Paxton’s amazing designer readers and great customer service wow visitors at IFSEC 2010
Paxton’s amazing designer readers and great customer service wow visitors at IFSEC 2010

IFSEC 2010 was a great success for the Paxton team. The UK's market leading access control manufacturer showcased a range of product innovations to the delight of visitors to their stand. Trish Bambury, Brand Manager at Paxton said: "It was a great exhibition for Paxton, with both new and existing customers enthusiastic about our products and service. We are already looking forward to next year!" The real highlight of the show was Paxton's fantastic LCD reader, which wowed delegates with its sleek, modern LCD screen. The reader, that displays different images when a token is presented and access is granted or denied, was a hit with security professionals. Visitors were keen to discuss different ideas for the reader and suggest new images to upload to the LCD screen - it really got people talking. The busy Paxton stand, situated in Hall 5, offered a warm welcome to all visitors. The bright, open plan layout really stood out against competitors' stands and got an excellent response from IFSEC 2010 attendees. Paxton's professional and friendly team also received some great positive feedback on the unwavering levels of care and support they offer to installers and customers alike. Their fantastic UK technical support, free installer training and five year, no quibble product guarantee are just some of the things that keep their clients coming back time and time again. One visitor said: "As usual I was given excellent service from Paxton. The team are knowledgeable and patient and they gave me the answers that I needed."

Add to Compare
A hands free system from Paxton Access guarantees site security and complete usability
A hands free system from Paxton Access guarantees site security and complete usability

Hands free access control means that the token used to identify a user is read from within their pocket or handbag etc.  This means an authorised user can open a door without having to present their token.  It's particularly useful for gates/barriers, loading doors and where disabled or elderly people require access.  Compatible with Switch2 and Net2 Incredibly easy to installMinimal additional equipment (1 x hands free interface per door & hands free tokens)Retrofit capabilitiesMinimal on-site disturbanceInstalling a Paxton Access hands free system is easy due to the innovative hands free interface and associated technology.  The interface increases read ranges significantly without the hassle of installing door or ground loops as required by other systems.  Because the interface is wired in series between a reader and a control unit it doesn't require its own power supply.Hands free tokens are available in two types: hands free keyfobs and hands free keycards.  Both tokens are fitted with PROXIMITY chips that allow them to be used as close proximity tokens too.  The keycard also has a booster facility that enables automatic gates to be activated from up to 50m away.  Hands free applications:Convenience: unhindered movement is desirable in itself.Car parks: Drivers can activate automatic barriers from the comfort of their car. Regulatory: Conform to regulations as laid out in the Disability Discrimination Act.Security: Doors no longer need to be propped open in factories/warehouses where moving stock around hinders swiping tokens.Hygiene: Reduce the risk of cross contamination in food/beverage production areas, pharmaceutical companies and hospitals etc.

Add to Compare

Access control readers - Expert commentary

Entrance control vs access control: similarities and differences
Entrance control vs access control: similarities and differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.

Making the shift from manufacturer to service provider
Making the shift from manufacturer to service provider

The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be  highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.

A secured entrance is the first defence against an active shooter
A secured entrance is the first defence against an active shooter

The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”

Latest Paxton Access Limited news

Paxton announces releasing Paxton 10 access control and video intercom system at ISC West 2020
Paxton announces releasing Paxton 10 access control and video intercom system at ISC West 2020

Paxton, the global brand of electronic IP access control and video intercom systems, announced that its upcoming release, Paxton10, will be unveiled at ISC West, March 18-20, 2020 taking place at the Sands Expo Center in Las Vegas, Nevada, USA. Paxton10 combines access control and video management onto a single platform. Dealers can be the first in the U.S. to see this simple and innovative system at booth #16059. Paxton10 took the UK by storm last year, with one dealer saying, “I'll most definitely recommend Paxton10. Like with all Paxton products, the user interface is simple, it's plug-and-play and it looks good.” Paxton10 access control and video intercom system Jonathan Lach, Paxton’s Vice President of Sales said, “We’re excited to preview Paxton10 at ISC West this year. Dealers have told us about the complexity of installing two separate systems and with Paxton10 this won’t be a barrier for installations. We believe good technology should make things simpler, not more complicated. Paxton10 means you only need to install one system, not two. Simplicity is at the heart of everything we do.” Visitors to Paxton’s booth can also receive demonstrations of the latest releases to Paxton’s video intercom system, Entry, and their wireless lockset range, PaxLock. ISC West 2020 Lach continues, “Alongside the exclusive Paxton10 preview, our team of experts will be available to demo two new product launches to dealers. People can get hands-on with these exciting additions and discover the benefits from our team.” Dealers will also have the chance to be entered into a daily prize drawing to win US$ 1,500 of Paxton products and a Bose speaker when they stop by the booth. All Paxton products have a five-year warranty, hassle free return policy, and are supported by their industry leading Customer Support team.

Paxton announces integration of its networked access control system with Hanwha Techwin’s video management system
Paxton announces integration of its networked access control system with Hanwha Techwin’s video management system

Paxton has announced the integration of its networked access control system, Net2, with Hanwha Techwin’s newest video management system, Wisenet WAVE. The integration means Net2 users are able to instantly view event-driven video captured by high-definition IP network cameras connected to Wisenet WAVE. Available via a free Net2 plug-in, the integration also allows users to visually verify anyone attempting to gain access to a site, as well as provide video verification of alarm incidents from within the Net2 Client software. Video surveillance cameras The plug-in simplifies the process of integrating the two systems and offers an improved graphical user interface (GUI), offering live, replay and exporting of associated video surveillance cameras directly in the Net2 Client application. The plug-in supports Net2 versions 5 and 6 and is available from Hanwha Techwin’s Technical Support free of charge. Wisenet solutions are specified alongside Net2 and offers full advantage of their IP network-based access control" Gareth O’Hara, Paxton’s Chief Sales Officer, said: “We put our core values of simplicity and quality at the heart of everything we do, to provide our customers with a world-class service. It’s a pleasure to work with Hanwha Techwin, who share our values of providing a simple yet powerful user experience. This integration offers customers an enhanced functionality, so they can get even more out of our market-leading Net2 system.” IP network-based access control Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, said: “Wisenet solutions are now regularly being specified alongside Net2 and we believe, therefore, that this integration offers real-life practical benefits to users who wish to take full advantage of their IP network-based access control and video surveillance systems.” Net2 is Paxton’s networked access control system. It can be administered using one or more PCs and can be monitored and managed from a central location. It is a complete solution that encompasses wireless and door entry. Motion detection and video analytics Wisenet WAVE is designed to make it almost effortless to monitor up to 64 high-definition video streams. An auto-discover feature ensures connected cameras and third-party IP network devices can be addressed and set up in just minutes. An intuitive ‘drag & drop’ tool makes it easy to set up a display of live and recorded images on a single screen or video wall, with customisable layouts and sizes. Other key features include a virtual PTZ which, with just a click of the mouse, enables operators to zoom in to see close-up detail of any suspicious activity, while motion detection and video analytics support can be configured to generate alerts when user-defined incidents occur.

Paxton appoints Jeremy Allison as the new Senior Product Manager to join its United States team
Paxton appoints Jeremy Allison as the new Senior Product Manager to join its United States team

Paxton welcomes a new Senior Product Manager to the United States team, bringing with him a wealth of knowledge and experience of the access control market. Jeremy Allison will be based in Greenville, SC, and will oversee the development of future products, making sure they meet the demands and expectations of the growing US market. With over 15 years’ experience in CCTV and control systems, Jeremy has worked as a product manager for a security company and has run his own integration company. Product management team The company has a really positive atmosphere and I can’t wait to get started" He said, “I’m excited to be working with such a creative and talented team at Paxton - this really is the perfect role for me. I’m looking forward to sharing my knowledge and experience, while further developing my skills using Paxton’s world-class systems. The company has a really positive atmosphere and I can’t wait to get started.” Paul Bannister, Paxton’s Research Director said, “I’m absolutely delighted that Jeremy has joined our product management team, heading up the US side of the department, and bringing 15 years of experience with him. We’re looking forward to working with Jeremy to deliver the world-class products our customers expect, resulting in continued growth for our important US market.” Access control industry Jonathan Lach, VP of Sales at Paxton Access, Inc. said, “Jeremy has a wealth of knowledge of the access control industry, and he will make a fantastic addition to the team.” Jeremy will be working to develop Paxton’s brands: Net2 – simple access control Net2 Entry - innovative video intercom PaxLock – access control in a wireless lockset

Related white papers

3 reasons to migrate to a new access control system

5 steps to finding the right access control system for you

OSDP is the strongest access control for your business