NexWatch Access Control Readers(2)
Browse Access Control Readers
- Long Range
- Keypad Integrated
Access control reader products updated recently
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialised featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialised featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customised recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
Honeywell announces the launch of new category of software, Enterprise Performance Management for Operations Technology, that will improve the way a variety of companies collect, analyse and act on data from their operations. The software solution, called Honeywell Forge, will leverage the company's more than 100 years of expertise in asset and process control technology and will transform the way work gets done by owners and operators of buildings, airlines, industrial facilities and other critical assets and infrastructure. Honeywell Forge converts massive quantities of data from equipment, processes and people into intuitive, actionable insights that enable monitoring of enterprise operations from a single screen. In turn, this helps customers optimise the efficiency, effectiveness and safety of their business. Derive business intelligence The company is developing Honeywell Forge to incorporate the latest cybersecurity protections Honeywell Forge is designed to be quick and cost-effective to implement, with a hardware- and software-agnostic approach that allows for use of existing systems. Honeywell Forge leverages predictive analytics to help identify maintenance issues before they happen; enable workers to be more productive, proficient and safe; reduce costs; and increase productivity. The company is developing Honeywell Forge to incorporate the latest cybersecurity protections. “Large enterprises around the world consistently lack top-to-bottom visibility into how their operations are performing, and most lack the ability to derive business intelligence from their disparate data sources. Their existing systems are disjointed and have shortcomings that slow growth and cut into profitability,” said Que Dallara, president and chief executive officer of Honeywell Connected Enterprise. “Honeywell Forge can provide leaders of complex businesses with the visibility they need to transform their operations quickly and efficiently, at every level and with minimum disruption, enabling users to focus resources on innovation and achieving business objectives.” Helping business owners According to a recent Honeywell survey, more than 80 percent of C-suite executives and senior decision makers believe it is important to implement a holistic solution as companies look to digitise and better connect their operations. The same survey shows key decision makers believe better enterprise management will offer superior predictive information, leading to safer and more secure facilities, enhanced efficiency and profitability in the supply chain, more efficient use of resources, and better real-time decision making to avoid downtime. Honeywell Forge offers these advantages and more to customers looking for quick adoption and fast payback. Honeywell announced the wide availability this week of Honeywell Forge for Buildings, which is intended to revolutionise the management of building portfolios by helping business owners and operators decrease operating expenses, improve energy consumption and manage space optimisation across an entire building portfolio while also enhancing the individual occupant experience. Transforming building operations Currently, many building portfolio owners have multiple disconnected systems in each building “Buildings house incredible and powerful data on the performance and usage of the building; however, if that data is difficult to access, interpret or use for meaningful insights, it doesn't help drive a customer's business. We are transforming building operations via enterprise software that allows owners and operators to get more out of their building data in order to drive significant business results,” said David Trice, vice president and general manager, Honeywell Connected Enterprise, Buildings. “Honeywell Forge for Buildings is open, extensible, intelligent and easy to use. You can turn on a building in a day or less and review the operations of a building from anywhere – including your favourite coffee shop.” Currently, many building portfolio owners have multiple disconnected systems in each building. Often these systems do not communicate with and are not compatible with each other, leading to manual maintenance, data trapped in proprietary systems, disconnected teams and systems, over- or underutilised space, and poor occupant experience. Enterprise management system More than 90 percent of building management decision makers surveyed agree that a better enterprise management system can help improve resource management, avoid unplanned downtime and provide enhanced predictive information to make facilities safer and more secure. When fully deployed, Honeywell Forge for Buildings aims to help reduce the operating expense of a building portfolio by up to 25 percent by providing visibility, monitoring and control of all building systems and processes across an entire portfolio of buildings. Honeywell Forge for Buildings easily integrates with other systems" “With more than 50 buildings in our global property portfolio, implementing next-generation building management systems enables us to make sound strategic decisions that will deliver improved capacity and space management, more agility and increased energy efficiency,” said Martin Frohock, head of facilities UK & EMEA, Arm, a multi-national semiconductor and software design company. “Honeywell Forge for Buildings easily integrates with other systems and allows us to gauge performance across the entire enterprise at any given time from a central location.” Protect critical operations The family of Honeywell Forge offerings will continue to expand across a wide range of sectors over the coming months: Honeywell Forge for Industrials (launching in June) monitors process performance and leverages digital twins to help optimise production and increase throughput; Honeywell Forge for Airlines (launching in June) provides insights and analytics to help save airlines money; Honeywell Forge for Inspection Rounds (launching in June) digitises the deskless worker and helps improve efficiency, productivity and compliance; and Honeywell Forge Cybersecurity (launching in the fourth quarter) helps protect critical operations from ever-evolving cyber threats.
Guests at some of Dubai’s newest hotels will enjoy more efficient and memorable service thanks to eFusion technology from Maxxess. Improving control The eFusion solution is being used for comprehensive streamlining of security and safety – tying together front-of-house and back-of-house operations – at a number of landmark hotel developments in Dubai. The result will be a smoother check-in experience for guests, with minimal queuing, no cumbersome paperwork, and more attentive service. By integrating front and back of house operations at busy hotels, eFusion reduces problems with inefficiency and human error and improves situational awareness and control capability for management teams. Among the latest five-star destinations to adopt eFusion, the Taj Exotica Resort & Spa on Palm Jumeirah, which is due to open later this year, comprises seventeen floors with 200-plus rooms and suites, along with recreational and dining facilities. The Taj Jumeirah Lake Towers, another development by the Indian Hotels Company due to open this year, will also benefit from Maxxess integration technology. Seamless integration eFusion allows rapid integration - off-the-shelf - with a wide choice of security, safety and business-critical technologies eFusion allows rapid integration – off-the-shelf – with a wide choice of security, safety and business-critical technologies. It provides an umbrella management system and allows the highest level of service efficiency by removing the need for operators to continually switch between systems. The systems and IT integrator for the new-build project, PACC Information and Communication Technology LLC, says eFusion was specified because it met requirements for the most robust solution and one that would be easy to adapt going forward. Delivering guest satisfaction “Guest satisfaction is the hotel’s top priority and the eFusion system will let them focus their efforts on delivering it,” says PACC spokesman Shantanu Mukherjee. “Visitors to these new hotels will really notice the difference.” At the Taj Exotica, eFusion will integrate the front of house system from ASSA ABLOY; the Honeywell Simplex fire system controls; the Honeywell Building Management System connected via a Bacnet gateway; and a combination of 403 Hanwha Technwin Wisenet IP internal and external cameras, installed by ISS CCTV and operated through SecureOS video management software (VMS). ASSA ABLOY VingCard access control The ASSA ABLOY VingCard access control system, securing almost 300 doors, will be managed from the eFusion platform alongside other key services due to be added, including the OTIS elevator controls. eFusion will allow the hotel’s management to define events of interest – such a particular door being unlocked, or alarms being set or unset – and provide transactional information to improve security for guests, and accountability. The solution also enables centralised management of room safes, mini-bars and cupboards, and the control of all alarm transactions. Integration with access control system Using eFusion off-the-shelf integration modules, ID badging and building management systems are also fully integrated Cameras linked to door access will allow video pop-up to be triggered by pre-defined events, and operators will have complete PTZ control, playback and video functionality. Using eFusion off-the-shelf integration modules, ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. A further 300 rooms are expected to be added to the Taj Exotica Resort & Spa system in a phase-two development scheduled for 2021. Modular, building block approach “The eFusion platform was chosen for these major projects because it offers the advantages of a modular, building block approach and gives IHCL maximum freedom to integrate, customise and adapt to future needs,” says Lee Copland, Managing Director EMEA, Maxxess Systems. He adds, “This success positions Maxxess as a clear leader in linking front-and-back of house operations to enable seamless facilities management, safety and security operations in often complex and busy hotel environments. Visitors to IFSEC International will have the opportunity to see the power of eFusion integration on our stand IF2120,” added Copland. As well as the new IHC Taj hotels, Maxxess eFusion is also being implemented at six upcoming Dubai developments, including major hotel, leisure and retail destinations, with several other projects underway in the wider region as well as in London, UK.
LifeSafety Power Inc. continues to expand its popular rack mount solutions, now adding the integration of Honeywell ProWatch to the FlexPower Gemini line. The Gemini RGH rack mount power management system supports seamless hardware integration of Honeywell ProWatch door controllers and centralised power in a single, space-saving design. Rack mount power management Gemini RGH is a compact, 19-inch rack-mounted enclosure engineered for data centers, IT closets, server rooms or other areas where space is limited. It integrates ProWatch door controllers and power controller boards in a pull-out, easy-to-access mechanical housing, giving systems integrators the convenience of a tiered drawer configuration for their Honeywell access control specifications. RGH is the continuation of LifeSafety Power’s award-winning Gemini line. Gemini covers the most widely specified access controller configurations, with rack mount designs for Mercury, SWH, AMAG, HID and Honeywell controllers, as well as ‘power-only’ rack mount footprints recently made available with the newly released RGL. Gemini Series carry UL and ULC listings, as well as other certifications. Compact housing for door controllers “The Gemini line continues to expand in response to our customer’s requests for compact, integrated housings for the most popular door controllers along with power,” said Larry Ye, President and CEO of LifeSafety Power. “As space for technology and equipment becomes increasingly limited, Gemini meets the need for access control and power integration in an abbreviated, yet easy-to-service footprint.”
5 steps to finding the right access control system for youDownload
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
- Gallagher’s Command Centre security system provides safety for PotashCorp’s facility in Ohio
- Gallagher Command Centre access control system secures students at Western Cape College of Nursing
- ASSA ABLOY’s SMARTair access control system secures Lycée Kreisker school in France
- Iris ID Systems selected by Dangote Group for time and attendance solutions at cement manufacturing plants