Three levels of security to choose from: card and PIN; card and fingerprint; card, PIN and fingerprint. LCD display provides feedback on user finger placement and defines custom menu keys.Add to Compare
The HID EdgeReader ER40 is a unique iCLASS reader with an IP-enabled intelligent access control processor and host interface solution in a single unit. With the same footprint as a traditional reader, the EdgeReader ER40 provides a complete and full-featured access control hardware/software infrastructure and contactless smart card capability at "the edge" of the network for OEM software host systems.Add to Compare
HID Global, a leading manufacturer in the access control industry, today announced the addition of several products to its FlexSmart® Series of MIFARE® and DESFire® contactless smart card readers and credentials. Expanding on the existing family, the new offerings include heavy-duty keypad readers for high traffic use, and diverse, application-enabling credentials in various multi-technology form factors.The interoperable, ISO 14443A-compliant family of contactless smart card products provides customers a totally flexible platform - from the simplicity and security of HID Format MIFARE readers to completely customizable (keys and format) secure MIFARE and DESFire reader solutions. The addition to this new, open architecture reader line augments HID's market leading, flexible, open iCLASS® product line, clearly asserting the company's commitment to support 13.56 MHz technologies. Taken together, the company's offerings comprise the Industry's broadest range of open standard contactless smart card products, available from over 40,000 resellers worldwide.The flexible, highly secure and stylish contactless smart card keypad reader models now available include the FlexSmart MIFARE HID Format Secure Keypad Reader (Model Number: 6071), FlexSmart MIFARE Custom Keypad Reader (Model Number: 6072) and FlexSmart DESFire Custom Keypad Reader (Model Number: 6073).FlexSmart Keypad Readers:Two-Factor, Highly Secure Access Control Readers - Ideal for access control system users with MIFARE or DESFire contactless smart card credentials.Multiple Models for Custom Configurations - Feature open architecture format control and key management support for HID MIFARE, standard and custom MIFARE, and custom DESFire credentials.Lifetime Warranty - Unlike typical membrane keypads, HID's heavy duty keypad design ensures reliable operation over millions of PIN entries.Complementing the FlexSmart Reader family, HID Global provides a wide variety of 13.56 MHz credentials including cards, tags and keyfobs. Some credentials also include combination technology, used in upgrading end-users from 125 kHz proximity to the benefits of MIFARE/DESFire smart card technology. These multiple technology credentials are ideal for companies preparing to transition from proximity technology to the additional speed and applications of 13.56 MHz smart card solutions.FlexSmart Credentials:Programming Flexibility - Both MIFARE and DESFIRE cards, keyfobs, and tags are programmable with existing formats, which allows for seamless integration into legacy installations. Cards are also programmable with custom formats and security keys.Combination Cards - MIFARE and DESFIRE credentials are available with HID or Indala Prox for easy site migration.Multiple Form Factors - Available in ISO credit card thin card, keyfob and adhesive tag styles for any application.Custom Graphics and Anti-Counterfeiting Card Options - Provide an additional level of security.HID's release of this new, highly secure contactless smart card series adds to the superior range of 13.56 MHz solutions from "The Trusted Advisor". The entire FlexSmart line includes HID's standard lifetime warranty.Add to Compare
The Legacy Mullion Reader can be configured to output data in either Wiegand or magnetic stripe formats, making it easy to upgrade existing sites to proximity using the wiring already in place. Additionally, the Legacy Mullion Reader includes all of the advanced performance features that have made Indala so popular. These features include QuickFlash for immediate user feedback, SelfTest for installation assistance, and WatchDog for higher security applications requiring a supervised reader, audio tone and tri-color status LED. All performance features are field-configurable via the use of feature option cards.Add to Compare
HID Global, the trusted leader in providing access and ID management solutions for the delivery of Secure Identity, invited IFSEC 2008 attendees to its stand to view the latest in secure identity solutions. Visitors were also welcome to view a live demonstration of "a day in the life of a card", where real-life solutions were shown.HID's cost-effective solutions for logical and physical access control include SmartTOUCH™, the flexible, highly secure and stylish contactless smart card reader. Designed for a wide variety of applications from entry level access control to secure ID management. Its unique capabilities, such as reading any MIFARE® sector and/or DESFire® application data file, meet all installation requirements.SmartTOUCH™ not only verifies the vaildity of a MIFARE or DESFire card, it also verifies that the person who presents the card is its rightful owner. A scan of the fingerprint of the cardholder is stored on the secure part of the card. Only when there is a match between the finger scanned and the template stored on the card, the card data is transmitted. With the addition of PIN, the SmartTOUCH™ offers a triple level of security.Add to Compare
MATCH reader interface assembly. Includes MRIB, mounting base and bezel, physical tamper switch and blank faceplate. 2 MATCH connectors with 6" pigtails. Installs in Hirsch mounting boxes. Use MB1, MB2 or MB5. UL Listed. CE. Dimensions: 146 x 114 x 51.Add to Compare
MATCH reader interface board. Accepts up to 2 readers & 2 ScramblePads for dual technology entry & exit control of 1 door. Use with CCM 6.4 (or higher) & CR readers (see DIGI*TRAC Deisgn and Installation Guide for compatible readers). 2 MATCH connectors with 6" pigtails. Provides 5VDC @ 250mA reader power. Mounting plate. UL Listed. CE.Add to Compare
SmartID offers a flexible High Frequency Solution to help users migrate at their own pace. SmartID ISO 14443 readers offer the ultimate choice in interoperability and programmability. Its unique capabilities, such as reading any MIFARE® and/or MIFARE DESFire® sector or application data file, helps to meet any access control solution's needs. Designed for a wide variety of applications from entry level access control to secure ID management, the SmartID family is completely configurable for every access control application challenge.SmartID readers offer one of the broadest ranges of card compatibility in the industry and can be configured as a specific solution for each project.SmartID reader is available with or without PIN pad, adding an extra layer of protection for higher security installations making it an ideal solution for customers that require a customizable reader for new or existing installations.Within the SmartID family of products, HID Global also offers a biometric reader, an intelligent combination of the SmartID mullion reader and fingerprint verification.Key features:Completely configurable for every access control application challenge.Open Architecture Design - ISO 14443A MIFARE®/MIFARE DESFire® contactless smart card, compatible for broad card interoperability.Read Flexibility - Reads data from any MIFARE® sector or MIFARE DESFire® application file on the card.Data Security - Secure data transmission with 3DES encryption.GSA-approved - Included in the U.S. General Services Administration (GSA) FIPS 201 Approved Product ListAdd to Compare
Mifare + 125 kHz Prox. Compatible cards: Mifare, DESFire (SNR), SmartMX (SNR), HID Prox. ISO standard support: 14443A, 14443B. Data encryption: available between card and reader and between reader and host. PIN: 4-bit burst, 8-bit burst.Add to Compare
Designed for a wide variety of applications from entry level access control to secure ID management. Verifies MIFARE or DESFire cards. Cardholder fingerprint scan is stored securely on the card for biometric security; a match between the card template and the biometric data is required. A PIN provides third layer of security. RS232, RS485 or RS422 outputs easily interface with existing access control panels.Add to Compare
The OmniAssure biometric reader, part of the OmniAssure contactless smartcard reader range from Honeywell, provides a fingerprint solution for up to two fingerprints on a 1k Mifare card. Containing proven Bioscrypt fingerprint sensors, the fingerprint smart card reader is easy to install. Enrolment is easy without software. Just use the enrolment card supplied with the reader to store the fingerprint template on the user's card. Up to two fingerprints can be stored on the standard Mifare card. There is no need for extra RS485 data lines to connect multiple fingerprint readers for fingerprint template database sharing - saving costs and installation time.The reader communicates via Wiegand interface and is applicable on virtually any access control panel using Wiegand.Because of the flash-on-card design, OmniAssure readers are the easiest to use in today's market. With flash-on-card, the reader's flash firmware can be easily updated to support changing needs in security without removing the readers from the wall.Product references:MIFARE BIOMETRICS READER FOR HONEYWELL SECTOR AND FINGERPRINT:OT70HONAM: Mifare fingerprint readerOT75HONAM: Mifare fingerprint reader with keypadOFP1N26: 1k Mifare Classic PVC card, pre-programmed 26 bit number in Honeywell sector MIFARE BIOMETRICS READER FOR CARD SERIAL NUMBER AND FINGERPRINT:OT70HONAS: Mifare fingerprint readerOT75HONAS: Mifare fingerprint reader with keypadOFP1N00: 1k Mifare Classic PVC card, un-programmedAdd to Compare
Optimised for use with HID Crescendo series smart cards. Supports reader-to-card data transmission rates of up to 420 KBits per second. Horizontal or vertical placement, adhesion to a PC monitor or desk etc. Host interface: USB 2.0, CCID. Power supply: bus powered. Smart card interface: compliant with ISO 7816; card size ID-1; clock frequency up to 8 MHz; movement detection with auto power-off; short circuit and thermal protection. PC/SC driver support: Windows Vista / XP / 2000 and older; Linux, Mac OS X. Composition: ABS. Connector cable: 180 cm. Durability: 100,000 insertions. MTBF: 500,000 hours.Add to Compare
1 Reader port - 12 VDC at 50 mA, clock / data or data0 / data1. Keypad multiplexed with card data. Two-wire or one-wire bi-color LED support. Buzzer support only with one-wire LED control. 2 supervised, general purpose alarm inputs with programmable circuit type.Add to Compare
Live Scan fingerprinting refers to the technology used by law enforcement agencies and private facilities to capture fingerprints and palm prints electronically, without the need for the more traditional method of ink and paper. Based on cutting-edge optical & biometric technologies, Suprema developed range of live scanners for single, dual, ten-fingerprints and palm print capturing, which are used for law enforcement, border control, national ID as well as for commercial applications.The range consist of:RealScan-10 Compact Ten Print Live ScannerRealScan-D Portable Dual Fingerprint Live ScannerRealScan-S Single Fingerprint Live Scanner RealScan-F Palmprint Live ScannerAdd to Compare
The Model WP644 Weatherproof Pass-Through Reader combines ease-of-use with installation flexibility. Available with a white or black housing, the Model WP644 reader mounts on a door mullion, directly on the wall, or on a single-gang electrical box. Connect to access control systems using either a Wiegand or Clock-and-Data input.Add to Compare
The reader mounts indoors or outdoors on a double-gang handy box, for exposure to the elements. Its cast metal case resists vandalism and abuse, yet one simple motion through the card slot reads a card. An LED flashes to confirm that a card has been read. Three LEDs are provided to clearly indicate status. The Dorado 780 ruggedized keypad card reader combines ease of use with a PIN keypad for increased security.Add to Compare
Convexs readers enable clients with Nedap AEOS, Nedap XS or a third party access controlsystem to migrate smoothly to Mifare or DESFire (including EV1) technology. The Convexs MD80xx features dual reader technology and reads Mifare and DESFire. Available in surface and flush mount.Add to Compare
Mobile LCD keypad with built in TAG reader. Can be used to program the system. Up to 10 users (codes and TAG). Functions: Set, Unset, Alert, X10 remote, beeps level setting duress code, locks out if 5 wrong codes entered. Power supply: 1 battery LI03V (supplied) replaceable by the end user. Battery life: ~1 year.Add to Compare
multiCLASS® Magnetic Stripe readers are designed for customers upgrading their current access control card system from the popular magnetic stripe ("magstripe") technology to the enhanced security of 13.56 MHz smart card technology. Supporting access control technology combinations including magnetic stripe, keypad, HID Prox and 13.56 MHz smart card technology (including iCLASS), the multiCLASS Magnetic Stripe reader line represents the ultimate in flexibility, enabling a cost effective, time-feasible and truly seamless migration solution with no operational disruption.Add to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
Household adoption of smart home systems currently sits at 12.1% and is set to grow to 21.4% by 2025, expanding the market from US$ 78.3 billion to US$ 135 billion, in the same period. Although closely linked to the growth of connectivity technologies, including 5G, tech-savvy consumers are also recognising the benefits of next-generation security systems, to protect and secure their domestic lives. Biometric technologies are already commonplace in our smartphones, PCs and payment cards, enhancing security without compromising convenience. Consequently, manufacturers and developers are taking note of biometric solutions, as a way of levelling-up their smart home solutions. Biometrics offer enhanced security As with any home, security starts at the front door and the first opportunity for biometrics to make a smart home genius lies within the smart lock. Why? Relying on inconvenient unsecure PINs and codes takes the ‘smart’ out of smart locks. As the number of connected systems in our homes increase, we cannot expect consumers to create, remember and use an ever-expanding list of unique passwords and PINs. Indeed, 60% of consumers feel they have too many to remember and the number can be as high as 85 for all personal and private accounts. Biometric solutions strengthen home access control Biometric solutions have a real opportunity to strengthen the security and convenience of home access control Doing this risks consumers becoming apathetic with security, as 41% of consumers admit to re-using the same password or introducing simple minor variations, increasing the risk of hacks and breaches from weak or stolen passwords. Furthermore, continually updating and refreshing passwords, and PINs is unappealing and inconvenient. Consequently, biometric solutions have a real opportunity to strengthen the security and convenience of home access control. Positives of on-device biometric storage Biometric authentication, such as fingerprint recognition uses personally identifiable information, which is stored securely on-device. By using on-device biometric storage, manufacturers are supporting the 38% of consumers, who are worried about privacy and biometrics, and potentially winning over the 17% of people, who don’t use smart home devices for this very reason. Compared to conventional security, such as passwords, PINs or even keys, which can be spoofed, stolen, forgotten or lost, biometrics is difficult to hack and near impossible to spoof. Consequently, homes secured with biometric smart locks are made safer in a significantly more seamless and convenient way for the user. Biometric smart locks Physical access in our domestic lives doesn’t end at the front door with smart locks. Biometrics has endless opportunities to ease our daily lives, replacing passwords and PINs in all devices. Biometric smart locks provide personalised access control to sensitive and hazardous areas, such as medicine cabinets, kitchen drawers, safes, kitchen appliances and bike locks. They offer effective security with a touch or glance. Multi-tenanted sites, such as apartment blocks and student halls, can also become smarter and more secure. With hundreds of people occupying the same building, maintaining high levels of security is the responsibility for every individual occupant. Biometric smart locks limit entry to authorised tenants and eliminate the impact of lost or stolen keys, and passcodes. Furthermore, there’s no need for costly lock replacements and when people leave the building permanently, their data is easily removed from the device. Authorised building access Like biometric smart locks in general, the benefits extend beyond the front door Like biometric smart locks in general, the benefits extend beyond the front door, but also throughout the entire building, such as washing rooms, mail rooms, bike rooms and community spaces, such as gyms. Different people might have different levels of access to these areas, depending on their contracts, creating an access control headache. But, by having biometric smart locks, security teams can ensure that only authorised people have access to the right combination of rooms and areas. Convenience of biometric access cards Additionally, if building owners have options. The biometric sensors can be integrated into the doors themselves, thereby allowing users to touch the sensor, to unlock the door and enter. Furthermore, the latest technology allows biometric access cards to be used. This embeds the sensor into a contactless keycard, allowing the user to place their thumb on the sensor and tap the card to unlock the door. This may be preferable in circumstances where contactless keycards are already in use and can be upgraded. Smarter and seamless security In tandem with the growth of the smart home ecosystem, biometrics has real potential to enhance our daily lives, by delivering smarter, seamless and more convenient security. Significant innovation has made biometrics access control faster, more accurate and secure. Furthermore, today’s sensors are durable and energy efficient. With the capacity for over 10 million touches and ultra-low power consumption, smart home system developers no longer have to worry about added power demands. As consumers continue to invest in their homes and explore new ways to secure and access them, biometrics offers a golden opportunity for market players, to differentiate and make smart homes even smarter.
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organisations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing. Most organisations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes. The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security. Vulnerabilities and challenges In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalised and adopted into industry standards by the Security Industry Association in the 1990s. Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources. Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organisations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS. Legacy access control protocol Despite the well-publicised vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems. This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors. OSDP is a communication standard Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously. These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products. Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard. Why implement OSDP as a standard? OSDP is the only protocol that is secure and open for communication between readers and controllers The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organisations recognise the value of implementing an integrated solution to enhance security and add value to technology investment. OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits: 1) Increased security Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined. 2) Bidirectional communication Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller. 3) Open and interoperable OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system. 4) Reduced installation costs OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices. Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data. 5) User friendly OSDP gives credential holders greater ease of use, with audio and visual feedback such as coloured lights, audible beeps, and the ability to display alerts on the reader. For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices. Unlimited application enhancements OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment. OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organisations can use systems from numerous manufacturers as they invest in infrastructure that maximises the protection of critical data. For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader. Cost savings upon system upgrade Integrators can also capitalise on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects. Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers. Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organisations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic. Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space. By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilisation of video data have long been front and centre with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as colour, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognising objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organising and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionise our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.
Related white papers
Top 5 ways to ensure visitor safety and security
Moving to mobile: A guide for businesses switching to mobile access control
School security moves to the cloud
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download
- Anviz integrates FaceDeep 3 and fingerprint P7 access solution with Canon printer
- Adani Group manages contractors and workers, across multiple sites, with Matrix’s range of COSEC solutions
- G4S secures Aalborg University’s buildings in Denmark in one of Europe’s largest access control systems implementation project
- Triton master key system from ASSA ABLOY helps transform access management at Bath NHS Trust