Everswitch Access Control Readers(15)
A new anti-vandal, low profile illuminated keypad combines with multi technology reader, iClass, Mifare & DESfire in one reader. All Everswitch access control products utilise the BARAN innovative Piezo technology. The Everswitch keypads rugged, sealed, non-moving one-piece construction sets it apart from any alternative.Add to Compare
Everswitch access control keypads utilise Baran Advanced Technologies patented Piezo technology, constructed of a single piece of anodised aluminium. The keypads are sealed to IP68, against environmental conditions. The legend is anodised into the aluminium and will never wear off. These units are suitable for temperatures ranging from -40 °C to +120°C and withstand humidity up to 100% (actually, they even work when submerged). The Everswitch keypad was tested in excess of 50 million cycles. In addition, the Everswitch access control door unit, which includes PIN/PROX/MAGNETIC reader, was approved by a leading oil producer as the "End of line unit" for their peripheral security systems in refineries worldwide. These ratings are the guarantee to Everswitch quality assurance - furthermore, the Everswitch products are backed by a 5-year unprecedented performance guarantee. Everswitch access control keypads with Piezo technology The Everswitch line of access control keypads are widely used and approved by various governmental agencies. Recently, Everswitch was awarded FAA Certification for the new Cockpit Door Access Control Keypad, giving them the only certified keypad for flight deck doors in the security industry.The Cockpit Door Access Control Keypad joins Everswitch complete line of security products that includes Wiegand keypads, Prox readers and single door access systems and crosses over into a host of other industries. The Everswitch product line is CE certified MIL STD approved and manufactured under ISO 9000 - 2000 standard. Everswitch control keypads use Piezo technology, built of a single piece of aluminium. The entire keypad is filled with a rubbery potting compound that seals the unit completely against environmental conditions. The Everswitch panels are completely sealed with no gaps even for bacteria to hide. Piezo switches are constructed by attaching the piezoelectric material to the back of a metallic membrane. Pushing the membrane results in no discernable movement. And yet, pressure applied to the front of the membrane is converted into a small electric current that is used to switch a secondary circuit. Piezo switches so constructed have no moving parts, no arcing and no openings that invite wetness and dust.The design digits or letters are anodised into the aluminium and will never wear off. These units are suitable for temperatures from -40 °C to +120°C and for humidity up to 100% (actually, they even work when submerged). The Everswitch was tested in excess of 50 million cycles. These ratings are your guarantee to our quality assurance. But even more important, our products are backed by an unprecedented performance guarantee.There are no other keypads on the market that match our capabilities, approvals, specifications and performance guarantees of Everswitch!Add to Compare
The EVERSWITCH anti vandal 13,56 MHz HID reader provides the ultimate solution for users operating in harsh environment high traffic areas or need weatherised door units.Indoor/outdoor design: Sealed in a rugged, weatherised aluminium enclosure the EVERSWITCH is designed to withstand harsh environment, providing reliable performance and is vandal and tamper proof.Easily interfaced: Wiegand output model interfaces with all existing Wiegand protocol access control systems.The EVERSWITCH / HID is:Vandal proofTamper proofWeather proofWater and dust proof (IP68, 100% humidity)Add to Compare
The EVERSWITCH™ line of Piezo Electric Human Machine Interfaces from Baran Advanced Technologies spans from single switches via a variety of keypads and control panels to full-size keyboards. All products are rugged, sealed, tamper and vandal-proof solid-state constructions featuring unprecedented durability and reliability.The EVERSWITCH™ family of products has been successfully tested for 50,000,000 cycles including vibration and impact tests. The non-mechanical, fully electronic patented switch technology allows for perfect adaptation to retro fit as well as new designs and interfaces easily with existing systems. The module concept enables us to produce prototypes in an extremely short time with negligible tooling costs. The ASM is equipped with three electronic devices:Magnetic card readerHID proximity card readerPiezoelectric keypadThe iClass/MIFARE/DESFire can read either iClass credentials (transmitting as Wiegand formatted data as encoded), MIFARE® Standard, Ultralight or DESFire® credentials (transmitting Wiegand data based on the cards serial number in 26-, 32-, 34-, 40- or 56-bit formats).The ASM supports the following operation modes:Swipe a valid Magnetic Card in either direction. The unit will read the contents and send it over thedata wires to the host.Enter a PIN code. The unit will send each digit over the same data wires to the host.Present a valid Proximity card. The unit will read and send the data to the host.Add to Compare
The Everswitch family of indestructible access control products consists of single-door, stand-alone self contained access control keypads. All Everswitch access control products utilise the BARAN innovative Piezo technology. The Everswitch keypad's rugged, sealed, non-moving one-piece construction sets it apart from any alternative.Key features include:Vandal proof Tamper proofWeather proof (-40°C ~ 125° C)Water & dust proof (IP68, 100% humidity)Add to Compare
Browse Access Control Readers
- Keypad Integrated
- Long Range
Access control reader products updated recently
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localisation. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymised and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
HID will highlight its new iCLASS SE Encoder at ASIS 2013 HID Global, a worldwide leader in secure identity solutions, is demonstrating its new iCLASS SE platform and secure identity solutions at ASIS International 2013 in Chicago. The company will highlight its new iCLASS SE Encoder for locally encoding credentials and managing keys and showcase its expanded pivCLASS Government Solutions portfolio. In addition to demonstrating its broad range of solutions for creating, using and managing secure identities, the company’s new experience zones will feature products and services that address the specific needs of Government, Healthcare, Enterprise, Education, Financial and Banking markets. At ASIS 2013, HID Global will demonstrate its extensive portfolio of secure identity solutions in booth #329 at McCormick Place, South Hall from September 24-26, 2013. Announcements include: HID Global Extends Its iCLASS SE Platform with Credential Encoding Solution that Simplifies Migration to Higher Security and Mobile Access HID Global Expands pivCLASS Portfolio to Include Credential Registration and Verification of FIPS 201-based Credentials for Government Agencies Top demonstrations include: Card and Reader Migration Solutions: for moving to higher security, interoperability and mobile access. Demonstrations will include HID Global’s iCLASS platform readers and smart cards including its iCLASS Seos credential for powering mobile access, and its new iCLASS SE Encoder that enables organisations to encode/manage credentials and configure readers. The multi-technology encoder makes it possible for customers to format a number of credential technologies using a single device, on demand. Government Solutions: featuring pivCLASS solutions that enable government agencies to comply with physical access control mandates to PIV-enable their existing physical access control systems (PACS) to meet any mandated assurance level without requiring a “rip and replace” of their existing PACS infrastructure. The recently expanded pivCLASS portfolio includes an extensive line of solutions for credential registration and verification of FIPS 201-based credentials from Codebench, part of HID Global. The recently expanded pivCLASS portfolio includes an extensive line of solutions for credential registration and verification of FIPS 201-based credentials from Codebench, part of HID Global Healthcare Solutions: that enhances workflow efficiencies and help meet regulatory compliance while increasing security without sacrificing convenience. Demonstrations will include: EasyLobby Visitor Management Solutions for visitor registration, badge printing, tracking and reporting; Genuine HID Technology in partner terminals; and HID Secure Identity Services that help customers manage the daily flow of ID card badge requests and large-volume re-badging projects as well as combine multiple technology platforms onto one credential and “tap in /out” authentication with OMNIKEY desktop readers. Enterprise Solutions: to help organisations maintain operational efficiency and reduce costs, while providing optimum security for their facilities and properties. Demonstrations will include: HID Global’s FARGO HDP5000 Printer/Encoder; iCLASS SE readers with OSDP; ActivID Authentication for secure computer log-on and identity verification; one-time password (OTP) tokens; and EDGE EVO and VertX EVO IP-enabled open architecture access control solutions. Education Solutions: for educational institutions with unique requirements for securing their facilities, improving administrative efficiencies, and doing more than opening doors with student ID badges. Higher education demonstrations will include: iCLASS SE Magstripe readers, EDGE EVO networked access control products, mobile access solutions including iCLASS Seos credentials that can be embedded into NFC-enabled smartphones, and the HDP8500LE Industrial Series Card Printer/Laser Engraver for high duty cycle, high-volume ID programs with Asure ID card personalisation software. Additional demonstrations in the K-12 zone will showcase enterprise-class EasyLobby Visitor Management Solutions and FARGO Direct-to-Card (DTC) Printer/Encoders. HID Global’s strategic partners offer RFID and contactless solutionsthat use Genuine HID Technology to solve enterprise business problems Financial and Banking Solutions: for financial institutions to secure buildings, control access to critical network resources and sensitive data, and secure online banking services for their customers. Demonstrations will include: ActivID solutions that provide five critical layers for true, multi-factor authentication to enable trusted online transactions; Crescendo smart cards for strong PKI-based authentication supporting logical and physical control; and OMNIKEYdesktop readers. Partner Solutions: HID Global’s strategic partners offer RFID and contactless solutions that use Genuine HID Technology to solve enterprise business problems. Access control solutions that extend the use of a single secure credential will be on display by Networked Access Solutions, and HID Connect, partners including AMT, ASSA ABLOY, Baran Advanced Technologies Ltd., Freedom Pay, Innometriks, Integrated-MATRIX-Solutions, Essex Electronics, Inc., PCSC and others. During ASIS International Security Conference and Exposition, HID Global executives will present at their annual educational luncheon and other ASIS events: “Leading Change in the Secure Identity Ecosystem – HID Global president and CEO Denis Hébert will moderate a panel with leading organisations AIG, Academy Of Art University and Houston Methodist Hospital to discuss how they are working with HID Global to significantly improve their access control infrastructure. The organisations will explain how the changes they are making to their access control systems are delivering tangible value today, while better positioning their organisations for future benefits including the addition of mobile credentials on smartphones. The luncheon is being held on Tuesday, September 24, 2013. Customers interested in attending can contact HID Global. “Cryptography and PKI in Access Control,” Session 2306 – Robert Fontana, vice president of engineering, Federal Identity Solutions with Codebench, part of HID Global, on Tuesday, September 24 from 4:30 p.m. to 5:30 p.m. The session is sponsored by ASIS Information Technology Security Council and ASIS Critical Infrastructure Working Group.
HID will also demonstrate its suite of technologies, products and services at ASIS 2012 HID Global, trusted leader in solutions for the delivery of secure identity, recently announced it will showcase its comprehensive range of breakthrough innovations to create, use and manage secure identity at next week’s ASIS International 2012 in Philadelphia. In addition to announcing the latest additions to its award-winning iCLASS SE® platform that provides the highest level of security, privacy and portability, the company will also conduct live demonstrations of its mobile access solutions. HID Global will demonstrate its extensive suite of technologies, products, solutions and services in Booth 1509 at the Pennsylvania Convention Center from September 10-13, 2012, including: Solutions for creating a secure identity Secure Identity Services: A comprehensive suite of services to help customers address every aspect of requirements for cards and digital credentials for mobile access, including managing the daily flow of ID card badge requests, large-volume re-badging projects, and combining multiple technology platforms onto one credential. PIV Enablement Solutions: pivCLASS® solutions that allow U.S. Federal Government agencies, contractors and other facilities to PIV-enable their existing physical access control systems to meet any mandated assurance level without requiring a “rip and replace” of their existing PACS infrastructure. Card Personalisation Solutions: HID Global will showcase its FARGO® HDP8500 Industrial Series Card Printer/Encoder for high duty cycle, high-volume ID programs; its FARGO Direct-to-Card (DTC) and High Definition Printing™ (HDP®) printer/encoder solutions; and Asure ID® card personalisation software. Visitor Management Solutions: HID’s EasyLobby® visitor management solutions for visitor badges and detailed visitor logs. Embedded Technologies: Embedded platforms to enable third parties to develop hardware that works within the Genuine HID™ ecosystem including the new iCLASS SE Reader module and the SIO® Processor that can be used across a variety of platforms to SIO-enable third-party hardware. Partner Solutions: Access control solutions that expand the use of Genuine HID Technology™ will be on display by key Networked Access and HID Connect® partners including AMT, ASSA ABLOY, Baran/EverSwitch, Essex Electronics FreedomPay, Innometriks, NetAccess Controls and PCSC. Solutions for using secure identity Genuine HID Credentials and Readers: New Crescendo® credentials for strong PKI-based authentication supporting logical and physical control. Also highlighted will be its new OMNIKEY desktop readers in addition to HID’s new iCLASS SE platform credentials and reader solutions and its line of iCLASS SE/multiCLASS SE readers for higher security and migration to mobile access. Networked Access Solutions: Next generation EDGE EVO and VertX EVO™ IP-enabled access control solutions for fully distributed intelligence and decision making at the door. Solutions for managing secure identities Mobile Access Solutions: HID’s technology-independent iCLASS SE access control platform that delivers advanced security, portability and flexibility, while enabling the use NFC-enabled smartphones for access control and other applications. Come see our 2012 “ASIS Accolades Security’s Best” award-winning solution. Credential Management Solutions: ActivID Credential Management System appliance for easy issuance and management of strong and PKI-enabled smart cards and credentials, Authentication Solutions: naviGO, 4TRESS Authentication for secure computer log-on and identity verification, and one time password (OTP) tokens.
Baran Access Solutions, subsidiary of Baran Advanced Technologies Ltd., will leverage the Piezo technology in its product line New and old have come together with the launch of Baran Access Solutions, a reorganization of the familiar Barantec family of products that will now concentrate on access control solutions, including Everswitch single-door keypads and controllers, contactless smart card readers, proximity readers and magstripe readers. As part of the restructuring, security industry veteran and RFID technology expert, Bill Newill, has been named the company's president. The company is setting up its corporate offices in southern California. "Baran Access Solutions can now concentrate its efforts on the unique demands of the access control market without being distracted by ancillary products," said Newill. "In the end, greater focus will translate to tighter internal processes, better engineered products and a higher level of customer satisfaction." The new company will leverage the patented and highly reliable Piezo technology in its product line. "Having access to this industry-leading technology gives us a huge leg up on the competition," Newill added. Baran Access Solutions will begin by focusing specifically on the manufacture and delivery of access control solutions for commercial customers Baran Access Solutions is a subsidiary of Baran Advanced Technologies Ltd. and the Baran Group, a global leader in engineering, technology and construction services and a name which has come to epitomize excellence. While the Baran brand is not as familiar in the United States, Newill and the rest of the company's senior management team understand the deep roots of Baran Access Solutions' parent companies - and are fully committed to continuing the Baran tradition of excellence. Baran Access Solutions will begin by focusing specifically on the manufacture and delivery of access control solutions for commercial customers throughout the United States and Canada and gradually extend its reach globally.
Related white papers
11 considerations for embedded system RFID readers
RFID and smartphone readers in physical access control
3 reasons to migrate to a new access control system
Building a safe ecosystem for visitors post COVID-19Download
Smart security cameras: excellence in retailDownload
5 reasons to integrate mobile technology into your security solutionDownload
- Assa Abloy’s SMARTair® wireless access control system secures heritage school site in Spain
- ASSA CLIQ® Remote system secures plant control rooms at Loughborough University
- Edgeworx secures Manhattan preschool with Darcy AI thermal camera
- HID Global Seos® smart cards and FARGO® Connect help secure access to University of Connecticut student campus