Access Control Readers(1,328)
Climax’s Voice Recognition Emergency Voice Call Point with Wi-Fi capability, adopts advanced speech recognition technology that recognises preset vocal commands and triggers specified actions. When combined with a monitoring system, it will activate an emergency call to a professional monitoring centre, allowing users to receive emergency attention even in situations which they are unable to seek help physically. In addition to voice activation, the VRCP-WiFi features a large button for users to summon help during an emergency. In critical situations such as falls, medical problems, or emergencies, users can quickly activate the device to report an alarm. VRCP-WiFi can work with routers that support Wi-Fi network, providing network connection for making outgoing voice calls and receiving incoming calls for two-way voice communication. It has a powerful speaker and microphone built-in and can be easily mounted or placed anywhere in the premises. Having multiple VRCP-WiFi placed at strategic locations throughout the home can create an extra network of safety. When an emergency happens, users can simply use the nearest Voice Call Point to summon help. It is suitable for seniors and medical care and ideal for multi-story homes and larger premises. Knowing that senior users can quickly and easily speak with a CMS operator from anywhere in the home provides an extra layer of protection and peace of mind. The VRCP-WiFi also transmits supervisory and low battery signals to the medical alarm panels to ensure its proper operation at all times. Emergency Voice Extender with Wi-Fi capability Voice Recognition to activate emergency call by preset vocal commands Single-button design for making calls to summon help Provide high-clarity, hands-free, two-way communication through Wi-Fi networks Automatically picks up incoming call without button press Excellent voice quality allows users to answer within 10m range from VRCP-WiFi Built-in microphone and speaker Large ALARM button for easy identification Wall-mount or table-top placement Sleek, Modern Design Regular supervision signals to check system integrity Ideal for multi-story homes and larger premises
The new DSC1500 portable beam barricade sets up quickly and temporarily to block vehicles and secure locations during short-term events and anywhere a beam barricade is needed for interim security. With a clear opening of 16 feet (4.8 m), the DSC1500 is M30 certified, able to stop a 15,000 pound (66.7 kN) vehicle going 30 mph (48 kph). Many organisations have the need for easy to install, temporary drop-arm barriers that can install within 10 minutes to transitorily close down a roadway to one or two lanes or block parking lot exits to deter thefts. Previous beam barriers had to be filled with sand, gravel or cement to be operable. To remove the DSC1500 from its temporary site, it is simply repacked in ten (10) minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves using manual hydraulics to raise and lower the barriers off their wheels. A self-deploying trailer with integrated lifting device facilitates rapid installation. The process is simply reversed when the event is over or the time comes to deploy the beam barrier at another location. From a purchasing standpoint, it can be easier to buy portable beam barricades than permanent solutions. The latter are oftentimes placed into an organisation’s real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable beam barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department. For one time uses, a lease plan has been created where organisations can simply lease the portable barriers, use them, pack them up and return them. Delta always keeps an inventory for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. That’s because, in many cases, they are needed for events that come up quickly, such as emergency road or bridge construction or unexpected parking lot requirements.
Gallagher Command Centre is a powerful access and control solution designed to give you complete site control. Fully configurable to suit the unique needs of your site, Command Centre allows you to define, manage and report on all aspects of your system. Everything that happens on-site is relayed to your Command Centre operators in real time, enabling a swift and appropriate response to security threats. Seamless integration with complimentary security and site management solutions means Command Centre delivers on its promise. You’re in command. Command Centre v8 introduces new Site Plan functionality for greater situational awareness and responsiveness; Broadcast notifications to Mobile Connect for better communication in emergency situations; and Status and Overrides REST APIs for increased integration flexibility.
Thanks to WIT door entry monitor touch interface the user is able to take calls to the home, manage missed calls, view captured images, read messages sent by the administrator, visualise aerial camera images, activate external relays, get notifications about alarms on the monitor and guard unit, and even manage the home automation system. WIT's exclusive aesthetics are underpinned by an innovative technology that allows the installation of APPs (APPs have to be FERMAX certified and configured by authorised installers). For simplicity of installation, WIT monitors allow PoE power supply, this means that it makes use of PoE switch power and no dedicated power supply is required. WIT 10" monitor is specially designed for home automation integration, since it is the only monitor that incorporates 2 RJ-45 network interfaces to be able to connect to both the community IP network and the apartment's local network, maintaining both the isolation between networks and flexibility in connectivity. Its surface or embedded installation allows it to adapt to the most demanding architectural designs.
Vanderbilt’s ACTpro 1500 PoE Ultra controllers were launched in March 2019. What is it? The ACTpro 1500 is a single door IP Controller and includes a dual-port Ethernet switch. The controller supports 60,000 users and includes a rich set of advanced features, including voltage monitoring and break glass monitoring. These controllers are ideal for a single door system or systems that need to grow up to 4,000 doors. How does it work? The PoE Ultra hardware in the controllers ensures support for all power requirements. This includes local door accessories and components such as card readers, door locks and request to exit buttons. PoE Ultra ensures that all of this is accomplished without the need for additional Power Supply Units (PSUs). Essentially, this saves the system user time and money. Moreover, as this is all powered over the Ethernet, it translates to less cabling and more convenience for installers too. Why does it matter? This is an important feature for installers because when a system is fast to install and more straightforward to set-up and quote, it removes the complexity from access control and allows installers to get more done, more efficiently, and in less time. This ultimately benefits their business and their bottom line.
8 onboard zones 8 Areas, 2 partitions for each Area 3 programmable outputs, including 1 relay output, 2 MOS outputs Outputs operation follows system events, zone events, Area, Link events and timer schedule 100 users with 8 authority levels for users(Supervisor, Manager, Master, User, Temporary, Duress, Patrol and Technician) 1000 events log 8 independent timers for automatic control Up to 8 keypads (ARK30C) 1 case tamper and 1 leave-wall tamper supported Supports more than 11 zone types 7 sorts of zone terminations, including NO, NC, EOL, 2EOL, 3EOL, Interial type and Impulse type EOL resistance configurable (2K7, 4K7 or 6K8) Built-in 10/100M self-adaptive Ethernet interface 2 RS485 ports can be used to connect with keypads and other modules 3 telephone numbers for monitor station(PSTN), 8 numbers for vocal message, 8 numbers for SMS Combined with additional PSTN modules (ARA58-P) for dialling to the digital receiver in the CMS, transmitting CID protocol Combined with additional GPRS/GSM modules (ARA58-G-EN or ARA58-G-IT) to receive SMS notifications and remotely control, as well as receiving voice event messaging and remotely control by full voice menu guide Cellular backup in case of IP network failure with GPRS/GSM Modules App DMSS to push alarm message and remotely control Firmware upgrade with a PC using Alarm Config software
Dahua Technology, a leading solution provider in the global video surveillance industry, has launched a new apartment outdoor station VTO9341D, providing new access control solutions to fence and lobby entrance with the cutting-edge face recognition technology. The apartment outdoor station elevates the safety and convenience of resident security system to a new level with the fashionable non-touch face-recognition entry, while conventional unlocking ways are preserved in case of emergency. The product’s working temperature is between -20°C to 60°C, meaning it can operate smoothly across a variety of weather conditions and geographical areas. With a shell made of aluminium alloy plate, it meets IP55 standard for water and dust resistance, and IK07 standard for impact resistance. Further enhanced by the Intrusion Prevention System, the product will offer ideal ingress protection to property owners and facilitate the work of security guards. Face recognition Once a person steps into the 0.5-metre distance within VTO9341D that triggers its approaching induction, the 2MP CMOS image sensor will capture the face in high-definition colour image for identification. In as quick as 0.5 second, it can complete recognition and open the door for the residents. With strong capacity to store up to 20000 faces, the system would suffice the demand of large housing estates or commercial lots. The Auto Gain Control supplements white light to cope with poorly-lighted conditions, enabling night vision for the outdoor station. Multiple unlocking approaches VTO9341D is also equipped with Mifare Card reader, fingerprint recognition (with a memory of 3000 fingerprints), and touch screen key pad, which provide multiple unlocking approaches via card, fingerprint and password. Working together with VTS5240B Master Station that can forward image to mobile devices, owners can even enjoy the remote unlock function while away from home. Additionally, the audio system supports bidirectional talk, which assists visitors and owners in dual-way communication as an auxiliary to face identification. As a high-end product with unique features and full market potential, VTO9341D will benefit both Dahua dealers and system integrators. With DSS EXPRESS monitoring access control & other Dahua exclusive technologies, the apartment outdoor station would lower the time cost of integration and maintenance.
With Openow™, facility managers and security administrators have more control and no longer need to administer physical credentials. And it’s fast and easy to upgrade an existing SMARTair® system to work with Openow™ or to install mobile-ready, wireless SMARTair® access control from scratch. The new Openow™ app has been designed around convenience, security and user experience with virtual keys. Information transfer between administration software, smartphone app and the SMARTair® device is protected by end-to-end encryption. “Right from set-up — involving simple, secure email subscription — users find the Openow™ app a joy to operate. Tap a SMARTair® lock with your phone carrying a valid virtual key, and the door unlocks. The device you carry everywhere — the smartphone — now replaces a separate RFID card with MIFARE®, DESFire, iCLASS® and other proximity technologies.” explains Félix Morán SMARTair® Product Manager at ASSA ABLOY. Openow™ also adds further layers of security to every premises Facility managers find life a lot simpler when managing access rights with the Openow™ mobile solution. Change the validation time in the administration software to automatically update a user’s virtual key (when the phone has a signal). Cancel a virtual key and it vanishes immediately from a user’s app. Facility managers can check and amend the validity of each virtual key whenever they want, and wherever they are. The complete mobile solution includes the SMARTair® device range, with wireless escutcheons and cylinders plus wall readers; the intuitive SMARTair® TS1000 software; user credentials, e.g. cards and the new Openow™ app. Business owners and directors project the right image for their premises when they offer mobile credentials via Openow™. Phones replace plastic key-cards, so there’s no need for a card activation terminal on reception or elsewhere. Users also save time, because there’s no longer any need to collect or validate an access card: your key is already on your smartphone. Openow™ makes it easy to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If you have virtual keys from multiple sites or premises, Openow™ easily handles those, too. No more key-card, or wondering where you left it; no more appointments to pick one up or have it revalidated. With Openow™, if you have your phone, you are already carrying your keys. The SMARTair® Openow™ app is free to download now from Apple’s App Store and the Google Play Store. For more information, see www.tesa.es/discoverwireless Across the EMEA region ASSA ABLOY offers SMARTair® under several trusted security brands, including TESA, Mul-T-Lock, ASSA, JPM, KESO, RUKO and TRIOVING.
The new Aperio® H100 packs the power and flexibility of wireless access control into one slim, cleverly designed door handle. With easy retrofitting to almost any interior door and comprehensive RFID compatibility, the new Aperio® H100 handle makes extending access control to more doors cost-effective by integrating with a vast range of third-party systems. The Aperio® H100’s stylish design is perfect for indoor office and facility doors. The Aperio® H100 can work within an online access control system or offline as a standalone device. A battery fits inside the handle, ensuring a minimal footprint and a discreet look to gel with any contemporary door style. The Aperio® H100 is easy to retrofit on existing doors, with no drilling and no wiring required. Any existing mechanical cylinder can still be used. The Aperio® H100 is specified with maximum flexibility and designed to fit almost any format of interior door. The Aperio® H100 is compatible with most common European (DIN) and Scandinavian mortise locks, in wooden, steel, tubular frame or glass doors with standard lock cases. It comes in left- and right-hand versions for a door between 35mm and 80mm thickness, with optional U-handle and USB adaptor. The Aperio® H100 is compatible with multiple RFID technologies, including iCLASS®/ISO14443B, iCLASS® SE, Seos®, MIFARE® Classic, Plus and EV1, and DESFire® SE. “Like all Aperio® devices, our new handle can upgrade site security for a very affordable price,” says Matthias Weiß, Product Manager Aperio® at ASSA ABLOY EMEA. “The Aperio® H100 further extends a range which adds access control wirelessly to exterior and interior doors, from fire and safety doors with regulatory requirements to meeting rooms, labs and offices.” The new Aperio® H100 handle completes a comprehensive range of Aperio® wireless access control devices that already includes online and offline Aperio® cylinders (C100/C900) and escutcheons (E100/E900); an online and offline lock (L100/L900); and a wireless lock for bringing server racks and cabinets (KS100) into the same access control system as doors.Add to Compare
The H4 Video Intercom integrates a 3 MP camera with a high-performance intercom and features exceptional wide dynamic range, low-light, noise reduction and echo-cancelling technologies for clear viewing and two-way communication with visitors. Combined with Avigilon Control Center (ACC) video management software, this secured entry system enables operators to quickly and easily identify and communicate with a visitor before remotely granting access.
The PoE Ultra hardware in Vanderbilt’s ACT controllers ensures support for all power requirements. This includes local door accessories and components such as card readers, door locks and request to exit buttons. PoE Ultra ensures that all of this is accomplished without the need for additional Power Supply Units (PSUs). Essentially, this saves the system user time and money. Moreover, as this is all powered over the Ethernet, it translates to less cabling and more convenience for installers too. This is an important feature for installers because when a system is fast to install and more straightforward to set-up and quote, it removes the complexity from access control and allows installers to get more done, more efficiently, and in less time. This ultimately benefits their business and their bottom line. The new PoE Ultra feature, alongside the ACT access control software’s existing integration with Vanderbilt’s award-winning SPC intrusion system, a rules mapping engine, and a smartphone app, simply adds to this concept. Vanderbilt’s core aim has always been to put customers first. We believe PoE Ultra controller has a firm grip on this mantra, as it plays to pain points of both system users and installers. As we continue to develop and evolve new generations of security products, our focus will remain on striving to be a partner that is flexible to customer requirements and adaptable to meet the ever-changing needs of the market.
Mercury Security continues its commitment to open architecture access control with its intelligent controller platform that delivers extensive support for third-party applications, while offering advanced security and enhanced performance. Built on the Linux operating system, the new LP intelligent controllers offer the greatest flexibility for OEMs, channel partners and end customers to choose the controller configuration that best fits their needs. Key Highlights: Open Architecture: High performance, reliable platform enables use of hardware with Mercury OEM partners’ software solutions Device Integration: Supports a wide range of third-party integrations and applications Enhanced Security: Embedded crypto memory chip and data-at-rest encryption provides a secured layer of protection of sensitive data. OSDP Protocol: Secure channel security for reader connectivity and extended applications such as biometrics and high assurance credential authentication Versatile Interoperability: Same reliable interface and identical footprint as the EP controllers, enabling seamless upgrades for existing deployments For organisations seeking an open access control platform, the industry’s best reliability, cybersecurity, and an extensive device integration library, Mercury’s LP intelligent controllers are the clear choice.
Vanderbilt released the latest version of ACT Enterprise on 25 September at the 2018 Security Essen event. What is it? ACT Enterprise is the control software suite for ACTpro hardware and streamlines the installation, management, and monitoring of the ACTpro access control system. The latest ACT Enterprise features include integration with Vanderbilt’s award-winning SPC intrusion system, a rules mapping engine, and a smartphone app. Why does it matter? The ACT Enterprise Apple and Android compatible apps mean real-time monitoring, user management and administration from your smartphone. You can lock and unlock doors, authorise users and check who’s in and who’s out – wherever you are. The ability to integrate with SPC further highlights the depth that the new feature set brings to the product’s strength. Now on one screen you can have high-quality graphical maps showing all access and alarm points from both systems, and you can control all devices with the click of a button. How does it work? One of the key new features in this ACT Enterprise release is rules mapping. The rules mapping engine offers the customer an intuitive method to create rules based on access control events and Boolean logic. It does this by permitting the creation of logical relationships between system elements through a drag-and-drop interface. For the end user, this addition ensures that system interactions can be seamlessly introduced on a system-wide basis, thereby enabling a higher level of added value to be realized, both for security and business-based functionalities. The ACT Enterprise rules mapping engine ensures intuitive, easy-to-use I/O management for trigger detection with compatible devices. These devices are usually attached to a door or an automated electrical that closes the circuit on the I/O unit. When this circuit is closed, an alarm is sent over the network, and ACT Enterprise captures that.
Nedap’s new end-to-end security solution is the first to offer digital protection for access control by unifying best practices from both IT and physical security. Protecting access control systems Until now, the latest best practices protecting IT systems from digital threat haven’t been used for physical access control systems. This is an oversight that is leaving many companies vulnerable to cyber attacks. Nedap and AET Europe have worked together to overcome this by developing AEOS end-to-end security. Taking a forward-thinking new approach, they have combined the best practices of both IT and physical security in an all-in-one access control system. Albert Dercksen, Head of R&D at Nedap, explains why AEOS end-to-end security is needed: “IT and physical security have been following different rules to protect systems. But modern access control systems are, in fact, IT systems connected to corporate networks and should be treated as such. That’s why we’ve applied the digital security principles used in IT to AEOS, our physical access control system.” Communication secured from end-to-end In AEOS end-to-end security, Nedap and AET Europe have combined the IT principles of encryption and strong authentication. This ensures storage in every element of AEOS is secure, as is communication between all elements. Both DESFire keys and digital certificates are stored in a Secure Access Module (SAM) inside door controllers. This leaves card readers with no role in decrypting data, so secure communication between card and controller is guaranteed and, by storing digital certificates in the same SAM, strong authentication is achieved to ensure secure communication between controller and server. Protect critical infrastructure In this way, AEOS end-to-end security offers far higher protection against both physical and digital threats. It also enables keys to be updated securely and centrally, without having to physically attend each card reader. AEOS end-to-end security meets a stringent level of security requirements across Europe, and is already being used to protect critical infrastructures in several countries. In France, for example, it has gained CSPN certification from the French information security agency, ANSSI.
DSX Mobile Command brings the power of the DSX Workstation program to the convenience of a Smart Phone. This Smart Phone application enhances the daily operation of the DSX System. The Mobile Command feature allows the activation of custom predefined commands, the locking\unlocking of doors, control of alarm points and the monitoring of system events from a mobile but secure application. iOS™ and Android™ compatible. Global functions such as Building, Campus and District Lockdown, Incident Response Reconfiguration and even repetitive chores such as momentarily unlocking a door or granting access to a gate can be programmed into Command buttons for easy activation. An Administrator can lockdown any school in the district or every school from one Command button. Each building or an entire campus can be controlled quickly through this Smart Phone application using WiFi or mobile cell service. The DSX Mobile Command application is a great fit for school districts and universities and also for hospitals and commercial businesses. Each Mobile Operator is defined in WinDSX and assigned the appropriate commands and privileges that provide the convenient interaction, supervision and monitoring of all points of protection and doors under their responsibility.
The ACT 433 from Access Control Technology (ACT) Ltd., delivers gate entry or barrier control within a new or existing access control solution. It can be integrated into the ACTpro access control solution or any 37 bit Wiegand or clock and data system. The ACT 433 range of products includes a receiver and two long range transmitters, one of which has a built in proximity. Receivers from 3rd party manufacturers, such as Prastel receivers supplied by ACT, can also be read by the ACT 433 receiver making it feasible to upgrade existing systems to the ACT 433 solution by simply changing the receiver. As the ACT 433 can be easily integrated into an existing access control system, such as ACTpro or ACTsmart2, the administration of tags, for gate entry or barrier control, becomes a much simpler, manageable and secure process than is the norm. Lost, stolen or obsolete tags can be removed from the system immediately, through the use of the ACT developed ACTWin pro or ACTSmart software. Entry will be denied to anyone trying to gain access using such a tag. Allocation of car park spaces in a shared car park can also be managed by the ACT 433 working in conjunction with the ACTWin software. User groups can be set up and a maximum number of spaces can be allocated to each group. When the spaces allocated to a group have been filled access will not be granted until a group member leaves. The ACT 433 products are not limited in terms of their functionality. As well as the popular integration of gate entry or barrier control into an existing access control system they can also be used for the activation of external lighting and the operation of motorised roller shutters, blinds or awnings. Unlike many similar products on the market the ACT 433 Receiver has an IP67 rating making it suitable for outdoor as well as indoor installation. With an attractive, polycarbonate housing it can be surface or flush mounted. The long range transmitters (ACT 433TX and ACT 433TXprox) have a read range of up to 50 metres, site dependent. With built in proximity the ACT 433TXprox can be used to gain entry at a door secured by an access control reader.Add to Compare
Vanderbilt has expanded its portfolio to include Cotag starter and door kits for all of its SiPass systems - SiPass integrated, SiPass Entro and SiPass Entro Lite. One of the major benefits of Cotag technology is that it can read both active (long-range) and passive (proximity) cards and tags, which makes it possible to mix both kinds of readers in a single system. Almost every site has at least one door that would benefit from a hands-free access control solution - by choosing Cotag technology it is possible to install a Cotag hands-free reader at that door and Cotag proximity readers at the other doors. Users can be issued either active or passive cards and tags, depending on their needs. The resulting system provides a high level of security and convenience for users and system administrators alike. It is also very cost-efficient in that you only have to give active cards or tags to the users that really need them. Cotag technology is ideal for a wide range of environments including: Hospitals Schools Manufacturing plants Office buildings Airports, harbours, etc. Banks Museums Laboratories Anywhere where disabled people would have difficulty presenting a proximity card or tag For more information about Cotag technology and the new range of Cotag kits for SiPass systems, please contact your local SiPass distributor.Add to Compare
HID Global, a worldwide leader in secure identity solutions, recently announced that its iCLASS Seos™ credential has won the Asian SESAMES Award in the software and applications category. The award recognises the industry’s most innovative technological applications developed for the Asia Pacific market in the field of smart cards, digital security, identification, secure transactions, and contactless technology. Judges include industry experts who evaluated entries during the competition and the Asian SESAME award marks HID Global’s thirteenth accolade for its iCLASS SE platform solution by the industry’s most influential security organisations and publications worldwide. “As HID Global’s latest addition to our award-winning iCLASS SE platform, iCLASS Seos reinforces our Genuine HID commitment to deliver new capabilities for meeting current and future secure identity requirements,” said Selva Selvaratnam, senior vice president and chief technology officer with HID Global. “HID Global is honoured to be recognised by the Asian SESAMES Award committee. The award further validates our dedication to continually support customers with innovative solutions for a broad range of applications using a combination of smart cards, microprocessor cards and NFC-enabled mobile devices.” iCLASS Seos features a standards-based universal card edge, which supports multiple technologies and future technologies for maximum interoperability. The credential is portable for use on NFC smartphones while providing data confidentiality and strong authentication with state-of-the-art cryptography for mutual authentication and data encryption that protects the privacy of contactless communications.Add to Compare
The new FaceStation is a dedicated face recognition terminal which provides a perfect combination of convenience and high security. Optimizing Suprema’s renowned biometric technology combined with state-of-the-art hardware, FaceStation allows fast and accurate access control security like no other product in the market. FaceStation comes with a wide array of features & functions, which can be accessed through an intuitive touch screen GUI. The device also features embedded web server for easier device control, and supports both analogue and digital video phone integration. FaceStation from Suprema features: Next generation face recognition technology High performance face recognition by Suprema’s proprietary algorithm Unparalleled image processing performance using both visual camera and IR camera Intelligent adaptive/active LED illumination for increased accuracy Powerful dual-CPU architecture GHz DSP dedicated to face recognition 667MHz RISC for device operation 4.3" Touchscreen LCD & intuitive GUI Ultra wide 4.3” WVGA touch screen LCD Solid and scratch-free surface for extra durability Fully customizable, intuitive and user friendly GUI Distributed IP access control system Provides reader and controller features in one device TCP/IP, WiFi and PoE(Power over Ethernet) Video phone interface Provides built-in camera, microphone and speaker Supports both IP based video phones and analog video phones BioStar VideoPhone software to support single/multi operator interphone systems Versatile interfaces - extra flexibility Provides 2-channel RS485, RS232, Wiegand and USB Provides 4 inputs and 2 output relays Optional I/O ports for further expansion (Secure I/O)Add to Compare
SMARTair™ takes wireless locking way beyond doors. New SMARTair™ cabinet locks secure drug and medicine storage with RFID-enabled locks. In spas, swimming pools and sports centres around the world, clients can secure their belongings with credentials stored in water-resistant bands, instead of a cumbersome locker key. Facilities managers using SMARTair™ can control and manage the use of cabinet locks with an easy interface: it takes a few clicks to issue or revoke access credentials, or to generate an audit trail for every secure cabinet in the building. With standalone, offline and update-on-card system management, integrating cabinet locks with your organisation's existing smart cards is simple. SMARTair™ from TESA is compatible with all leading RFID technologies, including iCLASS® by HID, MIFARE™ Classic and DESFire™. More than just convenient, SMARTair™ from TESA is also cost-effective. SMARTair™ wireless locks use standard batteries instead of a 240V mains connection, saving money on running and maintenance costs. At a glance: Wireless lock for cabinets, lockers, drawers and other applications Yes (IP55), Up to 85% humidity without condensation, Temperature (-20°C and +70°C) Battery (up to 20.000 Cycles and max. 3 years), 3 x Standard LR03 AAA 1.5V batteries CE certification Special water resistant bracelet for Health Spa´s and swimming pools which enables users to go running or to swim availableAdd to Compare
Suprema, Inc., a leading global provider of technology in biometrics and security, recently announced the launch of a new model of IP access control multi-smartcard reader and controller, ‘Xpass S2’. Compared to its predecessor Xpass Slim, Xpass S2 is remarkably enhanced in RF performance as it now supports reading of various more card technology standards including MiFare, DESFire, ISO14443A/B, ISO15693 and FeliCa, as well as NFC. It also reads and writes data on the card sectors. In addition, with IP65 ingress protection rating, Xpass S2 is equipped with built-in adaptive heater and works under a harsh environment at a wide operational temperate range of -35°C to 65°C. It also supports expanded capacity, up to 50,000 user badges and 100,000 event logs for enterprise level organisations as well as small and medium sized businesses. Xpass S2 comes not only with TCP/IP interface, but also more traditional interfaces such as RS485 and Wiegand to provide higher flexibility and multiple installation options for different environments. A built-in relay and a configurable Wiegand interface enable Xpass S2 to be used as a standalone controller with other 3rd party readers. The device is designed by focusing on satisfying both aesthetic and practical aspects, featuring multi-colour LED indicator and extra slim profile of 11.4 mm. Measuring 80 mm of height and 120 mm of width, it perfectly fits switchboxes for most US, EU and APAC countries to provide easier installation. “The Xpass S2 is the latest addition to our growing access control lineup and provides extra flexibility for our customers in designing their access control systems with or without biometric solutions,” said Young S. Moon, Vice President of Suprema Inc. “Along with our biometric access control system, the Xpass S2 is expected to set Suprema as a leader in IP access control, meeting various needs for flexibility, complexity and scalability”Add to Compare
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialised featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialised featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customised recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
Three reasons for adopting open architecture access control solutionsDownload
5 steps to finding the right access control system for youDownload
Why outdated access control systems are a big problemDownload
Gallagher’s access control and perimeter security solution secures Village Roadshow Theme Parks in Australia
- Gallagher’s access control and perimeter security solution secures Village Roadshow Theme Parks in Australia
- Gallagher secures University College London’s campus with its access control systems
- Gallagher Command Control secures access at New Covent Garden Market
- Gallagher’s electronic access control solution enhances security at University of Otago